Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (124)
  • Open Access

    ARTICLE

    Process Monitoring and Terminal Verification of Cable-Stayed Bridges with Corrugated Steel Webs under Contruction

    Kexin Zhang, Xinyuan Shen, Longsheng Bao, He Liu*

    Structural Durability & Health Monitoring, Vol.17, No.2, pp. 131-158, 2023, DOI:10.32604/sdhm.2023.023431

    Abstract In this paper, the construction process of a cable-stayed bridge with corrugated steel webs was monitored. Moreover, the end performance of the bridge was verified by load test. Owing to the consideration of the bridge structure safety, it is necessary to monitor the main girder deflection, stress, construction error and safety state during construction. Furthermore, to verify whether the bridge can meet the design requirements, the static and dynamic load tests are carried out after the completion of the bridge. The results of construction monitoring show that the stress state of the structure during construction is basically consistent with the… More >

  • Open Access

    ARTICLE

    Assessing Secure OpenID-Based EAAA Protocol to Prevent MITM and Phishing Attacks in Web Apps

    Muhammad Bilal1,*, Sandile C. Shongwe2, Abid Bashir3, Yazeed Y. Ghadi4

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4713-4733, 2023, DOI:10.32604/cmc.2023.037071

    Abstract To secure web applications from Man-In-The-Middle (MITM) and phishing attacks is a challenging task nowadays. For this purpose, authentication protocol plays a vital role in web communication which securely transfers data from one party to another. This authentication works via OpenID, Kerberos, password authentication protocols, etc. However, there are still some limitations present in the reported security protocols. In this paper, the presented anticipated strategy secures both Web-based attacks by leveraging encoded emails and a novel password form pattern method. The proposed OpenID-based encrypted Email’s Authentication, Authorization, and Accounting (EAAA) protocol ensure security by relying on the email authenticity and… More >

  • Open Access

    ARTICLE

    An Ensemble-Based Hotel Reviews System Using Naive Bayes Classifier

    Joseph Bamidele Awotunde1, Sanjay Misra2,*, Vikash Katta2, Oluwafemi Charles Adebayo1

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 131-154, 2023, DOI:10.32604/cmes.2023.026812

    Abstract The task of classifying opinions conveyed in any form of text online is referred to as sentiment analysis. The emergence of social media usage and its spread has given room for sentiment analysis in our daily lives. Social media applications and websites have become the foremost spring of data recycled for reviews for sentimentality in various fields. Various subject matter can be encountered on social media platforms, such as movie product reviews, consumer opinions, and testimonies, among others, which can be used for sentiment analysis. The rapid uncovering of these web contents contains divergence of many benefits like profit-making, which… More >

  • Open Access

    ARTICLE

    Bayesian Deep Learning Enabled Sentiment Analysis on Web Intelligence Applications

    Abeer D. Algarni*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3399-3412, 2023, DOI:10.32604/cmc.2023.026687

    Abstract In recent times, web intelligence (WI) has become a hot research topic, which utilizes Artificial Intelligence (AI) and advanced information technologies on the Web and Internet. The users post reviews on social media and are employed for sentiment analysis (SA), which acts as feedback to business people and government. Proper SA on the reviews helps to enhance the quality of the services and products, however, web intelligence techniques are needed to raise the company profit and user fulfillment. With this motivation, this article introduces a new modified pigeon inspired optimization based feature selection (MPIO-FS) with Bayesian deep learning (BDL), named… More >

  • Open Access

    ARTICLE

    A Proposed Architecture for Local-Host and AWS with Multiagent System

    Jaspreet Chawla1,*, Anil Kr Ahlawat2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2787-2802, 2023, DOI:10.32604/iasc.2023.034775

    Abstract Cloud computing has become one of the leading technologies in the world today. The benefits of cloud computing affect end users directly. There are several cloud computing frameworks, and each has ways of monitoring and providing resources. Cloud computing eliminates customer requirements such as expensive system configuration and massive infrastructure while improving dependability and scalability. From the user’s perspective, cloud computing makes it easy to upload multiagents and operate on different web services. In this paper, the authors used a restful web service and an agent system to discuss, deployments, and analysis of load performance parameters like memory use, central… More >

  • Open Access

    ARTICLE

    Hybridizing Artificial Bee Colony with Bat Algorithm for Web Service Composition

    Tariq Ahamed Ahanger1,*, Fadl Dahan2,3, Usman Tariq1

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2429-2445, 2023, DOI:10.32604/csse.2023.037692

    Abstract In the Internet of Things (IoT), the users have complex needs, and the Web Service Composition (WSC) was introduced to address these needs. The WSC’s main objective is to search for the optimal combination of web services in response to the user needs and the level of Quality of Services (QoS) constraints. The challenge of this problem is the huge number of web services that achieve similar functionality with different levels of QoS constraints. In this paper, we introduce an extension of our previous works on the Artificial Bee Colony (ABC) and Bat Algorithm (BA). A new hybrid algorithm was… More >

  • Open Access

    ARTICLE

    Portable and Efficient Implementation of CRYSTALS-Kyber Based on WebAssembly

    Seog Chung Seo1, HeeSeok Kim2,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2091-2107, 2023, DOI:10.32604/csse.2023.035064

    Abstract With the rapid development of quantum computers capable of realizing Shor’s algorithm, existing public key-based algorithms face a significant security risk. Crystals-Kyber has been selected as the only key encapsulation mechanism (KEM) algorithm in the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) competition. In this study, we present a portable and efficient implementation of a Crystals-Kyber post-quantum KEM based on WebAssembly (Wasm), a recently released portable execution framework for high-performance web applications. Until now, most Kyber implementations have been developed with native programming languages such as C and Assembly. Although there are a few previous Kyber implementations… More >

  • Open Access

    ARTICLE

    Self-Tuning Parameters for Decision Tree Algorithm Based on Big Data Analytics

    Manar Mohamed Hafez1,*, Essam Eldin F. Elfakharany1, Amr A. Abohany2, Mostafa Thabet3

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 943-958, 2023, DOI:10.32604/cmc.2023.034078

    Abstract Big data is usually unstructured, and many applications require the analysis in real-time. Decision tree (DT) algorithm is widely used to analyze big data. Selecting the optimal depth of DT is time-consuming process as it requires many iterations. In this paper, we have designed a modified version of a (DT). The tree aims to achieve optimal depth by self-tuning running parameters and improving the accuracy. The efficiency of the modified (DT) was verified using two datasets (airport and fire datasets). The airport dataset has 500000 instances and the fire dataset has 600000 instances. A comparison has been made between the… More >

  • Open Access

    ARTICLE

    JShellDetector: A Java Fileless Webshell Detector Based on Program Analysis

    Xuyan Song, Yiting Qin, Xinyao Liu, Baojiang Cui*, Junsong Fu

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2061-2078, 2023, DOI:10.32604/cmc.2023.034505

    Abstract Fileless webshell attacks against Java web applications have become more frequent in recent years as Java has gained market share. Webshell is a malicious script that can remotely execute commands and invade servers. It is widely used in attacks against web applications. In contrast to traditional file-based webshells, fileless webshells leave no traces on the hard drive, which means they are invisible to most antivirus software. To make matters worse, although there are some studies on fileless webshells, almost all of them are aimed at web applications developed in the PHP language. The complex mechanism of Java makes researchers face… More >

  • Open Access

    ARTICLE

    Measuring Reliability of A Web Portal Based on Testing Profile

    Malik Muhammad Ali Shahid1, Shahida Sulaiman2, Mohammed Al-Sarem3,4, Aqeel Ur Rahman1, Salman Iqbal1, Rab Nawaz Bashir1, Arfat Ahmad Khan5,6, Momen M. Alrawi7, Rashiq R. Marie8, Settawit Poochaya5,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6641-6663, 2023, DOI:10.32604/cmc.2023.031459

    Abstract

    Conventionally, the reliability of a web portal is validated with generalized conventional methods, but they fail to provide the desired results. Therefore, we need to include other quality factors that affect reliability such as usability for improving the reliability in addition to the conventional reliability testing. Actually, the primary objectives of web portals are to provide interactive integration of multiple functions confirming diverse requirements in an efficient way. In this paper, we employ testing profiles to measure the reliability through software operational profile, input space profile and usability profile along with qualitative measures of reliability and usability. Moreover, the case… More >

Displaying 21-30 on page 3 of 124. Per Page