Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (64)
  • Open Access

    ARTICLE

    Leverage External Knowledge and Self-attention for Chinese Semantic Dependency Graph Parsing

    Dianqing Liu1,2, Lanqiu Zhang1,2, Yanqiu Shao1,2,*, Junzhao Sun3

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 447-458, 2021, DOI:10.32604/iasc.2021.016320

    Abstract Chinese semantic dependency graph (CSDG) parsing aims to analyze the semantic relationship between words in a sentence. Since it is a deep semantic analysis task, the parser needs a lot of prior knowledge about the real world to distinguish different semantic roles and determine the range of the head nodes of each word. Existing CSDG parsers usually use part-of-speech (POS) and lexical features, which can only provide linguistic knowledge, but not semantic knowledge about the word. To solve this problem, we propose an entity recognition method based on distant supervision and entity classification to recognize entities in sentences, and then… More >

  • Open Access

    ARTICLE

    Arabic Named Entity Recognition: A BERT-BGRU Approach

    Norah Alsaaran*, Maha Alrabiah

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 471-485, 2021, DOI:10.32604/cmc.2021.016054

    Abstract Named Entity Recognition (NER) is one of the fundamental tasks in Natural Language Processing (NLP), which aims to locate, extract, and classify named entities into a predefined category such as person, organization and location. Most of the earlier research for identifying named entities relied on using handcrafted features and very large knowledge resources, which is time consuming and not adequate for resource-scarce languages such as Arabic. Recently, deep learning achieved state-of-the-art performance on many NLP tasks including NER without requiring hand-crafted features. In addition, transfer learning has also proven its efficiency in several NLP tasks by exploiting pretrained language models… More >

  • Open Access

    ARTICLE

    Assessing User’s Susceptibility and Awareness of Cybersecurity Threats

    Maha M. Althobaiti*

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 167-177, 2021, DOI:10.32604/iasc.2021.016660

    Abstract Cybersecurity threats, including those involving machine learning, malware, phishing, and cryptocurrency, have become more sophisticated. They target sensitive information and put institutions, governments, and individuals in a continual state of risk. In 2019, phishing attacks became one of the most common and dangerous cyber threats. Such attacks attempt to steal sensitive data, such as login and payment card details, from financial, social, and educational websites. Many universities have suffered data breaches, serving as a prime example of victims of attacks on educational websites. Owing to advances in phishing tactics, strategies, and technologies, the end-user is the main victim of an… More >

  • Open Access

    ARTICLE

    Experimental Evaluation of Clickbait Detection Using Machine Learning Models

    Iftikhar Ahmad1,*, Mohammed A. Alqarni2, Abdulwahab Ali Almazroi3, Abdullah Tariq1

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1335-1344, 2020, DOI:10.32604/iasc.2020.013861

    Abstract The exponential growth of social media has been instrumental in directing the news outlets to rely on the stated platform for the dissemination of news stories. While social media has helped in the fast propagation of breaking news, it also has allowed many bad actors to exploit this medium for political and monetary purposes. With such an intention, tempting headlines, which are not aligned with the content, are being used to lure users to visit the websites that often post dodgy and unreliable information. This phenomenon is commonly known as clickbait. A number of machine learning techniques have been developed… More >

  • Open Access

    ARTICLE

    Delayed puberty and abnormal anthropometry and its associations with quality of life in young Fontan survivors: A multicenter cross-sectional study

    Shaji C. Menon1, Ragheed Al-Dulaimi1, Brian W. McCrindle2, David J. Goldberg3, Ritu Sachdeva4, Bryan H. Goldstein5, Thomas Seery6, Karen C. Uzark7, Anjali Chelliah8, Ryan Butts9, Heather Henderson10, Tiffanie Johnson11, Richard V. Williams1

    Congenital Heart Disease, Vol.13, No.3, pp. 463-469, 2018, DOI:10.1111/chd.12597

    Abstract Introduction: We sought to evaluate the prevalence of delayed puberty and abnormal anthropometry and its association with quality of life (QoL) in young Fontan survivors.
    Methods: This was a cross-sectional study at 11 Pediatric Heart Network centers. Demographic and clinical data, anthropomety, and Tanner stage were collected. Anthropometric measurements and pubertal stage were compared to US norms. QoL was assessed using Pediatric Quality of Life inventory (PedsQL). Mixed effects regression modeling adjusting for clustering by center was used to evaluate factors associated with abnormal anthropometry and delayed puberty and associations with QoL.
    Results: Of the 299 subjects, 42% were female.… More >

  • Open Access

    ARTICLE

    MII: A Novel Text Classification Model Combining Deep Active Learning with BERT

    Anman Zhang1, Bohan Li1, 2, 3, *, Wenhuan Wang1, Shuo Wan1, Weitong Chen4

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1499-1514, 2020, DOI:10.32604/cmc.2020.09962

    Abstract Active learning has been widely utilized to reduce the labeling cost of supervised learning. By selecting specific instances to train the model, the performance of the model was improved within limited steps. However, rare work paid attention to the effectiveness of active learning on it. In this paper, we proposed a deep active learning model with bidirectional encoder representations from transformers (BERT) for text classification. BERT takes advantage of the self-attention mechanism to integrate contextual information, which is beneficial to accelerate the convergence of training. As for the process of active learning, we design an instance selection strategy based on… More >

  • Open Access

    ARTICLE

    Y.C. "Bert'' Fung: The Father of Modern Biomechanics

    Ghassan S. Kassab1

    Molecular & Cellular Biomechanics, Vol.1, No.1, pp. 5-22, 2004, DOI:10.3970/mcb.2004.001.005

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Morphological Characterization of Brazil Nut Tree (Bertholletia excelsa) Fruit Pericarp

    Gustavo P. Petrechen1,4,*, Marcos Arduin3, José D. Ambrósio1,2

    Journal of Renewable Materials, Vol.7, No.7, pp. 683-692, 2019, DOI:10.32604/jrm.2019.04588

    Abstract This article presents the overall morphological structure of the Brazil nut tree (Bertholletia excelsa) fruit pericarp, from macro to nano scale. The acquired knowledge would be used for the development of new applications, like using the materials as fillers for biocomposites, or as a hierarchical architecture model for biomimetics. This research was performed using stereo and light microscopy and conventional and force field emission scanning electron microscopy. The pericarp presents three layers: the exocarp, a dark gray, brittle and fragile outer layer; the mesocarp, a beige, dry, rigid, impermeable and fibrous intermediate layer; and the endocarp, an inner layer with… More >

  • Open Access

    ARTICLE

    Collocation Methods to Solve Certain Hilbert Integral Equation with Middle Rectangle Rule

    Jin Li1,2, De-hao Yu3,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.102, No.2, pp. 103-126, 2014, DOI:10.3970/cmes.2014.102.103

    Abstract The generalized composite middle rectangle rule for the computation of Hilbert integral is discussed. The pointwise superconvergence phenomenon is presented, i.e., when the singular point coincides with some a priori known point, the convergence rate of the rectangle rule is higher than what is global possible. We proved that the superconvergence rate of the composite middle rectangle rule occurs at certain local coordinate of each subinterval and the corresponding superconvergence error estimate is obtained. By choosing the superconvergence point as the collocation points, a collocation scheme for solving the relevant Hilbert integral equation is presented and an error estimate is… More >

  • Open Access

    ARTICLE

    A Meshless Method for Solving the 2D Brusselator Reaction-Diffusion System

    M. Mohammadi1, R. Mokhtari2,3, R. Schaback4

    CMES-Computer Modeling in Engineering & Sciences, Vol.101, No.2, pp. 113-138, 2014, DOI:10.3970/cmes.2014.101.113

    Abstract In this paper, the two-dimensional (2D) Brusselator reaction-diffusion system is simulated numerically by the method of lines. The proposed method is implemented as a meshless method based on spatial trial functions in the reproducing kernel Hilbert spaces. For efficiency and stability reasons, we use the Newton basis introduced recently by Müller and Schaback. The method is shown to work in all interesting situations described by Hopf bifurcations and Turing patterns. More >

Displaying 51-60 on page 6 of 64. Per Page