Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,097)
  • Open Access

    ARTICLE

    Rapid Parameter-Optimizing Strategy for Plug-and-Play Devices in DC Distribution Systems under the Background of Digital Transformation

    Zhi Li1, Yufei Zhao2, Yueming Ji2, Hanwen Gu2, Zaibin Jiao2,*

    Energy Engineering, Vol.121, No.12, pp. 3899-3927, 2024, DOI:10.32604/ee.2024.055899 - 22 November 2024

    Abstract By integrating advanced digital technologies such as cloud computing and the Internet of Things in sensor measurement, information communication, and other fields, the digital DC distribution network can efficiently and reliably access Distributed Generator (DG) and Energy Storage Systems (ESS), exhibiting significant advantages in terms of controllability and meeting requirements of Plug-and-Play (PnP) operations. However, during device plug-in and -out processes, improper system parameters may lead to small-signal stability issues. Therefore, before executing PnP operations, conducting stability analysis and adjusting parameters swiftly is crucial. This study introduces a four-stage strategy for parameter optimization to enhance… More >

  • Open Access

    REVIEW

    Software Reliability Prediction Using Ensemble Learning on Selected Features in Imbalanced and Balanced Datasets: A Review

    Suneel Kumar Rath1, Madhusmita Sahu1, Shom Prasad Das2, Junali Jasmine Jena3, Chitralekha Jena4, Baseem Khan5,6,7,*, Ahmed Ali7, Pitshou Bokoro7

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1513-1536, 2024, DOI:10.32604/csse.2024.057067 - 22 November 2024

    Abstract Redundancy, correlation, feature irrelevance, and missing samples are just a few problems that make it difficult to analyze software defect data. Additionally, it might be challenging to maintain an even distribution of data relating to both defective and non-defective software. The latter software class’s data are predominately present in the dataset in the majority of experimental situations. The objective of this review study is to demonstrate the effectiveness of combining ensemble learning and feature selection in improving the performance of defect classification. Besides the successful feature selection approach, a novel variant of the ensemble learning… More >

  • Open Access

    ARTICLE

    Software Cost Estimation Using Social Group Optimization

    Sagiraju Srinadhraju*, Samaresh Mishra, Suresh Chandra Satapathy

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1641-1668, 2024, DOI:10.32604/csse.2024.055612 - 22 November 2024

    Abstract This paper introduces the integration of the Social Group Optimization (SGO) algorithm to enhance the accuracy of software cost estimation using the Constructive Cost Model (COCOMO). COCOMO’s fixed coefficients often limit its adaptability, as they don’t account for variations across organizations. By fine-tuning these parameters with SGO, we aim to improve estimation accuracy. We train and validate our SGO-enhanced model using historical project data, evaluating its performance with metrics like the mean magnitude of relative error (MMRE) and Manhattan distance (MD). Experimental results show that SGO optimization significantly improves the predictive accuracy of software cost More >

  • Open Access

    ARTICLE

    Improving Badminton Action Recognition Using Spatio-Temporal Analysis and a Weighted Ensemble Learning Model

    Farida Asriani1,2, Azhari Azhari1,*, Wahyono Wahyono1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3079-3096, 2024, DOI:10.32604/cmc.2024.058193 - 18 November 2024

    Abstract Incredible progress has been made in human action recognition (HAR), significantly impacting computer vision applications in sports analytics. However, identifying dynamic and complex movements in sports like badminton remains challenging due to the need for precise recognition accuracy and better management of complex motion patterns. Deep learning techniques like convolutional neural networks (CNNs), long short-term memory (LSTM), and graph convolutional networks (GCNs) improve recognition in large datasets, while the traditional machine learning methods like SVM (support vector machines), RF (random forest), and LR (logistic regression), combined with handcrafted features and ensemble approaches, perform well but… More >

  • Open Access

    ARTICLE

    Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking

    Hira Akhtar Butt1, Khoula Said Al Harthy2, Mumtaz Ali Shah3, Mudassar Hussain2,*, Rashid Amin4,*, Mujeeb Ur Rehman1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3003-3031, 2024, DOI:10.32604/cmc.2024.057185 - 18 November 2024

    Abstract Detecting sophisticated cyberattacks, mainly Distributed Denial of Service (DDoS) attacks, with unexpected patterns remains challenging in modern networks. Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking (SDN) environments. While Machine Learning (ML) models can distinguish between benign and malicious traffic, their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining. In this paper, we propose a novel DDoS detection framework that combines Machine Learning (ML) and Ensemble Learning (EL) techniques to improve DDoS attack detection and mitigation in SDN environments. Our model… More >

  • Open Access

    ARTICLE

    How Software Engineering Transforms Organizations: An Open and Qualitative Study on the Organizational Objectives and Motivations in Agile Transformations

    Alonso Alvarez, Borja Bordel Sánchez*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2935-2966, 2024, DOI:10.32604/cmc.2024.056990 - 18 November 2024

    Abstract Agile Transformations are challenging processes for organizations that look to extend the benefits of Agile philosophy and methods beyond software engineering. Despite the impact of these transformations on organizations, they have not been extensively studied in academia. We conducted a study grounded in workshops and interviews with 99 participants from 30 organizations, including organizations undergoing transformations (“final organizations”) and companies supporting these processes (“consultants”). The study aims to understand the motivations, objectives, and factors driving and challenging these transformations. Over 700 responses were collected to the question and categorized into 32 objectives. The findings show More >

  • Open Access

    ARTICLE

    Improved Double Deep Q Network Algorithm Based on Average Q-Value Estimation and Reward Redistribution for Robot Path Planning

    Yameng Yin1, Lieping Zhang2,*, Xiaoxu Shi1, Yilin Wang3, Jiansheng Peng4, Jianchu Zou4

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2769-2790, 2024, DOI:10.32604/cmc.2024.056791 - 18 November 2024

    Abstract By integrating deep neural networks with reinforcement learning, the Double Deep Q Network (DDQN) algorithm overcomes the limitations of Q-learning in handling continuous spaces and is widely applied in the path planning of mobile robots. However, the traditional DDQN algorithm suffers from sparse rewards and inefficient utilization of high-quality data. Targeting those problems, an improved DDQN algorithm based on average Q-value estimation and reward redistribution was proposed. First, to enhance the precision of the target Q-value, the average of multiple previously learned Q-values from the target Q network is used to replace the single Q-value… More >

  • Open Access

    ARTICLE

    DAUNet: Detail-Aware U-Shaped Network for 2D Human Pose Estimation

    Xi Li1,2, Yuxin Li2, Zhenhua Xiao3,*, Zhenghua Huang1, Lianying Zou1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3325-3349, 2024, DOI:10.32604/cmc.2024.056464 - 18 November 2024

    Abstract Human pose estimation is a critical research area in the field of computer vision, playing a significant role in applications such as human-computer interaction, behavior analysis, and action recognition. In this paper, we propose a U-shaped keypoint detection network (DAUNet) based on an improved ResNet subsampling structure and spatial grouping mechanism. This network addresses key challenges in traditional methods, such as information loss, large network redundancy, and insufficient sensitivity to low-resolution features. DAUNet is composed of three main components. First, we introduce an improved BottleNeck block that employs partial convolution and strip pooling to reduce… More >

  • Open Access

    ARTICLE

    Position-Aware and Subgraph Enhanced Dynamic Graph Contrastive Learning on Discrete-Time Dynamic Graph

    Jian Feng*, Tian Liu, Cailing Du

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2895-2909, 2024, DOI:10.32604/cmc.2024.056434 - 18 November 2024

    Abstract Unsupervised learning methods such as graph contrastive learning have been used for dynamic graph representation learning to eliminate the dependence of labels. However, existing studies neglect positional information when learning discrete snapshots, resulting in insufficient network topology learning. At the same time, due to the lack of appropriate data augmentation methods, it is difficult to capture the evolving patterns of the network effectively. To address the above problems, a position-aware and subgraph enhanced dynamic graph contrastive learning method is proposed for discrete-time dynamic graphs. Firstly, the global snapshot is built based on the historical snapshots… More >

  • Open Access

    ARTICLE

    Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network

    Deema Alsekait1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2395-2436, 2024, DOI:10.32604/cmc.2024.055469 - 18 November 2024

    Abstract The widespread adoption of Internet of Things (IoT) devices has resulted in notable progress in different fields, improving operational effectiveness while also raising concerns about privacy due to their vulnerability to virus attacks. Further, the study suggests using an advanced approach that utilizes machine learning, specifically the Wide Residual Network (WRN), to identify hidden malware in IoT systems. The research intends to improve privacy protection by accurately identifying malicious software that undermines the security of IoT devices, using the MalMemAnalysis dataset. Moreover, thorough experimentation provides evidence for the effectiveness of the WRN-based strategy, resulting in… More >

Displaying 1-10 on page 1 of 1097. Per Page