Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (86)
  • Open Access

    ARTICLE

    A Hierarchical Attention Framework for Business Information Systems: Theoretical Foundation and Proof-of-Concept Implementation

    Sabina-Cristiana Necula*, Napoleon-Alexandru Sireteanu

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-34, 2026, DOI:10.32604/cmc.2025.070861 - 09 December 2025

    Abstract Modern business information systems face significant challenges in managing heterogeneous data sources, integrating disparate systems, and providing real-time decision support in complex enterprise environments. Contemporary enterprises typically operate 200+ interconnected systems, with research indicating that 52% of organizations manage three or more enterprise content management systems, creating information silos that reduce operational efficiency by up to 35%. While attention mechanisms have demonstrated remarkable success in natural language processing and computer vision, their systematic application to business information systems remains largely unexplored. This paper presents the theoretical foundation for a Hierarchical Attention-Based Business Information System (HABIS)… More >

  • Open Access

    ARTICLE

    DriftXMiner: A Resilient Process Intelligence Approach for Safe and Transparent Detection of Incremental Concept Drift in Process Mining

    Puneetha B. H.1,*, Manoj Kumar M. V.2,*, Prashanth B. S.2, Piyush Kumar Pareek3

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-33, 2026, DOI:10.32604/cmc.2025.067706 - 10 November 2025

    Abstract Processes supported by process-aware information systems are subject to continuous and often subtle changes due to evolving operational, organizational, or regulatory factors. These changes, referred to as incremental concept drift, gradually alter the behavior or structure of processes, making their detection and localization a challenging task. Traditional process mining techniques frequently assume process stationarity and are limited in their ability to detect such drift, particularly from a control-flow perspective. The objective of this research is to develop an interpretable and robust framework capable of detecting and localizing incremental concept drift in event logs, with a… More >

  • Open Access

    ARTICLE

    A Real-Time Deep Learning Approach for Electrocardiogram-Based Cardiovascular Disease Prediction with Adaptive Drift Detection and Generative Feature Replay

    Soumia Zertal1,2,*, Asma Saighi1,2, Sofia Kouah1,2, Souham Meshoul3,*, Zakaria Laboudi2,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 3737-3782, 2025, DOI:10.32604/cmes.2025.068558 - 30 September 2025

    Abstract Cardiovascular diseases (CVDs) continue to present a leading cause of mortality worldwide, emphasizing the importance of early and accurate prediction. Electrocardiogram (ECG) signals, central to cardiac monitoring, have increasingly been integrated with Deep Learning (DL) for real-time prediction of CVDs. However, DL models are prone to performance degradation due to concept drift and to catastrophic forgetting. To address this issue, we propose a real-time CVDs prediction approach, referred to as ADWIN-GFR that combines Convolutional Neural Network (CNN) layers, for spatial feature extraction, with Gated Recurrent Units (GRU), for temporal modeling, alongside adaptive drift detection and… More > Graphic Abstract

    A Real-Time Deep Learning Approach for Electrocardiogram-Based Cardiovascular Disease Prediction with Adaptive Drift Detection and Generative Feature Replay

  • Open Access

    ARTICLE

    A Conceptual Framework for Cybersecurity Awareness

    Kagiso Komane1,*, Lucas Khoza2, Fani Radebe1

    Journal of Cyber Security, Vol.7, pp. 79-108, 2025, DOI:10.32604/jcs.2025.059712 - 20 May 2025

    Abstract Financial support, government support, cyber hygiene, and ongoing education and training as well as parental guidance and supervision are all essential components of cybersecurity awareness (CSA) identified in this study among the youth. It’s critical to realize that adequate funding is needed to effectively increase CSA, particularly among South African youth. Previous studies have demonstrated several ways to address inadequate CSA by utilizing various cybersecurity frameworks, ideas, and models. To increase CSA, this literature review seeks to emphasize the significance of integrating cybersecurity education throughout the entire school curriculum. This paper identified ethical issues, protection… More >

  • Open Access

    ARTICLE

    Latent Profile Analysis: Mattering Concepts, Problematic Internet Use, and Adaptability in Chinese University Students

    Jianlong Wang1,#, Xiumei Chen1,2,#, Muqi Huang3, Rui Liu3, I-Hua Chen4,5,*, Gordon L. Flett6,*

    International Journal of Mental Health Promotion, Vol.27, No.2, pp. 241-256, 2025, DOI:10.32604/ijmhp.2025.058503 - 03 March 2025

    Abstract Background: This study addresses the pressing need to understand the nuanced relationship between ‘mattering’—the perception of being significant to others—and problematic internet use (PIU) among university students. Unlike previous research that has primarily employed variable-centered approaches, this study first adopts a person-centered approach using Latent Profile Analysis (LPA) to identify distinct mattering profiles. Subsequently, through variable-centered analyses, these profiles are examined in relation to different types of PIU—specifically problematic social media use (PSMU) and problematic gaming (PG)—as well as adaptability. Methods: Data were collected from 3587 university students across 19 universities in China. Participants completed… More >

  • Open Access

    REVIEW

    Zero Trust Networks: Evolution and Application from Concept to Practice

    Yongjun Ren1, Zhiming Wang1, Pradip Kumar Sharma2, Fayez Alqahtani3, Amr Tolba4, Jin Wang5,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1593-1613, 2025, DOI:10.32604/cmc.2025.059170 - 17 February 2025

    Abstract In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defensive techniques, Zero Trust Networks (ZTN) have emerged as a widely recognized technology. Zero Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of “never trust, always verify.” Initially proposed by John Cortez in 2010 and subsequently promoted by Google, the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network environments. This paper systematically compares the current mainstream cybersecurity models, thoroughly explores More >

  • Open Access

    ARTICLE

    APWF: A Parallel Website Fingerprinting Attack with Attention Mechanism

    Dawei Xu1,2,3, Min Wang1, Yue Lv1, Moxuan Fu2, Yi Wu4,5,*, Jian Zhao1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2027-2041, 2025, DOI:10.32604/cmc.2024.058178 - 17 February 2025

    Abstract Website fingerprinting (WF) attacks can reveal information about the websites users browse by de-anonymizing encrypted traffic. Traditional website fingerprinting attack models, focusing solely on a single spatial feature, are inefficient regarding training time. When confronted with the concept drift problem, they suffer from a sharp drop in attack accuracy within a short period due to their reliance on extensive, outdated training data. To address the above problems, this paper proposes a parallel website fingerprinting attack (APWF) that incorporates an attention mechanism, which consists of an attack model and a fine-tuning method. Among them, the APWF… More >

  • Open Access

    ARTICLE

    Associations between Rejective Parenting Style and Academic Anxiety among Chinese High School Students: The Chain Mediation Effect of Self-Concept and Positive Coping Style

    Dexian Li1, Wencan Li2, Xin Lin3,*, Xingchen Zhu4,*

    International Journal of Mental Health Promotion, Vol.27, No.1, pp. 1-17, 2025, DOI:10.32604/ijmhp.2024.058744 - 31 January 2025

    Abstract Background: The phenomenon of academic anxiety has been demonstrated to exert a considerable influence on students’ academic engagement, leading to the emergence of a phenomenon known as “learned helplessness” and undermining the self-confidence and motivation of high school students. Using acceptance-rejection theory, this study elucidated how a rejective parenting style affects Chinese high school students’ academic anxiety and explored the urban-rural heterogeneity of this relationship. Methods: Data were analyzed using a stratified whole-cluster random sampling method. There are a total of 30,000 high school students in the three regions of northern and central China (from… More >

  • Open Access

    REVIEW

    A Critical Review of Active Distribution Network Reconfiguration: Concepts, Development, and Perspectives

    Bo Yang1, Rui Zhang1, Jie Zhang2, Xianlong Cheng2, Jiale Li3, Yimin Zhou1, Yuanweiji Hu1, Bin He1, Gongshuai Zhang4, Xiuping Du4, Si Ji5, Yiyan Sang6, Zhengxun Guo7,8,*

    Energy Engineering, Vol.121, No.12, pp. 3487-3547, 2024, DOI:10.32604/ee.2024.054662 - 22 November 2024

    Abstract In recent years, the large-scale grid connection of various distributed power sources has made the planning and operation of distribution grids increasingly complex. Consequently, a large number of active distribution network reconfiguration techniques have emerged to reduce system losses, improve system safety, and enhance power quality via switching switches to change the system topology while ensuring the radial structure of the network. While scholars have previously reviewed these methods, they all have obvious shortcomings, such as a lack of systematic integration of methods, vague classification, lack of constructive suggestions for future study, etc. Therefore, this… More >

  • Open Access

    PROCEEDINGS

    Exploration of Alloy Composition-Phase Relationships: High-Throughput Experimental Concepts and Approaches

    Liang Jiang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.29, No.1, pp. 1-1, 2024, DOI:10.32604/icces.2024.012946

    Abstract The Materials Genome Engineering (MGE) spurs the developments and applications of methods and tools in high-throughput experiments, integrated computation materials engineering and big data. Due to the unique importance and characteristics of structural alloys, there are great needs for MGE high throughput experimental methods and tools to enable efficient establishment of the complex alloy composition-microstructures-property relationships. To explore the alloy composition-phase relationships, several high-throughput experimental concepts are discussed. The diffusion-based high-throughput experimental concepts and approaches are highlighted from generating composition spread, automating characterization, and to illustrating systematic analysis. In particular, the evolution of diffusion multiple More >

Displaying 1-10 on page 1 of 86. Per Page