Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (60)
  • Open Access

    ARTICLE

    Seasonal Short-Term Load Forecasting for Power Systems Based on Modal Decomposition and Feature-Fusion Multi-Algorithm Hybrid Neural Network Model

    Jiachang Liu1,*, Zhengwei Huang2, Junfeng Xiang1, Lu Liu1, Manlin Hu1

    Energy Engineering, Vol.121, No.11, pp. 3461-3486, 2024, DOI:10.32604/ee.2024.054514 - 21 October 2024

    Abstract To enhance the refinement of load decomposition in power systems and fully leverage seasonal change information to further improve prediction performance, this paper proposes a seasonal short-term load combination prediction model based on modal decomposition and a feature-fusion multi-algorithm hybrid neural network model. Specifically, the characteristics of load components are analyzed for different seasons, and the corresponding models are established. First, the improved complete ensemble empirical modal decomposition with adaptive noise (ICEEMDAN) method is employed to decompose the system load for all four seasons, and the new sequence is obtained through reconstruction based on the… More >

  • Open Access

    ARTICLE

    DeepBio: A Deep CNN and Bi-LSTM Learning for Person Identification Using Ear Biometrics

    Anshul Mahajan*, Sunil K. Singla

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1623-1649, 2024, DOI:10.32604/cmes.2024.054468 - 27 September 2024

    Abstract The identification of individuals through ear images is a prominent area of study in the biometric sector. Facial recognition systems have faced challenges during the COVID-19 pandemic due to mask-wearing, prompting the exploration of supplementary biometric measures such as ear biometrics. The research proposes a Deep Learning (DL) framework, termed DeepBio, using ear biometrics for human identification. It employs two DL models and five datasets, including IIT Delhi (IITD-I and IITD-II), annotated web images (AWI), mathematical analysis of images (AMI), and EARVN1. Data augmentation techniques such as flipping, translation, and Gaussian noise are applied to More >

  • Open Access

    ARTICLE

    Enhancing Arabic Cyberbullying Detection with End-to-End Transformer Model

    Mohamed A. Mahdi1, Suliman Mohamed Fati2,*, Mohamed A.G. Hazber1, Shahanawaj Ahamad3, Sawsan A. Saad4

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1651-1671, 2024, DOI:10.32604/cmes.2024.052291 - 27 September 2024

    Abstract Cyberbullying, a critical concern for digital safety, necessitates effective linguistic analysis tools that can navigate the complexities of language use in online spaces. To tackle this challenge, our study introduces a new approach employing Bidirectional Encoder Representations from the Transformers (BERT) base model (cased), originally pretrained in English. This model is uniquely adapted to recognize the intricate nuances of Arabic online communication, a key aspect often overlooked in conventional cyberbullying detection methods. Our model is an end-to-end solution that has been fine-tuned on a diverse dataset of Arabic social media (SM) tweets showing a notable… More >

  • Open Access

    ARTICLE

    Integrating Transformer and Bidirectional Long Short-Term Memory for Intelligent Breast Cancer Detection from Histopathology Biopsy Images

    Prasanalakshmi Balaji1,*, Omar Alqahtani1, Sangita Babu2, Mousmi Ajay Chaurasia3, Shanmugapriya Prakasam4

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 443-458, 2024, DOI:10.32604/cmes.2024.053158 - 20 August 2024

    Abstract Breast cancer is a significant threat to the global population, affecting not only women but also a threat to the entire population. With recent advancements in digital pathology, Eosin and hematoxylin images provide enhanced clarity in examining microscopic features of breast tissues based on their staining properties. Early cancer detection facilitates the quickening of the therapeutic process, thereby increasing survival rates. The analysis made by medical professionals, especially pathologists, is time-consuming and challenging, and there arises a need for automated breast cancer detection systems. The upcoming artificial intelligence platforms, especially deep learning models, play an More >

  • Open Access

    ARTICLE

    Enhanced Topic-Aware Summarization Using Statistical Graph Neural Networks

    Ayesha Khaliq1, Salman Afsar Awan1, Fahad Ahmad2,*, Muhammad Azam Zia1, Muhammad Zafar Iqbal3

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3221-3242, 2024, DOI:10.32604/cmc.2024.053488 - 15 August 2024

    Abstract The rapid expansion of online content and big data has precipitated an urgent need for efficient summarization techniques to swiftly comprehend vast textual documents without compromising their original integrity. Current approaches in Extractive Text Summarization (ETS) leverage the modeling of inter-sentence relationships, a task of paramount importance in producing coherent summaries. This study introduces an innovative model that integrates Graph Attention Networks (GATs) with Transformer-based Bidirectional Encoder Representations from Transformers (BERT) and Latent Dirichlet Allocation (LDA), further enhanced by Term Frequency-Inverse Document Frequency (TF-IDF) values, to improve sentence selection by capturing comprehensive topical information. Our… More >

  • Open Access

    ARTICLE

    ED-Ged: Nighttime Image Semantic Segmentation Based on Enhanced Detail and Bidirectional Guidance

    Xiaoli Yuan, Jianxun Zhang*, Xuejie Wang, Zhuhong Chu

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2443-2462, 2024, DOI:10.32604/cmc.2024.052285 - 15 August 2024

    Abstract Semantic segmentation of driving scene images is crucial for autonomous driving. While deep learning technology has significantly improved daytime image semantic segmentation, nighttime images pose challenges due to factors like poor lighting and overexposure, making it difficult to recognize small objects. To address this, we propose an Image Adaptive Enhancement (IAEN) module comprising a parameter predictor (Edip), multiple image processing filters (Mdif), and a Detail Processing Module (DPM). Edip combines image processing filters to predict parameters like exposure and hue, optimizing image quality. We adopt a novel image encoder to enhance parameter prediction accuracy by More >

  • Open Access

    ARTICLE

    Research on Alliance Decision of Dual-Channel Remanufacturing Supply Chain Considering Bidirectional Free-Riding and Cost-Sharing

    Lina Dong, Yeming Dai*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2913-2956, 2024, DOI:10.32604/cmes.2024.049214 - 08 July 2024

    Abstract This study delves into the formation dynamics of alliances within a closed-loop supply chain (CLSC) that encompasses a manufacturer, a retailer, and an e-commerce platform. It leverages Stackelberg game for this exploration, contrasting the equilibrium outcomes of a non-alliance model with those of three differentiated alliance models. The non-alliance model acts as a crucial benchmark, enabling the evaluation of the motivations for various supply chain entities to engage in alliance formations. Our analysis is centered on identifying the most effective alliance strategies and establishing a coordination within these partnerships. We thoroughly investigate the consequences of… More >

  • Open Access

    ARTICLE

    Transient Analysis of a Reactor Coolant Pump Rotor Seizure Nuclear Accident

    Mengdong An1, Weiyuan Zhong1, Wei Xu2, Xiuli Wang1,*

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.6, pp. 1331-1349, 2024, DOI:10.32604/fdmp.2023.046604 - 27 June 2024

    Abstract The reactor coolant pump (RCP) rotor seizure accident is defined as a short-time seizure of the RCP rotor. This event typically leads to an abrupt flow decrease in the corresponding loop and an ensuing reactor and turbine trip. The significant reduction of core coolant flow while the reactor is being operated at full load can have very negative consequences. This potentially dangerous event is typically characterized by a complex transient behavior in terms of flow conditions and energy transformation, which need to be analyzed and understood. This study constructed transient flow and rotational speed mathematical More > Graphic Abstract

    Transient Analysis of a Reactor Coolant Pump Rotor Seizure Nuclear Accident

  • Open Access

    ARTICLE

    A New Industrial Intrusion Detection Method Based on CNN-BiLSTM

    Jun Wang, Changfu Si, Zhen Wang, Qiang Fu*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4297-4318, 2024, DOI:10.32604/cmc.2024.050223 - 20 June 2024

    Abstract Nowadays, with the rapid development of industrial Internet technology, on the one hand, advanced industrial control systems (ICS) have improved industrial production efficiency. However, there are more and more cyber-attacks targeting industrial control systems. To ensure the security of industrial networks, intrusion detection systems have been widely used in industrial control systems, and deep neural networks have always been an effective method for identifying cyber attacks. Current intrusion detection methods still suffer from low accuracy and a high false alarm rate. Therefore, it is important to build a more efficient intrusion detection model. This paper… More >

  • Open Access

    ARTICLE

    Leveraging User-Generated Comments and Fused BiLSTM Models to Detect and Predict Issues with Mobile Apps

    Wael M. S. Yafooz*, Abdullah Alsaeedi

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 735-759, 2024, DOI:10.32604/cmc.2024.048270 - 25 April 2024

    Abstract In the last decade, technical advancements and faster Internet speeds have also led to an increasing number of mobile devices and users. Thus, all contributors to society, whether young or old members, can use these mobile apps. The use of these apps eases our daily lives, and all customers who need any type of service can access it easily, comfortably, and efficiently through mobile apps. Particularly, Saudi Arabia greatly depends on digital services to assist people and visitors. Such mobile devices are used in organizing daily work schedules and services, particularly during two large occasions,… More >

Displaying 1-10 on page 1 of 60. Per Page