Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (28)
  • Open Access

    ARTICLE

    Building Regulatory Confidence with Human-in-the-Loop AI in Paperless GMP Validation

    Manaliben Amin*

    Journal on Artificial Intelligence, Vol.8, pp. 1-18, 2026, DOI:10.32604/jai.2026.073895 - 07 January 2026

    Abstract Artificial intelligence (AI) is steadily making its way into pharmaceutical validation, where it promises faster documentation, smarter testing strategies, and better handling of deviations. These gains are attractive, but in a regulated environment speed is never enough. Regulators want assurance that every system is reliable, that decisions are explainable, and that human accountability remains central. This paper sets out a Human-in-the-Loop (HITL) AI approach for Computer System Validation (CSV) and Computer Software Assurance (CSA). It relies on explainable AI (XAI) tools but keeps structured human review in place, so automation can be used without creating… More >

  • Open Access

    ARTICLE

    Impact of Building Materials for the Facade on Energy Consumption and Carbon Emissions (Case Study of Residential Buildings in Tehran)

    Amir Sina Darabi*, Mehdi Ravanshadnia

    Energy Engineering, Vol.122, No.9, pp. 3753-3792, 2025, DOI:10.32604/ee.2025.065241 - 26 August 2025

    Abstract Although currently, a large part of the existing buildings is considered inefficient in terms of energy, the ability to save energy consumption up to 80% has been proven in residential and commercial buildings. Also, carbon dioxide is one of the most important greenhouse gases contributing to climate change and is responsible for 60% of global warming. The facade of the building, as the main intermediary between the interior and exterior spaces, plays a significant role in adjusting the weather conditions and providing thermal comfort to the residents. In this research, 715 different scenarios were defined… More >

  • Open Access

    ARTICLE

    DRL-AMIR: Intelligent Flow Scheduling for Software-Defined Zero Trust Networks

    Wenlong Ke1,2,*, Zilong Li1, Peiyu Chen1, Benfeng Chen1, Jinglin Lv1, Qiang Wang2, Ziyi Jia2, Shigen Shen1

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3305-3319, 2025, DOI:10.32604/cmc.2025.065665 - 03 July 2025

    Abstract Zero Trust Network (ZTN) enhances network security through strict authentication and access control. However, in the ZTN, optimizing flow control to improve the quality of service is still facing challenges. Software Defined Network (SDN) provides solutions through centralized control and dynamic resource allocation, but the existing scheduling methods based on Deep Reinforcement Learning (DRL) are insufficient in terms of convergence speed and dynamic optimization capability. To solve these problems, this paper proposes DRL-AMIR, which is an efficient flow scheduling method for software defined ZTN. This method constructs a flow scheduling optimization model that comprehensively considers… More >

  • Open Access

    ARTICLE

    A Feature Selection Method for Software Defect Prediction Based on Improved Beluga Whale Optimization Algorithm

    Shaoming Qiu, Jingjie He, Yan Wang*, Bicong E

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4879-4898, 2025, DOI:10.32604/cmc.2025.061532 - 19 May 2025

    Abstract Software defect prediction (SDP) aims to find a reliable method to predict defects in specific software projects and help software engineers allocate limited resources to release high-quality software products. Software defect prediction can be effectively performed using traditional features, but there are some redundant or irrelevant features in them (the presence or absence of this feature has little effect on the prediction results). These problems can be solved using feature selection. However, existing feature selection methods have shortcomings such as insignificant dimensionality reduction effect and low classification accuracy of the selected optimal feature subset. In… More >

  • Open Access

    ARTICLE

    Optimization Configuration Analysis of Wind-Solar-Storage System Based on HOMER

    Daixuan Zhou1, Zhichao Wang1, Kaile Xi2, Chong Zuo3, Yan Jia2,*

    Energy Engineering, Vol.122, No.5, pp. 2119-2153, 2025, DOI:10.32604/ee.2025.061712 - 25 April 2025

    Abstract HOMER (Hybrid Optimization Model for Electric Renewables) is an effective simulation and optimization platform for hybrid renewable energy. By inputting specific users’ energy resource data (such as wind speed, solar radiation, etc.) and load data, and by determining the types and models of components selected by the user, HOMER calculates and simulates the operational status of each component at every time step. Ultimately, it computes the energy balance of the system within specified constraints to simulate the overall system operation. This approach enables the reasonable determination of system component capacities, the evaluation of system feasibility,… More > Graphic Abstract

    Optimization Configuration Analysis of Wind-Solar-Storage System Based on HOMER

  • Open Access

    ARTICLE

    A New Framework for Software Vulnerability Detection Based on an Advanced Computing

    Bui Van Cong1, Cho Do Xuan2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3699-3723, 2024, DOI:10.32604/cmc.2024.050019 - 20 June 2024

    Abstract The detection of software vulnerabilities written in C and C++ languages takes a lot of attention and interest today. This paper proposes a new framework called DrCSE to improve software vulnerability detection. It uses an intelligent computation technique based on the combination of two methods: Rebalancing data and representation learning to analyze and evaluate the code property graph (CPG) of the source code for detecting abnormal behavior of software vulnerabilities. To do that, DrCSE performs a combination of 3 main processing techniques: (i) building the source code feature profiles, (ii) rebalancing data, and (iii) contrastive… More >

  • Open Access

    ARTICLE

    Nonparametric Statistical Feature Scaling Based Quadratic Regressive Convolution Deep Neural Network for Software Fault Prediction

    Sureka Sivavelu, Venkatesh Palanisamy*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3469-3487, 2024, DOI:10.32604/cmc.2024.047407 - 26 March 2024

    Abstract The development of defect prediction plays a significant role in improving software quality. Such predictions are used to identify defective modules before the testing and to minimize the time and cost. The software with defects negatively impacts operational costs and finally affects customer satisfaction. Numerous approaches exist to predict software defects. However, the timely and accurate software bugs are the major challenging issues. To improve the timely and accurate software defect prediction, a novel technique called Nonparametric Statistical feature scaled QuAdratic regressive convolution Deep nEural Network (SQADEN) is introduced. The proposed SQADEN technique mainly includes… More >

  • Open Access

    ARTICLE

    Strategic Contracting for Software Upgrade Outsourcing in Industry 4.0

    Cheng Wang1,2,*, Zhuowei Zheng1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1563-1592, 2024, DOI:10.32604/cmes.2023.031103 - 17 November 2023

    Abstract The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software to enhance production efficiency. In this rapidly evolving market, software development is an ongoing process that must be tailored to meet the dynamic needs of enterprises. However, internal research and development can be prohibitively expensive, driving many enterprises to outsource software development and upgrades to external service providers. This paper presents a software upgrade outsourcing model for enterprises and service providers that accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverse selection due… More >

  • Open Access

    ARTICLE

    Multi-Attack Intrusion Detection System for Software-Defined Internet of Things Network

    Tarcízio Ferrão1,*, Franklin Manene2, Adeyemi Abel Ajibesin3

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4985-5007, 2023, DOI:10.32604/cmc.2023.038276 - 29 April 2023

    Abstract Currently, the Internet of Things (IoT) is revolutionizing communication technology by facilitating the sharing of information between different physical devices connected to a network. To improve control, customization, flexibility, and reduce network maintenance costs, a new Software-Defined Network (SDN) technology must be used in this infrastructure. Despite the various advantages of combining SDN and IoT, this environment is more vulnerable to various attacks due to the centralization of control. Most methods to ensure IoT security are designed to detect Distributed Denial-of-Service (DDoS) attacks, but they often lack mechanisms to mitigate their severity. This paper proposes… More >

  • Open Access

    ARTICLE

    Reliable Failure Restoration with Bayesian Congestion Aware for Software Defined Networks

    Babangida Isyaku1,2,*, Kamalrulnizam Bin Abu Bakar1, Wamda Nagmeldin3, Abdelzahir Abdelmaboud4, Faisal Saeed5,6, Fuad A. Ghaleb1

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3729-3748, 2023, DOI:10.32604/csse.2023.034509 - 03 April 2023

    Abstract Software Defined Networks (SDN) introduced better network management by decoupling control and data plane. However, communication reliability is the desired property in computer networks. The frequency of communication link failure degrades network performance, and service disruptions are likely to occur. Emerging network applications, such as delay-sensitive applications, suffer packet loss with higher Round Trip Time (RTT). Several failure recovery schemes have been proposed to address link failure recovery issues in SDN. However, these schemes have various weaknesses, which may not always guarantee service availability. Communication paths differ in their roles; some paths are critical because… More >

Displaying 1-10 on page 1 of 28. Per Page