Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (130)
  • Open Access

    ARTICLE

    Weber Law Based Approach for Multi-Class Image Forgery Detection

    Arslan Akram1,3, Javed Rashid2,3,4, Arfan Jaffar1, Fahima Hajjej5, Waseem Iqbal6, Nadeem Sarwar7,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 145-166, 2024, DOI:10.32604/cmc.2023.041074 - 30 January 2024

    Abstract Today’s forensic science introduces a new research area for digital image analysis for multimedia security. So, Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegitimate benefit or create misleading publicity by using tempered images. Exiting forgery detection methods can classify only one of the most widely used Copy-Move and splicing forgeries. However, an image can contain one or more types of forgeries. This study has proposed a hybrid method for classifying Copy-Move and splicing images using texture information of images in the spatial domain. Firstly, More >

  • Open Access

    ARTICLE

    Web Layout Design of Large Cavity Structures Based on Topology Optimization

    Xiaoqiao Yang, Jialiang Sun*, Dongping Jin

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2665-2689, 2024, DOI:10.32604/cmes.2023.031482 - 15 December 2023

    Abstract Large cavity structures are widely employed in aerospace engineering, such as thin-walled cylinders, blades and wings. Enhancing performance of aerial vehicles while reducing manufacturing costs and fuel consumption has become a focal point for contemporary researchers. Therefore, this paper aims to investigate the topology optimization of large cavity structures as a means to enhance their performance, safety, and efficiency. By using the variable density method, lightweight design is achieved without compromising structural strength. The optimization model considers both concentrated and distributed loads, and utilizes techniques like sensitivity filtering and projection to obtain a robust optimized More >

  • Open Access

    ARTICLE

    Empirical Analysis of Neural Networks-Based Models for Phishing Website Classification Using Diverse Datasets

    Shoaib Khan, Bilal Khan, Saifullah Jan*, Subhan Ullah, Aiman

    Journal of Cyber Security, Vol.5, pp. 47-66, 2023, DOI:10.32604/jcs.2023.045579 - 28 December 2023

    Abstract Phishing attacks pose a significant security threat by masquerading as trustworthy entities to steal sensitive information, a problem that persists despite user awareness. This study addresses the pressing issue of phishing attacks on websites and assesses the performance of three prominent Machine Learning (ML) models—Artificial Neural Networks (ANN), Convolutional Neural Networks (CNN), and Long Short-Term Memory (LSTM)—utilizing authentic datasets sourced from Kaggle and Mendeley repositories. Extensive experimentation and analysis reveal that the CNN model achieves a better accuracy of 98%. On the other hand, LSTM shows the lowest accuracy of 96%. These findings underscore the More >

  • Open Access

    ARTICLE

    Phishing Website URL’s Detection Using NLP and Machine Learning Techniques

    Dinesh Kalla1,*, Sivaraju Kuraku2

    Journal on Artificial Intelligence, Vol.5, pp. 145-162, 2023, DOI:10.32604/jai.2023.043366 - 18 December 2023

    Abstract Phishing websites present a severe cybersecurity risk since they can lead to financial losses, data breaches, and user privacy violations. This study uses machine learning approaches to solve the problem of phishing website detection. Using artificial intelligence, the project aims to provide efficient techniques for locating and thwarting these dangerous websites. The study goals were attained by performing a thorough literature analysis to investigate several models and methods often used in phishing website identification. Logistic Regression, K-Nearest Neighbors, Decision Trees, Random Forests, Support Vector Classifiers, Linear Support Vector Classifiers, and Naive Bayes were all used More >

  • Open Access

    ARTICLE

    Ontology-Based Crime News Semantic Retrieval System

    Fiaz Majeed1, Afzaal Ahmad1, Muhammad Awais Hassan2, Muhammad Shafiq3,*, Jin-Ghoo Choi3, Habib Hamam4,5,6,7

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 601-614, 2023, DOI:10.32604/cmc.2023.036074 - 31 October 2023

    Abstract Every day, the media reports tons of crimes that are considered by a large number of users and accumulate on a regular basis. Crime news exists on the Internet in unstructured formats such as books, websites, documents, and journals. From such homogeneous data, it is very challenging to extract relevant information which is a time-consuming and critical task for the public and law enforcement agencies. Keyword-based Information Retrieval (IR) systems rely on statistics to retrieve results, making it difficult to obtain relevant results. They are unable to understand the user's query and thus face word… More >

  • Open Access

    ARTICLE

    Injections Attacks Efficient and Secure Techniques Based on Bidirectional Long Short Time Memory Model

    Abdulgbar A. R. Farea1, Gehad Abdullah Amran2,*, Ebraheem Farea3, Amerah Alabrah4,*, Ahmed A. Abdulraheem5, Muhammad Mursil6, Mohammed A. A. Al-qaness7

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3605-3622, 2023, DOI:10.32604/cmc.2023.040121 - 08 October 2023

    Abstract E-commerce, online ticketing, online banking, and other web-based applications that handle sensitive data, such as passwords, payment information, and financial information, are widely used. Various web developers may have varying levels of understanding when it comes to securing an online application. Structured Query language SQL injection and cross-site scripting are the two vulnerabilities defined by the Open Web Application Security Project (OWASP) for its 2017 Top Ten List Cross Site Scripting (XSS). An attacker can exploit these two flaws and launch malicious web-based actions as a result of these flaws. Many published articles focused on… More >

  • Open Access

    ARTICLE

    3D Model Occlusion Culling Optimization Method Based on WebGPU Computing Pipeline

    Liming Ye1,2, Gang Liu1,2,3,4,*, Genshen Chen1,2, Kang Li1,2, Qiyu Chen1,2,3, Wenyao Fan1,2, Junjie Zhang1,2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2529-2545, 2023, DOI:10.32604/csse.2023.041488 - 28 July 2023

    Abstract Nowadays, Web browsers have become an important carrier of 3D model visualization because of their convenience and portability. During the process of large-scale 3D model visualization based on Web scenes with the problems of slow rendering speed and low FPS (Frames Per Second), occlusion culling, as an important method for rendering optimization, can remove most of the occluded objects and improve rendering efficiency. The traditional occlusion culling algorithm (TOCA) is calculated by traversing all objects in the scene, which involves a large amount of repeated calculation and time consumption. To advance the rendering process and… More >

  • Open Access

    ARTICLE

    Recapitulation Web 3.0: Architecture, Features and Technologies, Opportunities and Challenges

    Amtul Waheed, Bhawna Dhupia*, Sultan Mesfer Aldossary

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1609-1620, 2023, DOI:10.32604/iasc.2023.037539 - 21 June 2023

    Abstract Tim Berners-Lee developed the internet at CERN in early 1990 with fundamental technologies such as HTML, URL, and HTTP which became the foundation of the web. The contemporary web we use today has been much advanced over a period of time ever since the innovation of the World Wide Web was introduced. The static web was the first version of the web, which was the read-only web. Succeeding development in web technology is web 3.0 which is a distributed and decentralized web with emerging technologies. This article emphasizes the comparison of important details with the… More >

  • Open Access

    ARTICLE

    Web Intelligence with Enhanced Sunflower Optimization Algorithm for Sentiment Analysis

    Abeer D. Algarni*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1233-1247, 2023, DOI:10.32604/csse.2022.026915 - 26 May 2023

    Abstract Exponential increase in the quantity of user generated content in websites and social networks have resulted in the emergence of web intelligence approaches. Several natural language processing (NLP) tools are commonly used to examine the large quantity of data generated online. Particularly, sentiment analysis (SA) is an effective way of classifying the data into different classes of user opinions or sentiments. The latest advances in machine learning (ML) and deep learning (DL) approaches offer an intelligent way of analyzing sentiments. In this view, this study introduces a web intelligence with enhanced sunflower optimization based deep… More >

  • Open Access

    ARTICLE

    Process Monitoring and Terminal Verification of Cable-Stayed Bridges with Corrugated Steel Webs under Contruction

    Kexin Zhang, Xinyuan Shen, Longsheng Bao, He Liu*

    Structural Durability & Health Monitoring, Vol.17, No.2, pp. 131-158, 2023, DOI:10.32604/sdhm.2023.023431 - 09 May 2023

    Abstract In this paper, the construction process of a cable-stayed bridge with corrugated steel webs was monitored. Moreover, the end performance of the bridge was verified by load test. Owing to the consideration of the bridge structure safety, it is necessary to monitor the main girder deflection, stress, construction error and safety state during construction. Furthermore, to verify whether the bridge can meet the design requirements, the static and dynamic load tests are carried out after the completion of the bridge. The results of construction monitoring show that the stress state of the structure during construction… More >

Displaying 11-20 on page 2 of 130. Per Page