Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    Domain-Specific NER for Fluorinated Materials: A Hybrid Approach with Adversarial Training and Dynamic Contextual Embeddings

    Jiming Lan1, Hongwei Fu1,*, Yadong Wu1,2, Yaxian Liu1,3, Jianhua Dong1,2, Wei Liu1,2, Huaqiang Chen1,2

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4645-4665, 2025, DOI:10.32604/cmc.2025.067289 - 23 October 2025

    Abstract In the research and production of fluorinated materials, large volumes of unstructured textual data are generated, characterized by high heterogeneity and fragmentation. These issues hinder systematic knowledge integration and efficient utilization. Constructing a knowledge graph for fluorinated materials processing is essential for enabling structured knowledge management and intelligent applications. Among its core components, Named Entity Recognition (NER) plays an essential role, as its accuracy directly impacts relation extraction and semantic modeling, which ultimately affects the knowledge graph construction for fluorinated materials. However, NER in this domain faces challenges such as fuzzy entity boundaries, inconsistent terminology,… More >

  • Open Access

    ARTICLE

    Upholding Academic Integrity amidst Advanced Language Models: Evaluating BiLSTM Networks with GloVe Embeddings for Detecting AI-Generated Scientific Abstracts

    Lilia-Eliana Popescu-Apreutesei, Mihai-Sorin Iosupescu, Sabina Cristiana Necula, Vasile-Daniel Păvăloaia*

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2605-2644, 2025, DOI:10.32604/cmc.2025.064747 - 03 July 2025

    Abstract The increasing fluency of advanced language models, such as GPT-3.5, GPT-4, and the recently introduced DeepSeek, challenges the ability to distinguish between human-authored and AI-generated academic writing. This situation is raising significant concerns regarding the integrity and authenticity of academic work. In light of the above, the current research evaluates the effectiveness of Bidirectional Long Short-Term Memory (BiLSTM) networks enhanced with pre-trained GloVe (Global Vectors for Word Representation) embeddings to detect AI-generated scientific abstracts drawn from the AI-GA (Artificial Intelligence Generated Abstracts) dataset. Two core BiLSTM variants were assessed: a single-layer approach and a dual-layer… More >

  • Open Access

    ARTICLE

    An Optimized Unsupervised Defect Detection Approach via Federated Learning and Adaptive Embeddings Knowledge Distillation

    Jinhai Wang1, Junwei Xue1, Hongyan Zhang2, Hui Xiao3,4, Huiling Wei3,4, Mingyou Chen3,4, Jiang Liao2, Lufeng Luo3,4,*

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1839-1861, 2025, DOI:10.32604/cmc.2025.064489 - 09 June 2025

    Abstract Defect detection based on computer vision is a critical component in ensuring the quality of industrial products. However, existing detection methods encounter several challenges in practical applications, including the scarcity of labeled samples, limited adaptability of pre-trained models, and the data heterogeneity in distributed environments. To address these issues, this research proposes an unsupervised defect detection method, FLAME (Federated Learning with Adaptive Multi-Model Embeddings). The method comprises three stages: (1) Feature learning stage: this work proposes FADE (Feature-Adaptive Domain-Specific Embeddings), a framework employs Gaussian noise injection to simulate defective patterns and implements a feature discriminator… More >

  • Open Access

    REVIEW

    An Analytical Review of Large Language Models Leveraging KDGI Fine-Tuning, Quantum Embedding’s, and Multimodal Architectures

    Uddagiri Sirisha1,*, Chanumolu Kiran Kumar2, Revathi Durgam3, Poluru Eswaraiah4, G Muni Nagamani5

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4031-4059, 2025, DOI:10.32604/cmc.2025.063721 - 19 May 2025

    Abstract A complete examination of Large Language Models’ strengths, problems, and applications is needed due to their rising use across disciplines. Current studies frequently focus on single-use situations and lack a comprehensive understanding of LLM architectural performance, strengths, and weaknesses. This gap precludes finding the appropriate models for task-specific applications and limits awareness of emerging LLM optimization and deployment strategies. In this research, 50 studies on 25+ LLMs, including GPT-3, GPT-4, Claude 3.5, DeepKet, and hybrid multimodal frameworks like ContextDET and GeoRSCLIP, are thoroughly reviewed. We propose LLM application taxonomy by grouping techniques by task focus—healthcare,… More >

  • Open Access

    ARTICLE

    A Chinese Named Entity Recognition Method for News Domain Based on Transfer Learning and Word Embeddings

    Rui Fang, Liangzhong Cui*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3247-3275, 2025, DOI:10.32604/cmc.2025.060422 - 16 April 2025

    Abstract Named Entity Recognition (NER) is vital in natural language processing for the analysis of news texts, as it accurately identifies entities such as locations, persons, and organizations, which is crucial for applications like news summarization and event tracking. However, NER in the news domain faces challenges due to insufficient annotated data, complex entity structures, and strong context dependencies. To address these issues, we propose a new Chinese-named entity recognition method that integrates transfer learning with word embeddings. Our approach leverages the ERNIE pre-trained model for transfer learning and obtaining general language representations and incorporates the More >

  • Open Access

    ARTICLE

    PIAFGNN: Property Inference Attacks against Federated Graph Neural Networks

    Jiewen Liu1, Bing Chen1,2,*, Baolu Xue1, Mengya Guo1, Yuntao Xu1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1857-1877, 2025, DOI:10.32604/cmc.2024.057814 - 17 February 2025

    Abstract Federated Graph Neural Networks (FedGNNs) have achieved significant success in representation learning for graph data, enabling collaborative training among multiple parties without sharing their raw graph data and solving the data isolation problem faced by centralized GNNs in data-sensitive scenarios. Despite the plethora of prior work on inference attacks against centralized GNNs, the vulnerability of FedGNNs to inference attacks has not yet been widely explored. It is still unclear whether the privacy leakage risks of centralized GNNs will also be introduced in FedGNNs. To bridge this gap, we present PIAFGNN, the first property inference attack… More >

  • Open Access

    ARTICLE

    A Data Mining Approach to Detecting Bias and Favoritism in Public Procurement

    Yeferson Torres-Berru1,2,*, Vivian F. Lopez-Batista1, Lorena Conde Zhingre3

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3501-3516, 2023, DOI:10.32604/iasc.2023.035367 - 15 March 2023

    Abstract In a public procurement process, corruption can occur at each stage, favoring a participant with a previous agreement, which can result in over-pricing and purchases of substandard products, as well as gender discrimination. This paper’s aim is to detect biased purchases using a Spanish Language corpus, analyzing text from the questions and answers registry platform by applicants in a public procurement process in Ecuador. Additionally, gender bias is detected, promoting both men and women to participate under the same conditions. In order to detect gender bias and favoritism towards certain providers by contracting entities, the… More >

  • Open Access

    ARTICLE

    An Unsupervised Writer Identification Based on Generating Clusterable Embeddings

    M. F. Mridha1, Zabir Mohammad2, Muhammad Mohsin Kabir2, Aklima Akter Lima2, Sujoy Chandra Das2, Md Rashedul Islam3,*, Yutaka Watanobe4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2059-2073, 2023, DOI:10.32604/csse.2023.032977 - 09 February 2023

    Abstract The writer identification system identifies individuals based on their handwriting is a frequent topic in biometric authentication and verification systems. Due to its importance, numerous studies have been conducted in various languages. Researchers have established several learning methods for writer identification including supervised and unsupervised learning. However, supervised methods require a large amount of annotation data, which is impossible in most scenarios. On the other hand, unsupervised writer identification methods may be limited and dependent on feature extraction that cannot provide the proper objectives to the architecture and be misinterpreted. This paper introduces an unsupervised… More >

  • Open Access

    ARTICLE

    An Intelligent Deep Neural Sentiment Classification Network

    Umamaheswari Ramalingam1,*, Senthil Kumar Murugesan2, Karthikeyan Lakshmanan2, Chidhambararajan Balasubramaniyan3

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1733-1744, 2023, DOI:10.32604/iasc.2023.032108 - 05 January 2023

    Abstract A Deep Neural Sentiment Classification Network (DNSCN) is developed in this work to classify the Twitter data unambiguously. It attempts to extract the negative and positive sentiments in the Twitter database. The main goal of the system is to find the sentiment behavior of tweets with minimum ambiguity. A well-defined neural network extracts deep features from the tweets automatically. Before extracting features deeper and deeper, the text in each tweet is represented by Bag-of-Words (BoW) and Word Embeddings (WE) models. The effectiveness of DNSCN architecture is analyzed using Twitter-Sanders-Apple2 (TSA2), Twitter-Sanders-Apple3 (TSA3), and Twitter-DataSet (TDS).… More >

  • Open Access

    ARTICLE

    Efficient Authentication System Using Wavelet Embeddings of Otoacoustic Emission Signals

    V. Harshini1, T. Dhanwin1, A. Shahina1,*, N. Safiyyah2, A. Nayeemulla Khan2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1851-1867, 2023, DOI:10.32604/csse.2023.028136 - 03 November 2022

    Abstract Biometrics, which has become integrated with our daily lives, could fall prey to falsification attacks, leading to security concerns. In our paper, we use Transient Evoked Otoacoustic Emissions (TEOAE) that are generated by the human cochlea in response to an external sound stimulus, as a biometric modality. TEOAE are robust to falsification attacks, as the uniqueness of an individual’s inner ear cannot be impersonated. In this study, we use both the raw 1D TEOAE signals, as well as the 2D time-frequency representation of the signal using Continuous Wavelet Transform (CWT). We use 1D and 2D… More >

Displaying 1-10 on page 1 of 12. Per Page