Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (294)
  • Open Access

    ARTICLE

    An Optimized Customer Churn Prediction Approach Based on Regularized Bidirectional Long Short-Term Memory Model

    Adel Saad Assiri1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.069826 - 10 November 2025

    Abstract Customer churn is the rate at which customers discontinue doing business with a company over a given time period. It is an essential measure for businesses to monitor high churn rates, as they often indicate underlying issues with services, products, or customer experience, resulting in considerable income loss. Prediction of customer churn is a crucial task aimed at retaining customers and maintaining revenue growth. Traditional machine learning (ML) models often struggle to capture complex temporal dependencies in client behavior data. To address this, an optimized deep learning (DL) approach using a Regularized Bidirectional Long Short-Term… More >

  • Open Access

    ARTICLE

    A Transformer-Based Deep Learning Framework with Semantic Encoding and Syntax-Aware LSTM for Fake Electronic News Detection

    Hamza Murad Khan1, Shakila Basheer2, Mohammad Tabrez Quasim3, Raja`a Al-Naimi4, Vijaykumar Varadarajan5, Anwar Khan1,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.069327 - 10 November 2025

    Abstract With the increasing growth of online news, fake electronic news detection has become one of the most important paradigms of modern research. Traditional electronic news detection techniques are generally based on contextual understanding, sequential dependencies, and/or data imbalance. This makes distinction between genuine and fabricated news a challenging task. To address this problem, we propose a novel hybrid architecture, T5-SA-LSTM, which synergistically integrates the T5 Transformer for semantically rich contextual embedding with the Self-Attention-enhanced (SA) Long Short-Term Memory (LSTM). The LSTM is trained using the Adam optimizer, which provides faster and more stable convergence compared… More >

  • Open Access

    ARTICLE

    Intrusion Detection and Security Attacks Mitigation in Smart Cities with Integration of Human-Computer Interaction

    Abeer Alnuaim*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-33, 2026, DOI:10.32604/cmc.2025.069110 - 10 November 2025

    Abstract The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats. In the evolving landscape of cybersecurity, the efficacy of Intrusion Detection Systems (IDS) is increasingly measured by technical performance, operational usability, and adaptability. This study introduces and rigorously evaluates a Human-Computer Interaction (HCI)-Integrated IDS with the utilization of Convolutional Neural Network (CNN), CNN-Long Short Term Memory (LSTM), and Random Forest (RF) against both a Baseline Machine Learning (ML) and a Traditional IDS model, through an extensive experimental framework encompassing many performance metrics, including detection latency, accuracy, alert prioritization, classification… More >

  • Open Access

    ARTICLE

    A Dual-Attention CNN-BiLSTM Model for Network Intrusion Detection

    Zheng Zhang1,2, Jie Hao2, Liquan Chen1,*, Tianhao Hou2, Yanan Liu2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-22, 2026, DOI:10.32604/cmc.2025.068372 - 10 November 2025

    Abstract With the increasing severity of network security threats, Network Intrusion Detection (NID) has become a key technology to ensure network security. To address the problem of low detection rate of traditional intrusion detection models, this paper proposes a Dual-Attention model for NID, which combines Convolutional Neural Network (CNN) and Bidirectional Long Short-Term Memory (BiLSTM) to design two modules: the FocusConV and the TempoNet module. The FocusConV module, which automatically adjusts and weights CNN extracted local features, focuses on local features that are more important for intrusion detection. The TempoNet module focuses on global information, identifies… More >

  • Open Access

    ARTICLE

    Comparison of Objective Forecasting Method Fit with Electrical Consumption Characteristics in Timor-Leste

    Ricardo Dominico Da Silva1,2, Jangkung Raharjo1,3,*, Sudarmono Sasmono1,3

    Energy Engineering, Vol.122, No.12, pp. 5073-5090, 2025, DOI:10.32604/ee.2025.071545 - 27 November 2025

    Abstract The rapid development of technology has led to an ever-increasing demand for electrical energy. In the context of Timor-Leste, which still relies on fossil energy sources with high operational costs and significant environmental impacts, electricity load forecasting is a strategic measure to support the energy transition towards the Net Zero Emission (NZE) target by 2050. This study aims to utilize historical electricity load data for the period 2013–2024, as well as data on external factors affecting electricity consumption, to forecast electricity load in Timor-Leste in the next 10 years (2025–2035). The forecasting results are expected… More >

  • Open Access

    ARTICLE

    Quantum Genetic Algorithm Based Ensemble Learning for Detection of Atrial Fibrillation Using ECG Signals

    Yazeed Alkhrijah1, Marwa Fahim2, Syed Muhammad Usman3, Qasim Mehmood3, Shehzad Khalid4,5,*, Mohamad A. Alawad1, Haya Aldossary6

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2339-2355, 2025, DOI:10.32604/cmes.2025.071512 - 26 November 2025

    Abstract Atrial Fibrillation (AF) is a cardiac disorder characterized by irregular heart rhythms, typically diagnosed using Electrocardiogram (ECG) signals. In remote regions with limited healthcare personnel, automated AF detection is extremely important. Although recent studies have explored various machine learning and deep learning approaches, challenges such as signal noise and subtle variations between AF and other cardiac rhythms continue to hinder accurate classification. In this study, we propose a novel framework that integrates robust preprocessing, comprehensive feature extraction, and an ensemble classification strategy. In the first step, ECG signals are divided into equal-sized segments using a… More >

  • Open Access

    ARTICLE

    Why Transformers Outperform LSTMs: A Comparative Study on Sarcasm Detection

    Palak Bari, Gurnur Bedi, Khushi Joshi, Anupama Jawale*

    Journal on Artificial Intelligence, Vol.7, pp. 499-508, 2025, DOI:10.32604/jai.2025.072531 - 17 November 2025

    Abstract This study investigates sarcasm detection in text using a dataset of 8095 sentences compiled from MUStARD and HuggingFace repositories, balanced across sarcastic and non-sarcastic classes. A sequential baseline model (LSTM) is compared with transformer-based models (RoBERTa and XLNet), integrated with attention mechanisms. Transformers were chosen for their proven ability to capture long-range contextual dependencies, whereas LSTM serves as a traditional benchmark for sequential modeling. Experimental results show that RoBERTa achieves 0.87 accuracy, XLNet 0.83, and LSTM 0.52. These findings confirm that transformer architectures significantly outperform recurrent models in sarcasm detection. Future work will incorporate multimodal More >

  • Open Access

    ARTICLE

    Efficient Malicious QR Code Detection System Using an Advanced Deep Learning Approach

    Abdulaziz A. Alsulami1, Qasem Abu Al-Haija2,*, Badraddin Alturki3, Ayman Yafoz1, Ali Alqahtani4, Raed Alsini1, Sami Saeed Binyamin5

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 1117-1140, 2025, DOI:10.32604/cmes.2025.070745 - 30 October 2025

    Abstract QR codes are widely used in applications such as information sharing, advertising, and digital payments. However, their growing adoption has made them attractive targets for malicious activities, including malware distribution and phishing attacks. Traditional detection approaches rely on URL analysis or image-based feature extraction, which may introduce significant computational overhead and limit real-time applicability, and their performance often depends on the quality of extracted features. Previous studies in malicious detection do not fully focus on QR code security when combining convolutional neural networks (CNNs) with recurrent neural networks (RNNs). This research proposes a deep learning… More >

  • Open Access

    ARTICLE

    Grid-Supplied Load Prediction under Extreme Weather Conditions Based on CNN-BiLSTM-Attention Model with Transfer Learning

    Qingliang Wang1, Chengkai Liu1, Zhaohui Zhou1, Ye Han1, Luebin Fang2, Moxuan Zhao3, Xiao Cao3,*

    Energy Engineering, Vol.122, No.11, pp. 4715-4732, 2025, DOI:10.32604/ee.2025.068105 - 27 October 2025

    Abstract Grid-supplied load is the traditional load minus new energy generation, so grid-supplied load forecasting is challenged by uncertainties associated with the total energy demand and the energy generated off-grid. In addition, with the expansion of the power system and the increase in the frequency of extreme weather events, the difficulty of grid-supplied load forecasting is further exacerbated. Traditional statistical methods struggle to capture the dynamic characteristics of grid-supplied load, especially under extreme weather conditions. This paper proposes a novel grid-supplied load prediction model based on Convolutional Neural Network-Bidirectional LSTM-Attention mechanism (CNN-BiLSTM-Attention). The model utilizes transfer… More >

  • Open Access

    ARTICLE

    Short-Term Wind Power Prediction Based on Optimized VMD and LSTM

    Xinjian Li1, Yu Zhang1,2,*, Zewen Wang1, Zhenyun Song1

    Energy Engineering, Vol.122, No.11, pp. 4603-4619, 2025, DOI:10.32604/ee.2025.065799 - 27 October 2025

    Abstract Power prediction has been critical in large-scale wind power grid connections. However, traditional wind power prediction methods have long suffered from problems, for instance low prediction accuracy and poor reliability. For this purpose, a hybrid prediction model (VMD-LSTM-Attention) has been proposed, which integrates the variational modal decomposition (VMD), the long short-term memory (LSTM), and the attention mechanism (Attention), and has been optimized by improved dung beetle optimization algorithm (IDBO). Firstly, the algorithm’s performance has been significantly enhanced through the implementation of three key strategies, namely the elite group strategy of the Logistic-Tent map, the nonlinear… More >

Displaying 1-10 on page 1 of 294. Per Page