Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (328)
  • Open Access

    ARTICLE

    Classification of Conversational Sentences Using an Ensemble Pre-Trained Language Model with the Fine-Tuned Parameter

    R. Sujatha, K. Nimala*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1669-1686, 2024, DOI:10.32604/cmc.2023.046963

    Abstract Sentence classification is the process of categorizing a sentence based on the context of the sentence. Sentence categorization requires more semantic highlights than other tasks, such as dependence parsing, which requires more syntactic elements. Most existing strategies focus on the general semantics of a conversation without involving the context of the sentence, recognizing the progress and comparing impacts. An ensemble pre-trained language model was taken up here to classify the conversation sentences from the conversation corpus. The conversational sentences are classified into four categories: information, question, directive, and commission. These classification label sequences are for analyzing the conversation progress and… More >

  • Open Access

    ARTICLE

    Abstractive Arabic Text Summarization Using Hyperparameter Tuned Denoising Deep Neural Network

    Ibrahim M. Alwayle1, Hala J. Alshahrani2, Saud S. Alotaibi3, Khaled M. Alalayah1, Amira Sayed A. Aziz4, Khadija M. Alaidarous1, Ibrahim Abdulrab Ahmed5, Manar Ahmed Hamza6,*

    Intelligent Automation & Soft Computing, Vol.38, No.2, pp. 153-168, 2023, DOI:10.32604/iasc.2023.034718

    Abstract Abstractive text summarization is crucial to produce summaries of natural language with basic concepts from large text documents. Despite the achievement of English language-related abstractive text summarization models, the models that support Arabic language text summarization are fewer in number. Recent abstractive Arabic summarization models encounter different issues that need to be resolved. Syntax inconsistency is a crucial issue resulting in the low-accuracy summary. A new technique has achieved remarkable outcomes by adding topic awareness in the text summarization process that guides the module by imitating human awareness. The current research article presents Abstractive Arabic Text Summarization using Hyperparameter Tuned… More >

  • Open Access

    ARTICLE

    Credit Card Fraud Detection Using Improved Deep Learning Models

    Sumaya S. Sulaiman1,2,*, Ibraheem Nadher3, Sarab M. Hameed2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1049-1069, 2024, DOI:10.32604/cmc.2023.046051

    Abstract Fraud of credit cards is a major issue for financial organizations and individuals. As fraudulent actions become more complex, a demand for better fraud detection systems is rising. Deep learning approaches have shown promise in several fields, including detecting credit card fraud. However, the efficacy of these models is heavily dependent on the careful selection of appropriate hyperparameters. This paper introduces models that integrate deep learning models with hyperparameter tuning techniques to learn the patterns and relationships within credit card transaction data, thereby improving fraud detection. Three deep learning models: AutoEncoder (AE), Convolution Neural Network (CNN), and Long Short-Term Memory… More >

  • Open Access

    ARTICLE

    Local Adaptive Gradient Variance Attack for Deep Fake Fingerprint Detection

    Chengsheng Yuan1,2, Baojie Cui1,2, Zhili Zhou3, Xinting Li4,*, Qingming Jonathan Wu5

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 899-914, 2024, DOI:10.32604/cmc.2023.045854

    Abstract In recent years, deep learning has been the mainstream technology for fingerprint liveness detection (FLD) tasks because of its remarkable performance. However, recent studies have shown that these deep fake fingerprint detection (DFFD) models are not resistant to attacks by adversarial examples, which are generated by the introduction of subtle perturbations in the fingerprint image, allowing the model to make fake judgments. Most of the existing adversarial example generation methods are based on gradient optimization, which is easy to fall into local optimal, resulting in poor transferability of adversarial attacks. In addition, the perturbation added to the blank area of… More >

  • Open Access

    ARTICLE

    An Efficient Reliability-Based Optimization Method Utilizing High-Dimensional Model Representation and Weight-Point Estimation Method

    Xiaoyi Wang1, Xinyue Chang2, Wenxuan Wang1,*, Zijie Qiao3, Feng Zhang3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1775-1796, 2024, DOI:10.32604/cmes.2023.043913

    Abstract The objective of reliability-based design optimization (RBDO) is to minimize the optimization objective while satisfying the corresponding reliability requirements. However, the nested loop characteristic reduces the efficiency of RBDO algorithm, which hinders their application to high-dimensional engineering problems. To address these issues, this paper proposes an efficient decoupled RBDO method combining high dimensional model representation (HDMR) and the weight-point estimation method (WPEM). First, we decouple the RBDO model using HDMR and WPEM. Second, Lagrange interpolation is used to approximate a univariate function. Finally, based on the results of the first two steps, the original nested loop reliability optimization model is… More >

  • Open Access

    ARTICLE

    The Relationship between Internet Addiction and Cyberbullying Perpetration: A Moderated Mediation Model of Moral Disengagement and Internet Literacy

    Wan Xiao1,*, Miaoting Cheng2,*

    International Journal of Mental Health Promotion, Vol.25, No.12, pp. 1303-1311, 2023, DOI:10.32604/ijmhp.2023.042976

    Abstract Internet addiction and cyberbullying have emerged as significant global mental health concerns in recent years. Although previous studies have shown a close association between Internet addiction and cyberbullying, the underlying mechanisms connecting these two phenomena remain unclear. Therefore, this study aimed to reveal the mechanisms involved between Internet addiction and cyberbullying perpetration from the perspective of cognition function. This study recruited 976 Chinese youth through online survey, using the short version of Internet Addiction Test (s-IAT), Chinese Cyberbullying Intervention Project Questionnaire (C-CIPQ), Cyberbullying Moral Disengagement Scale (CMDS), and Internet Literacy Questionnaire (ILQ) to investigate the relationship between Internet addiction, moral… More >

  • Open Access

    ARTICLE

    Wavelet Multi-Resolution Interpolation Galerkin Method for Linear Singularly Perturbed Boundary Value Problems

    Jiaqun Wang1,2, Guanxu Pan2, Youhe Zhou2, Xiaojing Liu2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 297-318, 2024, DOI:10.32604/cmes.2023.030622

    Abstract In this study, a wavelet multi-resolution interpolation Galerkin method (WMIGM) is proposed to solve linear singularly perturbed boundary value problems. Unlike conventional wavelet schemes, the proposed algorithm can be readily extended to special node generation techniques, such as the Shishkin node. Such a wavelet method allows a high degree of local refinement of the nodal distribution to efficiently capture localized steep gradients. All the shape functions possess the Kronecker delta property, making the imposition of boundary conditions as easy as that in the finite element method. Four numerical examples are studied to demonstrate the validity and accuracy of the proposed… More >

  • Open Access

    ARTICLE

    LARGE EDDY SIMULATION OF THE DIFFUSION PROCESS OF NUTRIENT-RICH UP-WELLED SEAWATER

    Shigenao Maruyamaa, Masud Behniab, Masasazumi Chisakic, Takuma Kogawac,*, Junnosuke Okajimaa, Atsuki Komiyaa

    Frontiers in Heat and Mass Transfer, Vol.4, No.2, pp. 1-6, 2013, DOI:10.5098/hmt.v4.2.3002

    Abstract The diffusion process of deep seawater drawn up by a vertical pipe deployed in the ocean is investigated. This vertical pipe is based on the principal of perpetual salt fountain. Numerical simulations of seawater upwelling from the pipe are performed based on experiments conducted in the Mariana trench region. Two turbulence modeling approaches were examined: k-ε model and Large Eddy Simulations (LES). The results in both models show that diffusion of the deep seawater diffusion after ejection from the pipe. The LES results show a 50% lower vertical penetration compared to the k-ε model as well as well as predicting… More >

  • Open Access

    ARTICLE

    Electroencephalography (EEG) Based Neonatal Sleep Staging and Detection Using Various Classification Algorithms

    Hafza Ayesha Siddiqa1, Muhammad Irfan1, Saadullah Farooq Abbasi2,*, Wei Chen1

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1759-1778, 2023, DOI:10.32604/cmc.2023.041970

    Abstract Automatic sleep staging of neonates is essential for monitoring their brain development and maturity of the nervous system. EEG based neonatal sleep staging provides valuable information about an infant’s growth and health, but is challenging due to the unique characteristics of EEG and lack of standardized protocols. This study aims to develop and compare 18 machine learning models using Automated Machine Learning (autoML) technique for accurate and reliable multi-channel EEG-based neonatal sleep-wake classification. The study investigates autoML feasibility without extensive manual selection of features or hyperparameter tuning. The data is obtained from neonates at post-menstrual age 37 ± 05 weeks.… More >

  • Open Access

    ARTICLE

    MBE: A Music Copyright Depository Framework Incorporating Blockchain and Edge Computing

    Jianmao Xiao1, Ridong Huang1, Jiangyu Wang1, Zhean Zhong1, Chenyu Liu1, Yuanlong Cao1,*, Chuying Ouyang2

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2815-2834, 2023, DOI:10.32604/csse.2023.039716

    Abstract Audio copyright is a crucial issue in the music industry, as it protects the rights and interests of creators and distributors. This paper studies the current situation of digital music copyright certification and proposes a music copyright certification framework based on “blockchain + edge computing mode,” abbreviated as MBE, by integrating edge computing into the Hyperledger Fabric system. MBE framework compresses and splits the audio into small chunks, performs Fast Fourier Transform (FFT) to extract the peak points of each frequency and combines them to obtain unique audio fingerprint information. After being confirmed by various nodes on the Fabric alliance… More >

Displaying 11-20 on page 2 of 328. Per Page