Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21)
  • Open Access

    ARTICLE

    Building Regulatory Confidence with Human-in-the-Loop AI in Paperless GMP Validation

    Manaliben Amin*

    Journal on Artificial Intelligence, Vol.8, pp. 1-18, 2026, DOI:10.32604/jai.2026.073895 - 07 January 2026

    Abstract Artificial intelligence (AI) is steadily making its way into pharmaceutical validation, where it promises faster documentation, smarter testing strategies, and better handling of deviations. These gains are attractive, but in a regulated environment speed is never enough. Regulators want assurance that every system is reliable, that decisions are explainable, and that human accountability remains central. This paper sets out a Human-in-the-Loop (HITL) AI approach for Computer System Validation (CSV) and Computer Software Assurance (CSA). It relies on explainable AI (XAI) tools but keeps structured human review in place, so automation can be used without creating… More >

  • Open Access

    REVIEW

    Next-Generation Lightweight Explainable AI for Cybersecurity: A Review on Transparency and Real-Time Threat Mitigation

    Khulud Salem Alshudukhi1,*, Sijjad Ali2, Mamoona Humayun3,*, Omar Alruwaili4

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.3, pp. 3029-3085, 2025, DOI:10.32604/cmes.2025.073705 - 23 December 2025

    Abstract Problem: The integration of Artificial Intelligence (AI) into cybersecurity, while enhancing threat detection, is hampered by the “black box” nature of complex models, eroding trust, accountability, and regulatory compliance. Explainable AI (XAI) aims to resolve this opacity but introduces a critical new vulnerability: the adversarial exploitation of model explanations themselves. Gap: Current research lacks a comprehensive synthesis of this dual role of XAI in cybersecurity—as both a tool for transparency and a potential attack vector. There is a pressing need to systematically analyze the trade-offs between interpretability and security, evaluate defense mechanisms, and outline a… More >

  • Open Access

    ARTICLE

    Evaluating the Level of Compliance with the Nigeria Data Protection Regulation (NDPR): Insights from Organizations across Key Sectors

    Asere Gbenga Femi1,*, Monday Osagie Adenomon1, Gilbert Imuetinyan Osaze Aimufua1, Umar Ibrahim2

    Journal of Cyber Security, Vol.7, pp. 377-394, 2025, DOI:10.32604/jcs.2025.069185 - 30 September 2025

    Abstract Effective data protection frameworks are vital for safeguarding personal information, fostering digital trust, and ensuring alignment with global standards. In Nigeria, the Nigeria Data Protection Regulation (NDPR), administered by the National Information Technology Development Agency (NITDA), constitutes the nation’s primary privacy framework, harmonized with principles of the European Union’s GDPR. This study evaluates NDPR compliance across six strategic sectors; finance, telecommunications, education, health, Small and Medium-sized Enterprises (SMEs), and the public sector using a mixed-methods design. Data from 615 respondents in 30 organizations were collected through surveys, interviews, and document analysis. Findings reveal notable sectoral… More >

  • Open Access

    ARTICLE

    Enhancing AI System Privacy: An Automatic Tool for Achieving GDPR Compliance in NoSQL Databases

    Yifei Zhao, Zhaohui Li, Siyi Lv*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 217-234, 2024, DOI:10.32604/cmc.2024.052310 - 18 July 2024

    Abstract The EU’s Artificial Intelligence Act (AI Act) imposes requirements for the privacy compliance of AI systems. AI systems must comply with privacy laws such as the GDPR when providing services. These laws provide users with the right to issue a Data Subject Access Request (DSAR). Responding to such requests requires database administrators to identify information related to an individual accurately. However, manual compliance poses significant challenges and is error-prone. Database administrators need to write queries through time-consuming labor. The demand for large amounts of data by AI systems has driven the development of NoSQL databases.… More >

  • Open Access

    ARTICLE

    2D Minimum Compliance Topology Optimization Based on a Region Partitioning Strategy

    Chong Wang1, Tongxing Zuo1,2, Haitao Han1,2, Qianglong Wang1,2, Han Zhang1, Zhenyu Liu1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 655-683, 2023, DOI:10.32604/cmes.2023.025153 - 05 January 2023

    Abstract This paper presents an extended sequential element rejection and admission (SERA) topology optimization method with a region partitioning strategy. Based on the partitioning of a design domain into solid regions and weak regions, the proposed optimization method sequentially implements finite element analysis (FEA) in these regions. After standard FEA in the solid regions, the boundary displacement of the weak regions is constrained using the numerical solution of the solid regions as Dirichlet boundary conditions. This treatment can alleviate the negative effect of the material interpolation model of the topology optimization method in the weak regions, More > Graphic Abstract

    2D Minimum Compliance Topology Optimization Based on a Region Partitioning Strategy

  • Open Access

    ARTICLE

    A Smooth Bidirectional Evolutionary Structural Optimization of Vibrational Structures for Natural Frequency and Dynamic Compliance

    Xiaoyan Teng1, Qiang Li1, Xudong Jiang2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.3, pp. 2479-2496, 2023, DOI:10.32604/cmes.2023.023110 - 23 November 2022

    Abstract A smooth bidirectional evolutionary structural optimization (SBESO), as a bidirectional version of SESO is proposed to solve the topological optimization of vibrating continuum structures for natural frequencies and dynamic compliance under the transient load. A weighted function is introduced to regulate the mass and stiffness matrix of an element, which has the inefficient element gradually removed from the design domain as if it were undergoing damage. Aiming at maximizing the natural frequency of a structure, the frequency optimization formulation is proposed using the SBESO technique. The effects of various weight functions including constant, linear and More >

  • Open Access

    ARTICLE

    Regulation Relatedness Map Creation Method with Latent Semantic Analysis

    Mehmet Murat Huyut1,*, Batuhan Kocaoğlu2, Ünzile Meram3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2093-2107, 2022, DOI:10.32604/cmc.2022.024190 - 24 February 2022

    Abstract Regulatory authorities create a lot of legislation that must be followed. These create complex compliance requirements and time-consuming processes to find regulatory non-compliance. While the regulations establish rules in the relevant areas, recommendations and best practices for compliance are not generally mentioned. Best practices are often used to find a solution to this problem. There are numerous governance, management, and security frameworks in Information Technology (IT) area to guide businesses to run their processes at a much more mature level. Best practice maps can used to map another best practice, and users can adapt themselves… More >

  • Open Access

    ARTICLE

    GDPR Compliance IoT Authentication Model for Smart Home Environment

    Hisham Raad Jafer Merzeh1,*, Mustafa Kara2, Muhammed Ali Aydın3, Hasan Hüseyin Balık1

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1953-1970, 2022, DOI:10.32604/iasc.2022.021297 - 09 October 2021

    Abstract The Internet of things (IoT) became quickly one of the most popular and most discussed topics in research. Studies paid attention to the Internet stuff, primarily to new products that aim to achieve greater efficiency and simplicity in life. IoT may cover several fields of the smart environment. Because of the data exposure that occurs when data is transferred via various channels, data protection issues have become a major problem as the company continues to expand. When user privacy and property are taken into consideration, the situation may become much worse. As a result, the… More >

  • Open Access

    ARTICLE

    Do patients with ureterolithiasis treated conservatively return to follow up?

    Jonathan Modai1, Noam Barda2, Yuval Avda1, Igal Shpunt1, Dan Leibovici1, Yaniv Shilo1

    Canadian Journal of Urology, Vol.28, No.1, pp. 10536-10541, 2021

    Abstract Introduction: Distal ureteral stones (DUS) are common in patients presenting to the emergency department (ED) with renal colic. The majority of DUS will pass spontaneously and therefore conservative care is common. Follow up is imperative as some of these stones might not pass and potentially lead to complications. The aim of our study was to evaluate the rate of compliance with follow up and to find predictive variables for it.
    Materials and methods: We retrospectively surveyed the medical records of all patients who had a non-contrast computed tomography (NCCT) at our ED between 01/03/16 and 31/5/17. We… More >

  • Open Access

    ARTICLE

    Thermoelastic Structural Topology Optimization Based on Moving Morphable Components Framework

    Jun Yan1,3, Qi Xu1, Zhirui Fan1, Zunyi Duan2,*, Hongze Du1, Dongling Geng1

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.3, pp. 1179-1196, 2021, DOI:10.32604/cmes.2021.016950 - 11 August 2021

    Abstract This study investigates structural topology optimization of thermoelastic structures considering two kinds of objectives of minimum structural compliance and elastic strain energy with a specified available volume constraint. To explicitly express the configuration evolution in the structural topology optimization under combination of mechanical and thermal load conditions, the moving morphable components (MMC) framework is adopted. Based on the characteristics of the MMC framework, the number of design variables can be reduced substantially. Corresponding optimization formulation in the MMC topology optimization framework and numerical solution procedures are developed for several numerical examples. Different optimization results are More >

Displaying 1-10 on page 1 of 21. Per Page