Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (106)
  • Open Access

    ARTICLE

    Artificially Intelligent Interviewer—A Multimodal Approach

    Daniil Kamakaev, Khaled Mahbub*

    Journal on Artificial Intelligence, Vol.8, pp. 183-202, 2026, DOI:10.32604/jai.2026.077823 - 15 April 2026

    Abstract This paper presents an innovative system designed to automate the analysis of candidate interviews by integrating multiple analytical techniques into a single multimodal framework. This system combines text sentiment analysis, audio sentiment analysis, keyword extraction, and Mel-Frequency Cepstral Coefficients (MFCC) feature extraction to evaluate candidate performance holistically. This system employs text sentiment analysis using VADER and transformer-based sentiment features (probability-based outputs), audio sentiment analysis with an SVM model trained on both IEMOCAP and MELD datasets, keyword extraction via KeyBERT, and audio feature extraction including MFCCs, delta MFCCs, pitch, and energy to evaluate candidate performance holistically. More >

  • Open Access

    ARTICLE

    Two-Branch Intrusion Detection Method Based on Fusion of Deep Semantic and Statistical Features

    Lan Xiong, Liang Wan*, Jingxia Ren

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076986 - 09 April 2026

    Abstract The semantic complexity of large-scale malicious payloads in modern network traffic severely limits the robustness and generalization of existing Intrusion Detection Systems (IDS). This limitation presents a major challenge to network security. This paper proposes a dual-branch intrusion detection method called CPS-IDS. This method fuses deep semantic features with statistical features. The first branch uses the DeBERTav2 module. It performs deep semantic modeling on the session payload. This branch also incorporates a Time Encoder. The Time Encoder models the temporal behavior of the packet arrival interval time series. A Cross-Attention mechanism achieves the joint modeling… More >

  • Open Access

    ARTICLE

    Interpretable Smart Contract Vulnerability Detection with LLM-Augmented Hilbert-Schmidt Information Bottleneck

    Yiming Yu1, Yunfei Guo2, Junchen Liu3, Yiping Sun4, Junliang Du5,*

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2025.074959 - 12 March 2026

    Abstract Graph neural networks (GNNs) have shown notable success in identifying security vulnerabilities within Ethereum smart contracts by capturing structural relationships encoded in control- and data-flow graphs. Despite their effectiveness, most GNN-based vulnerability detectors operate as black boxes, making their decisions difficult to interpret and thus less suitable for critical security auditing. The information bottleneck (IB) principle provides a theoretical framework for isolating task-relevant graph components. However, existing IB-based implementations often encounter unstable optimization and limited understanding of code semantics. To address these issues, we introduce ContractGIB, an interpretable graph information bottleneck framework for function-level vulnerability More >

  • Open Access

    ARTICLE

    Exploring Recovery through Life Narratives in Psychiatric Home-Visit Nursing: A Natural Language Processing Approach Using BERTopic

    Ichiro Kutsuna1,2,*, Masanao Ikeya2,3, Akane Fujii2, Aiko Hoshino4, Kazuya Sakai1

    International Journal of Mental Health Promotion, Vol.28, No.2, 2026, DOI:10.32604/ijmhp.2025.074249 - 27 February 2026

    Abstract Background: In mental health, recovery is emphasized, and qualitative analyses of service users’ narratives have accumulated; however, while qualitative approaches excel at capturing rich context and generating new concepts, they are limited in generalizability and feasible data volume. This study aimed to quantify the subjective life history narratives of users of psychiatric home-visit nursing using natural language processing (NLP) and to clarify the relationships between linguistic features and recovery-related indicators. Methods: We conducted audio-recorded and transcribed semi-structured interviews on daily life verbatim and collected self-report questionnaires (Recovery Assessment Scale [RAS]) and clinician ratings (Global Assessment of… More >

  • Open Access

    ARTICLE

    Fine Tuned QA Models for Java Programming

    Jeevan Pralhad Tonde*, Satish Sankaye

    Journal on Artificial Intelligence, Vol.8, pp. 107-118, 2026, DOI:10.32604/jai.2026.075857 - 13 February 2026

    Abstract As education continues to evolve alongside artificial intelligence, there is growing interest in how large language models (LLMs) can support more personalized and intelligent learning experiences. This study focuses on building a domain-specific question answering (QA) system tailored to computer science education, with a particular emphasis on Java programming. While transformer-based models such as BERT, RoBERTa, and DistilBERT have demonstrated strong performance on general-purpose datasets like SQuAD, they often struggle with technical educational content where annotated data is scarce. To address this challenge, we developed a custom dataset, JavaFactoidQA, consisting of 1000 fact-based question–answer pairs… More >

  • Open Access

    ARTICLE

    A Knowledge-Distilled CharacterBERT-BiLSTM-ATT Framework for Lightweight DGA Detection in IoT Devices

    Chengqi Liu1, Yongtao Li2, Weiping Zou3,*, Deyu Lin4,5,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074975 - 10 February 2026

    Abstract With the large-scale deployment of the Internet of Things (IoT) devices, their weak security mechanisms make them prime targets for malware attacks. Attackers often use Domain Generation Algorithm (DGA) to generate random domain names, hiding the real IP of Command and Control (C&C) servers to build botnets. Due to the randomness and dynamics of DGA, traditional methods struggle to detect them accurately, increasing the difficulty of network defense. This paper proposes a lightweight DGA detection model based on knowledge distillation for resource-constrained IoT environments. Specifically, a teacher model combining CharacterBERT, a bidirectional long short-term memory More >

  • Open Access

    ARTICLE

    Mitigating Adversarial Obfuscation in Named Entity Recognition with Robust SecureBERT Finetuning

    Nouman Ahmad1,*, Changsheng Zhang1, Uroosa Sehar2,3,4

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073029 - 10 February 2026

    Abstract Although Named Entity Recognition (NER) in cybersecurity has historically concentrated on threat intelligence, vital security data can be found in a variety of sources, such as open-source intelligence and unprocessed tool outputs. When dealing with technical language, the coexistence of structured and unstructured data poses serious issues for traditional BERT-based techniques. We introduce a three-phase approach for improved NER in multi-source cybersecurity data that makes use of large language models (LLMs). To ensure thorough entity coverage, our method starts with an identification module that uses dynamic prompting techniques. To lessen hallucinations, the extraction module uses… More >

  • Open Access

    ARTICLE

    Exact Computer Modeling of Photovoltaic Sources with Lambert-W Explicit Solvers for Real-Time Emulation and Controller Verification

    Abdulaziz Almalaq1, Ambe Harrison2,*, Ibrahim Alsaleh1, Abdullah Alassaf1, Mashari Alangari1

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.1, 2026, DOI:10.32604/cmes.2025.074815 - 29 January 2026

    Abstract We present a computer-modeling framework for photovoltaic (PV) source emulation that preserves the exact single-diode physics while enabling iteration-free, real-time evaluation. We derive two closed-form explicit solvers based on the Lambert W function: a voltage-driven V-Lambert solver for high-fidelity I–V computation and a resistance-driven R-Lambert solver designed for seamless integration in a closed-loop PV emulator. Unlike Taylor-linearized explicit models, our proposed formulation retains the exponential nonlinearity of the PV equations. It employs a numerically stable analytical evaluation that eliminates the need for lookup tables and root-finding, all while maintaining limited computational costs and a small… More >

  • Open Access

    ARTICLE

    Context-Aware Spam Detection Using BERT Embeddings with Multi-Window CNNs

    Sajid Ali1, Qazi Mazhar Ul Haq1,2,*, Ala Saleh Alluhaidan3,*, Muhammad Shahid Anwar4, Sadique Ahmad5, Leila Jamel3

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.1, 2026, DOI:10.32604/cmes.2026.074395 - 29 January 2026

    Abstract Spam emails remain one of the most persistent threats to digital communication, necessitating effective detection solutions that safeguard both individuals and organisations. We propose a spam email classification framework that uses Bidirectional Encoder Representations from Transformers (BERT) for contextual feature extraction and a multiple-window Convolutional Neural Network (CNN) for classification. To identify semantic nuances in email content, BERT embeddings are used, and CNN filters extract discriminative n-gram patterns at various levels of detail, enabling accurate spam identification. The proposed model outperformed Word2Vec-based baselines on a sample of 5728 labelled emails, achieving an accuracy of 98.69%, More >

  • Open Access

    ARTICLE

    Research on the Classification of Digital Cultural Texts Based on ASSC-TextRCNN Algorithm

    Zixuan Guo1, Houbin Wang2, Sameer Kumar1,*, Yuanfang Chen3

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072064 - 12 January 2026

    Abstract With the rapid development of digital culture, a large number of cultural texts are presented in the form of digital and network. These texts have significant characteristics such as sparsity, real-time and non-standard expression, which bring serious challenges to traditional classification methods. In order to cope with the above problems, this paper proposes a new ASSC (ALBERT, SVD, Self-Attention and Cross-Entropy)-TextRCNN digital cultural text classification model. Based on the framework of TextRCNN, the Albert pre-training language model is introduced to improve the depth and accuracy of semantic embedding. Combined with the dual attention mechanism, the… More >

Displaying 1-10 on page 1 of 106. Per Page