Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    Requirements and Constraints of Forecasting Algorithms Required in Local Flexibility Markets

    Alex Segura*, Joaquim Meléndez

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 649-672, 2025, DOI:10.32604/cmes.2025.070954 - 30 October 2025

    Abstract The increasing use of renewable energy sources, combined with the increase in electricity demand, has highlighted the importance of energy flexibility management in electrical grids. Energy flexibility is the capacity that generators and consumers have to change production and/or consumption to support grid operation, ensuring the stability and efficiency of the grid. Thus, Local Flexibility Markets (LFMs) are market-oriented mechanisms operated at different time horizons that support flexibility provision and trading at the distribution level, where the Distribution System Operators (DSOs) are the flexibility-demanding actors, and prosumers are the flexibility providers. This paper investigates the… More >

  • Open Access

    ARTICLE

    Secure Development Methodology for Full Stack Web Applications: Proof of the Methodology Applied to Vue.js, Spring Boot and MySQL

    Kevin Santiago Rey Rodriguez, Julián David Avellaneda Galindo, Josep Tárrega Juan, Juan Ramón Bermejo Higuera*, Javier Bermejo Higuera, Juan Antonio Sicilia Montalvo

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1807-1858, 2025, DOI:10.32604/cmc.2025.067127 - 29 August 2025

    Abstract In today’s rapidly evolving digital landscape, web application security has become paramount as organizations face increasingly sophisticated cyber threats. This work presents a comprehensive methodology for implementing robust security measures in modern web applications and the proof of the Methodology applied to Vue.js, Spring Boot, and MySQL architecture. The proposed approach addresses critical security challenges through a multi-layered framework that encompasses essential security dimensions including multi-factor authentication, fine-grained authorization controls, sophisticated session management, data confidentiality and integrity protection, secure logging mechanisms, comprehensive error handling, high availability strategies, advanced input validation, and security headers implementation. Significant… More >

  • Open Access

    ARTICLE

    Spatial Assessment of Wastewater Requirements for the New Capital City of Indonesia

    Walter Timo de Vries*, Cristina Astudillo, Achmad Ghozali

    Revue Internationale de Géomatique, Vol.34, pp. 125-149, 2025, DOI:10.32604/rig.2025.057970 - 11 March 2025

    Abstract The development of Indonesia’s New Capital City (Ibu Kota Negara (IKN)) does not only offer opportunities but also faces uncertainties. One of these concerns is wastewater management, in terms of volume, location, and treatment facilities. To evaluate how the city might be able to manage this, this study starts with a theoretical evaluation of which wastewater management principles are crucial. Then the empirical study evaluates where and how the current infrastructure of the IKN could manage the wastewater and assesses—based on spatial scenarios—if the current wastewater management plans for the IKN are adequate. A Geographic… More >

  • Open Access

    ARTICLE

    An Improved Hybrid Deep Learning Approach for Security Requirements Classification

    Shoaib Hassan1,*, Qianmu Li1,*, Muhammad Zubair2, Rakan A. Alsowail3, Muhammad Umair2

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4041-4067, 2025, DOI:10.32604/cmc.2025.059832 - 06 March 2025

    Abstract As the trend to use the latest machine learning models to automate requirements engineering processes continues, security requirements classification is tuning into the most researched field in the software engineering community. Previous literature studies have proposed numerous models for the classification of security requirements. However, adopting those models is constrained due to the lack of essential datasets permitting the repetition and generalization of studies employing more advanced machine learning algorithms. Moreover, most of the researchers focus only on the classification of requirements with security keywords. They did not consider other nonfunctional requirements (NFR) directly or… More >

  • Open Access

    ARTICLE

    Hybrid Deep Learning Approach for Automating App Review Classification: Advancing Usability Metrics Classification with an Aspect-Based Sentiment Analysis Framework

    Nahed Alsaleh1,2, Reem Alnanih1,*, Nahed Alowidi1

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 949-976, 2025, DOI:10.32604/cmc.2024.059351 - 03 January 2025

    Abstract App reviews are crucial in influencing user decisions and providing essential feedback for developers to improve their products. Automating the analysis of these reviews is vital for efficient review management. While traditional machine learning (ML) models rely on basic word-based feature extraction, deep learning (DL) methods, enhanced with advanced word embeddings, have shown superior performance. This research introduces a novel aspect-based sentiment analysis (ABSA) framework to classify app reviews based on key non-functional requirements, focusing on usability factors: effectiveness, efficiency, and satisfaction. We propose a hybrid DL model, combining BERT (Bidirectional Encoder Representations from Transformers) More >

  • Open Access

    REVIEW

    An Investigation on Open-RAN Specifications: Use Cases, Security Threats, Requirements, Discussions

    Heejae Park1, Tri-Hai Nguyen2, Laihyuk Park1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 13-41, 2024, DOI:10.32604/cmes.2024.052394 - 20 August 2024

    Abstract The emergence of various technologies such as terahertz communications, Reconfigurable Intelligent Surfaces (RIS), and AI-powered communication services will burden network operators with rising infrastructure costs. Recently, the Open Radio Access Network (O-RAN) has been introduced as a solution for growing financial and operational burdens in Beyond 5G (B5G) and 6G networks. O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs. By disaggregating conventional Base Band Units (BBUs) into O-RAN Distributed Units (O-DU) and O-RAN Centralized Units (O-CU), O-RAN offers greater flexibility for upgrades and network automation. However, this openness introduces new security More >

  • Open Access

    ARTICLE

    Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection

    Islam Zada1,*, Mohammed Naif Alatawi2, Syed Muhammad Saqlain1, Abdullah Alshahrani3, Adel Alshamran4, Kanwal Imran5, Hessa Alfraihi6

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2917-2939, 2024, DOI:10.32604/cmc.2024.052835 - 15 August 2024

    Abstract Malware attacks on Windows machines pose significant cybersecurity threats, necessitating effective detection and prevention mechanisms. Supervised machine learning classifiers have emerged as promising tools for malware detection. However, there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection. Addressing this gap can provide valuable insights for enhancing cybersecurity strategies. While numerous studies have explored malware detection using machine learning techniques, there is a lack of systematic comparison of supervised classifiers for Windows malware detection. Understanding the relative effectiveness of these classifiers can inform the selection of… More >

  • Open Access

    ARTICLE

    Classification and Comprehension of Software Requirements Using Ensemble Learning

    Jalil Abbas1,*, Arshad Ahmad2, Syed Muqsit Shaheed3, Rubia Fatima4, Sajid Shah5, Mohammad Elaffendi5, Gauhar Ali5

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2839-2855, 2024, DOI:10.32604/cmc.2024.052218 - 15 August 2024

    Abstract The software development process mostly depends on accurately identifying both essential and optional features. Initially, user needs are typically expressed in free-form language, requiring significant time and human resources to translate these into clear functional and non-functional requirements. To address this challenge, various machine learning (ML) methods have been explored to automate the understanding of these requirements, aiming to reduce time and human effort. However, existing techniques often struggle with complex instructions and large-scale projects. In our study, we introduce an innovative approach known as the Functional and Non-functional Requirements Classifier (FNRC). By combining the… More >

  • Open Access

    ARTICLE

    Unleashing User Requirements from Social Media Networks by Harnessing the Deep Sentiment Analytics

    Deema Mohammed Alsekait1,*, Asif Nawaz2, Ayman Nabil3, Mehwish Bukhari2, Diaa Salama AbdElminaam3,4,5,6,*

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1031-1054, 2024, DOI:10.32604/csse.2024.051847 - 17 July 2024

    Abstract The article describes a novel method for sentiment analysis and requirement elicitation from social media feedback, leveraging advanced machine learning techniques. This innovative approach automates the extraction and classification of user requirements by analyzing sentiment in data gathered from social media platforms such as Twitter and Facebook. Utilizing APIs (Application Programming Interface) for data collection and Graph-based Neural Networks (GNN) for feature extraction, the proposed model efficiently processes and analyzes large volumes of unstructured user-generated content. The preprocessing pipeline includes data cleaning, normalization, and tokenization, ensuring high-quality input for the sentiment analysis model. By classifying… More >

  • Open Access

    ARTICLE

    Identification of Software Bugs by Analyzing Natural Language-Based Requirements Using Optimized Deep Learning Features

    Qazi Mazhar ul Haq1, Fahim Arif2,3, Khursheed Aurangzeb4, Noor ul Ain3, Javed Ali Khan5, Saddaf Rubab6, Muhammad Shahid Anwar7,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4379-4397, 2024, DOI:10.32604/cmc.2024.047172 - 26 March 2024

    Abstract Software project outcomes heavily depend on natural language requirements, often causing diverse interpretations and issues like ambiguities and incomplete or faulty requirements. Researchers are exploring machine learning to predict software bugs, but a more precise and general approach is needed. Accurate bug prediction is crucial for software evolution and user training, prompting an investigation into deep and ensemble learning methods. However, these studies are not generalized and efficient when extended to other datasets. Therefore, this paper proposed a hybrid approach combining multiple techniques to explore their effectiveness on bug identification problems. The methods involved feature… More >

Displaying 1-10 on page 1 of 31. Per Page