Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (267)
  • Open Access

    ARTICLE

    A Subdomain-Based GPU Parallel Scheme for Accelerating Perdynamics Modeling with Reduced Graphics Memory

    Zuokun Yang1, Jun Li1,2,*, Xin Lai1,2, Lisheng Liu1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.1, 2026, DOI:10.32604/cmes.2026.075980 - 29 January 2026

    Abstract Peridynamics (PD) demonstrates unique advantages in addressing fracture problems, however, its nonlocality and meshfree discretization result in high computational and storage costs. Moreover, in its engineering applications, the computational scale of classical GPU parallel schemes is often limited by the finite graphics memory of GPU devices. In the present study, we develop an efficient particle information management strategy based on the cell-linked list method and on this basis propose a subdomain-based GPU parallel scheme, which exhibits outstanding acceleration performance in specific compute kernels while significantly reducing graphics memory usage. Compared to the classical parallel scheme,… More >

  • Open Access

    ARTICLE

    Attention-Enhanced ResNet-LSTM Model with Wind-Regime Clustering for Wind Speed Forecasting

    Weiqi Mao1,2,3, Enbo Yu1,*, Guoji Xu3, Xiaozhen Li3

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.1, 2026, DOI:10.32604/cmes.2025.069733 - 29 January 2026

    Abstract Accurate wind speed prediction is crucial for stabilizing power grids with high wind energy penetration. This study presents a novel machine learning model that integrates clustering, deep learning, and transfer learning to mitigate accuracy degradation in 24-h forecasting. Initially, an optimized DB-SCAN (Density-Based Spatial Clustering of Applications with Noise) algorithm clusters wind fields based on wind direction, probability density, and spectral features, enhancing physical interpretability and reducing training complexity. Subsequently, a ResNet (Residual Network) extracts multi-scale patterns from decomposed wind signals, while transfer learning adapts the backbone network across clusters, cutting training time by over… More >

  • Open Access

    ARTICLE

    FRF-BiLSTM: Recognising and Mitigating DDoS Attacks through a Secure Decentralized Feature Optimized Federated Learning Approach

    Sushruta Mishra1, Sunil Kumar Mohapatra2, Kshira Sagar Sahoo3, Anand Nayyar4, Tae-Kyung Kim5,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072493 - 12 January 2026

    Abstract With an increase in internet-connected devices and a dependency on online services, the threat of Distributed Denial of Service (DDoS) attacks has become a significant concern in cybersecurity. The proposed system follows a multi-step process, beginning with the collection of datasets from different edge devices and network nodes. To verify its effectiveness, experiments were conducted using the CICDoS2017, NSL-KDD, and CICIDS benchmark datasets alongside other existing models. Recursive feature elimination (RFE) with random forest is used to select features from the CICDDoS2019 dataset, on which a BiLSTM model is trained on local nodes. Local models… More >

  • Open Access

    ARTICLE

    A Firefly Algorithm-Optimized CNN–BiLSTM Model for Automated Detection of Bone Cancer and Marrow Cell Abnormalities

    Ishaani Priyadarshini*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072343 - 12 January 2026

    Abstract Early and accurate detection of bone cancer and marrow cell abnormalities is critical for timely intervention and improved patient outcomes. This paper proposes a novel hybrid deep learning framework that integrates a Convolutional Neural Network (CNN) with a Bidirectional Long Short-Term Memory (BiLSTM) architecture, optimized using the Firefly Optimization algorithm (FO). The proposed CNN-BiLSTM-FO model is tailored for structured biomedical data, capturing both local patterns and sequential dependencies in diagnostic features, while the Firefly Algorithm fine-tunes key hyperparameters to maximize predictive performance. The approach is evaluated on two benchmark biomedical datasets: one comprising diagnostic data… More >

  • Open Access

    ARTICLE

    ResghostNet: Boosting GhostNet with Residual Connections and Adaptive-SE Blocks

    Yuang Chen1,2, Yong Li1,*, Fang Lin1,2, Shuhan Lv1,2, Jiaze Jiang1,2

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-18, 2026, DOI:10.32604/cmc.2025.070990 - 09 December 2025

    Abstract Aiming at the problem of potential information noise introduced during the generation of ghost feature maps in GhostNet, this paper proposes a novel lightweight neural network model called ResghostNet. This model constructs the Resghost Module by combining residual connections and Adaptive-SE Blocks, which enhances the quality of generated feature maps through direct propagation of original input information and selection of important channels before cheap operations. Specifically, ResghostNet introduces residual connections on the basis of the Ghost Module to optimize the information flow, and designs a weight self-attention mechanism combined with SE blocks to enhance feature More >

  • Open Access

    ARTICLE

    An Optimized Customer Churn Prediction Approach Based on Regularized Bidirectional Long Short-Term Memory Model

    Adel Saad Assiri1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.069826 - 10 November 2025

    Abstract Customer churn is the rate at which customers discontinue doing business with a company over a given time period. It is an essential measure for businesses to monitor high churn rates, as they often indicate underlying issues with services, products, or customer experience, resulting in considerable income loss. Prediction of customer churn is a crucial task aimed at retaining customers and maintaining revenue growth. Traditional machine learning (ML) models often struggle to capture complex temporal dependencies in client behavior data. To address this, an optimized deep learning (DL) approach using a Regularized Bidirectional Long Short-Term… More >

  • Open Access

    ARTICLE

    A Transformer-Based Deep Learning Framework with Semantic Encoding and Syntax-Aware LSTM for Fake Electronic News Detection

    Hamza Murad Khan1, Shakila Basheer2, Mohammad Tabrez Quasim3, Raja`a Al-Naimi4, Vijaykumar Varadarajan5, Anwar Khan1,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.069327 - 10 November 2025

    Abstract With the increasing growth of online news, fake electronic news detection has become one of the most important paradigms of modern research. Traditional electronic news detection techniques are generally based on contextual understanding, sequential dependencies, and/or data imbalance. This makes distinction between genuine and fabricated news a challenging task. To address this problem, we propose a novel hybrid architecture, T5-SA-LSTM, which synergistically integrates the T5 Transformer for semantically rich contextual embedding with the Self-Attention-enhanced (SA) Long Short-Term Memory (LSTM). The LSTM is trained using the Adam optimizer, which provides faster and more stable convergence compared… More >

  • Open Access

    PROCEEDINGS

    Enhancing Functional Stability of NiTi Tube for Elastocaloric Cooling Through Overstress Training

    Qiuhong Wang1, Hao Yin1,*, Qingping Sun1,2,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.34, No.1, pp. 1-1, 2025, DOI:10.32604/icces.2025.012656

    Abstract Tubular NiTi is a promising candidate of eco-friendly solid-state refrigerant for elastocaloric cooling, but the severe functional degradation of NiTi material during cyclic phase transition (PT) is a key concern in the technology development. Here, plastic deformation of 6.7% is applied on the NiTi tube by overstress training under 1900 MPa for five cycles to improve the cyclic PT stability without losing cooling efficiency. It is found that after 106 compressive cycles under an applied stress of 1000 MPa, the overstress-trained NiTi tube exhibits small residual strain (0.5%), stable adiabatic temperatures drop (T=11K) and improved… More >

  • Open Access

    ARTICLE

    Memory-Fused Dual-Stream Fault Diagnosis Network Based on Transformer Vibration Signals

    Mingxing Wu1, Chengzhen Li1, Xinyan Feng1, Fei Chen2, Yingchun Feng1, Huihui Song1, Wenyu Wang3, Faye Zhang3,*

    Structural Durability & Health Monitoring, Vol.19, No.6, pp. 1473-1487, 2025, DOI:10.32604/sdhm.2025.069811 - 17 November 2025

    Abstract As a core component of power systems, the operational status of transformers directly affects grid stability. To address the problem of “domain shift” in cross-domain fault diagnosis, this paper proposes a memory-enhanced dual-stream network (MemFuse-DSN). The method reconstructs the feature space by selecting and enhancing multi-source domain samples based on similarity metrics. An adaptive weighted dual-stream architecture is designed, integrating gradient reversal and orthogonality constraints to achieve efficient feature alignment. In addition, a novel dual dynamic memory module is introduced: the task memory bank is used to store high-confidence class prototype information, and adopts an More >

  • Open Access

    ARTICLE

    Efficient Malicious QR Code Detection System Using an Advanced Deep Learning Approach

    Abdulaziz A. Alsulami1, Qasem Abu Al-Haija2,*, Badraddin Alturki3, Ayman Yafoz1, Ali Alqahtani4, Raed Alsini1, Sami Saeed Binyamin5

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 1117-1140, 2025, DOI:10.32604/cmes.2025.070745 - 30 October 2025

    Abstract QR codes are widely used in applications such as information sharing, advertising, and digital payments. However, their growing adoption has made them attractive targets for malicious activities, including malware distribution and phishing attacks. Traditional detection approaches rely on URL analysis or image-based feature extraction, which may introduce significant computational overhead and limit real-time applicability, and their performance often depends on the quality of extracted features. Previous studies in malicious detection do not fully focus on QR code security when combining convolutional neural networks (CNNs) with recurrent neural networks (RNNs). This research proposes a deep learning… More >

Displaying 1-10 on page 1 of 267. Per Page