Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (136)
  • Open Access

    ARTICLE

    Injections Attacks Efficient and Secure Techniques Based on Bidirectional Long Short Time Memory Model

    Abdulgbar A. R. Farea1, Gehad Abdullah Amran2,*, Ebraheem Farea3, Amerah Alabrah4,*, Ahmed A. Abdulraheem5, Muhammad Mursil6, Mohammed A. A. Al-qaness7

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3605-3622, 2023, DOI:10.32604/cmc.2023.040121 - 08 October 2023

    Abstract E-commerce, online ticketing, online banking, and other web-based applications that handle sensitive data, such as passwords, payment information, and financial information, are widely used. Various web developers may have varying levels of understanding when it comes to securing an online application. Structured Query language SQL injection and cross-site scripting are the two vulnerabilities defined by the Open Web Application Security Project (OWASP) for its 2017 Top Ten List Cross Site Scripting (XSS). An attacker can exploit these two flaws and launch malicious web-based actions as a result of these flaws. Many published articles focused on… More >

  • Open Access

    ARTICLE

    3D Model Occlusion Culling Optimization Method Based on WebGPU Computing Pipeline

    Liming Ye1,2, Gang Liu1,2,3,4,*, Genshen Chen1,2, Kang Li1,2, Qiyu Chen1,2,3, Wenyao Fan1,2, Junjie Zhang1,2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2529-2545, 2023, DOI:10.32604/csse.2023.041488 - 28 July 2023

    Abstract Nowadays, Web browsers have become an important carrier of 3D model visualization because of their convenience and portability. During the process of large-scale 3D model visualization based on Web scenes with the problems of slow rendering speed and low FPS (Frames Per Second), occlusion culling, as an important method for rendering optimization, can remove most of the occluded objects and improve rendering efficiency. The traditional occlusion culling algorithm (TOCA) is calculated by traversing all objects in the scene, which involves a large amount of repeated calculation and time consumption. To advance the rendering process and… More >

  • Open Access

    ARTICLE

    Recapitulation Web 3.0: Architecture, Features and Technologies, Opportunities and Challenges

    Amtul Waheed, Bhawna Dhupia*, Sultan Mesfer Aldossary

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1609-1620, 2023, DOI:10.32604/iasc.2023.037539 - 21 June 2023

    Abstract Tim Berners-Lee developed the internet at CERN in early 1990 with fundamental technologies such as HTML, URL, and HTTP which became the foundation of the web. The contemporary web we use today has been much advanced over a period of time ever since the innovation of the World Wide Web was introduced. The static web was the first version of the web, which was the read-only web. Succeeding development in web technology is web 3.0 which is a distributed and decentralized web with emerging technologies. This article emphasizes the comparison of important details with the… More >

  • Open Access

    ARTICLE

    Web Intelligence with Enhanced Sunflower Optimization Algorithm for Sentiment Analysis

    Abeer D. Algarni*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1233-1247, 2023, DOI:10.32604/csse.2022.026915 - 26 May 2023

    Abstract Exponential increase in the quantity of user generated content in websites and social networks have resulted in the emergence of web intelligence approaches. Several natural language processing (NLP) tools are commonly used to examine the large quantity of data generated online. Particularly, sentiment analysis (SA) is an effective way of classifying the data into different classes of user opinions or sentiments. The latest advances in machine learning (ML) and deep learning (DL) approaches offer an intelligent way of analyzing sentiments. In this view, this study introduces a web intelligence with enhanced sunflower optimization based deep… More >

  • Open Access

    ARTICLE

    Process Monitoring and Terminal Verification of Cable-Stayed Bridges with Corrugated Steel Webs under Contruction

    Kexin Zhang, Xinyuan Shen, Longsheng Bao, He Liu*

    Structural Durability & Health Monitoring, Vol.17, No.2, pp. 131-158, 2023, DOI:10.32604/sdhm.2023.023431 - 09 May 2023

    Abstract In this paper, the construction process of a cable-stayed bridge with corrugated steel webs was monitored. Moreover, the end performance of the bridge was verified by load test. Owing to the consideration of the bridge structure safety, it is necessary to monitor the main girder deflection, stress, construction error and safety state during construction. Furthermore, to verify whether the bridge can meet the design requirements, the static and dynamic load tests are carried out after the completion of the bridge. The results of construction monitoring show that the stress state of the structure during construction… More >

  • Open Access

    ARTICLE

    Assessing Secure OpenID-Based EAAA Protocol to Prevent MITM and Phishing Attacks in Web Apps

    Muhammad Bilal1,*, Sandile C. Shongwe2, Abid Bashir3, Yazeed Y. Ghadi4

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4713-4733, 2023, DOI:10.32604/cmc.2023.037071 - 29 April 2023

    Abstract To secure web applications from Man-In-The-Middle (MITM) and phishing attacks is a challenging task nowadays. For this purpose, authentication protocol plays a vital role in web communication which securely transfers data from one party to another. This authentication works via OpenID, Kerberos, password authentication protocols, etc. However, there are still some limitations present in the reported security protocols. In this paper, the presented anticipated strategy secures both Web-based attacks by leveraging encoded emails and a novel password form pattern method. The proposed OpenID-based encrypted Email’s Authentication, Authorization, and Accounting (EAAA) protocol ensure security by relying… More >

  • Open Access

    ARTICLE

    An Ensemble-Based Hotel Reviews System Using Naive Bayes Classifier

    Joseph Bamidele Awotunde1, Sanjay Misra2,*, Vikash Katta2, Oluwafemi Charles Adebayo1

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 131-154, 2023, DOI:10.32604/cmes.2023.026812 - 23 April 2023

    Abstract The task of classifying opinions conveyed in any form of text online is referred to as sentiment analysis. The emergence of social media usage and its spread has given room for sentiment analysis in our daily lives. Social media applications and websites have become the foremost spring of data recycled for reviews for sentimentality in various fields. Various subject matter can be encountered on social media platforms, such as movie product reviews, consumer opinions, and testimonies, among others, which can be used for sentiment analysis. The rapid uncovering of these web contents contains divergence of… More >

  • Open Access

    ARTICLE

    Bayesian Deep Learning Enabled Sentiment Analysis on Web Intelligence Applications

    Abeer D. Algarni*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3399-3412, 2023, DOI:10.32604/cmc.2023.026687 - 31 March 2023

    Abstract In recent times, web intelligence (WI) has become a hot research topic, which utilizes Artificial Intelligence (AI) and advanced information technologies on the Web and Internet. The users post reviews on social media and are employed for sentiment analysis (SA), which acts as feedback to business people and government. Proper SA on the reviews helps to enhance the quality of the services and products, however, web intelligence techniques are needed to raise the company profit and user fulfillment. With this motivation, this article introduces a new modified pigeon inspired optimization based feature selection (MPIO-FS) with… More >

  • Open Access

    ARTICLE

    A Proposed Architecture for Local-Host and AWS with Multiagent System

    Jaspreet Chawla1,*, Anil Kr Ahlawat2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2787-2802, 2023, DOI:10.32604/iasc.2023.034775 - 15 March 2023

    Abstract Cloud computing has become one of the leading technologies in the world today. The benefits of cloud computing affect end users directly. There are several cloud computing frameworks, and each has ways of monitoring and providing resources. Cloud computing eliminates customer requirements such as expensive system configuration and massive infrastructure while improving dependability and scalability. From the user’s perspective, cloud computing makes it easy to upload multiagents and operate on different web services. In this paper, the authors used a restful web service and an agent system to discuss, deployments, and analysis of load performance… More >

  • Open Access

    ARTICLE

    Hybridizing Artificial Bee Colony with Bat Algorithm for Web Service Composition

    Tariq Ahamed Ahanger1,*, Fadl Dahan2,3, Usman Tariq1

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2429-2445, 2023, DOI:10.32604/csse.2023.037692 - 09 February 2023

    Abstract In the Internet of Things (IoT), the users have complex needs, and the Web Service Composition (WSC) was introduced to address these needs. The WSC’s main objective is to search for the optimal combination of web services in response to the user needs and the level of Quality of Services (QoS) constraints. The challenge of this problem is the huge number of web services that achieve similar functionality with different levels of QoS constraints. In this paper, we introduce an extension of our previous works on the Artificial Bee Colony (ABC) and Bat Algorithm (BA).… More >

Displaying 21-30 on page 3 of 136. Per Page