Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (39)
  • Open Access

    ARTICLE

    Leveraging Readability and Sentiment in Spam Review Filtering Using Transformer Models

    Sujithra Kanmani*, Surendiran Balasubramanian

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1439-1454, 2023, DOI:10.32604/csse.2023.029953

    Abstract Online reviews significantly influence decision-making in many aspects of society. The integrity of internet evaluations is crucial for both consumers and vendors. This concern necessitates the development of effective fake review detection techniques. The goal of this study is to identify fraudulent text reviews. A comparison is made on shill reviews vs. genuine reviews over sentiment and readability features using semi-supervised language processing methods with a labeled and balanced Deceptive Opinion dataset. We analyze textual features accessible in internet reviews by merging sentiment mining approaches with readability. Overall, the research improves fake review screening by using various transformer models such… More >

  • Open Access

    ARTICLE

    Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN

    Muhammad Nadeem1, Ali Arshad2, Saman Riaz2, SyedaWajiha Zahra1, Muhammad Rashid2, Shahab S. Band3,*, Amir Mosavi4,5,6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2641-2659, 2023, DOI:10.32604/cmc.2023.028796

    Abstract Cloud computing is one of the most attractive and cost-saving models, which provides online services to end-users. Cloud computing allows the user to access data directly from any node. But nowadays, cloud security is one of the biggest issues that arise. Different types of malware are wreaking havoc on the clouds. Attacks on the cloud server are happening from both internal and external sides. This paper has developed a tool to prevent the cloud server from spamming attacks. When an attacker attempts to use different spamming techniques on a cloud server, the attacker will be intercepted through two effective techniques:… More >

  • Open Access

    ARTICLE

    Polarized Autologous Macrophages (PAM) Can Be a Tumor Vaccine

    Dongqing Wang1,*, Heying Chen1, Yi Hu2,*

    Oncologie, Vol.24, No.3, pp. 441-449, 2022, DOI:10.32604/oncologie.2022.024898

    Abstract Immunotherapy is currently recognized as one of the most promising anticancer strategies. In the tumor microenvironment, tumor-associated macrophages are mainly M2-type macrophages with tumor-promoting effects. Therefore, the reprogramming of tumor-associated macrophages from M2 to M1 type is a potential strategy for cancer therapy. We have previously shown the anticancer effects of implantable allogeneic M1 macrophages in mice. Here, we further engineered autologous mouse bone marrow cells into M1 macrophages and then embedded them into a sodium alginate gel to prepare an implantable immunotherapeutic agent (M1@Gel). We demonstrate that M1@Gel repolarizes M2 macrophages to M1 type and activates the immune responses… More >

  • Open Access

    ARTICLE

    New Spam Filtering Method with Hadoop Tuning-Based MapReduce Naïve Bayes

    Keungyeup Ji, Youngmi Kwon*

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 201-214, 2023, DOI:10.32604/csse.2023.031270

    Abstract As the importance of email increases, the amount of malicious email is also increasing, so the need for malicious email filtering is growing. Since it is more economical to combine commodity hardware consisting of a medium server or PC with a virtual environment to use as a single server resource and filter malicious email using machine learning techniques, we used a Hadoop MapReduce framework and Naïve Bayes among machine learning methods for malicious email filtering. Naïve Bayes was selected because it is one of the top machine learning methods(Support Vector Machine (SVM), Naïve Bayes, K-Nearest Neighbor(KNN), and Decision Tree) in… More >

  • Open Access

    ARTICLE

    Evaluating Partitioning Based Clustering Methods for Extended Non-negative Matrix Factorization (NMF)

    Neetika Bhandari1,*, Payal Pahwa2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2043-2055, 2023, DOI:10.32604/iasc.2023.028368

    Abstract Data is humongous today because of the extensive use of World Wide Web, Social Media and Intelligent Systems. This data can be very important and useful if it is harnessed carefully and correctly. Useful information can be extracted from this massive data using the Data Mining process. The information extracted can be used to make vital decisions in various industries. Clustering is a very popular Data Mining method which divides the data points into different groups such that all similar data points form a part of the same group. Clustering methods are of various types. Many parameters and indexes exist… More >

  • Open Access

    ARTICLE

    Email Filtering Using Hybrid Feature Selection Model

    Adel Hamdan Mohammad1,* , Sami Smadi2, Tariq Alwada’n3

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.2, pp. 435-450, 2022, DOI:10.32604/cmes.2022.020088

    Abstract Undoubtedly, spam is a serious problem, and the number of spam emails is increased rapidly. Besides, the massive number of spam emails prompts the need for spam detection techniques. Several methods and algorithms are used for spam filtering. Also, some emergent spam detection techniques use machine learning methods and feature extraction. Some methods and algorithms have been introduced for spam detecting and filtering. This research proposes two models for spam detection and feature selection. The first model is evaluated with the email spam classification dataset, which is based on reducing the number of keywords to its minimum. The results of… More >

  • Open Access

    ARTICLE

    Microalgae Improve the Photosynthetic Performance of Rice Seedlings (Oryza sativa L.) under Physiological Conditions and Cadmium Stress

    Ekaterina Yotsova1, Martin Stefanov1, Georgi Rashkov1, Margarita Kouzmanova2, Anelia Dobrikova1, Emilia Apostolova1,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.7, pp. 1365-1380, 2022, DOI:10.32604/phyton.2022.020566

    Abstract The aim of this study was to assess the impact of the microalgae Chlorella vulgaris on the rice seedlings at physiological conditions and under cadmium (Cd) stress. We examined the effects of C. vulgaris in the nutrient solution on rice seedlings grown hydroponically in the presence and the absence of 150 μM CdCl2, using the low (77 K) temperature and pulse amplitude modulated (PAM) chlorophyll fluorescence, P700 photooxidation measurements, photochemical activities of both photosystems, kinetic parameters of oxygen evolution, oxidative stress markers (MDA, H2O2 and proline), pigment content, growth parameters and Cd accumulation. Data revealed that the application C. vulgaris not… More >

  • Open Access

    ARTICLE

    E-mail Spam Classification Using Grasshopper Optimization Algorithm and Neural Networks

    Sanaa A. A. Ghaleb1,3,4, Mumtazimah Mohamad1, Syed Abdullah Fadzli1, Waheed A.H.M. Ghanem2,3,4,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4749-4766, 2022, DOI:10.32604/cmc.2022.020472

    Abstract Spam has turned into a big predicament these days, due to the increase in the number of spam emails, as the recipient regularly receives piles of emails. Not only is spam wasting users’ time and bandwidth. In addition, it limits the storage space of the email box as well as the disk space. Thus, spam detection is a challenge for individuals and organizations alike. To advance spam email detection, this work proposes a new spam detection approach, using the grasshopper optimization algorithm (GOA) in training a multilayer perceptron (MLP) classifier for categorizing emails as ham and spam. Hence, MLP and… More >

  • Open Access

    ARTICLE

    Image Dehazing Based on Pixel Guided CNN with PAM via Graph Cut

    Fayadh Alenezi*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3425-3443, 2022, DOI:10.32604/cmc.2022.023339

    Abstract Image dehazing is still an open research topic that has been undergoing a lot of development, especially with the renewed interest in machine learning-based methods. A major challenge of the existing dehazing methods is the estimation of transmittance, which is the key element of haze-affected imaging models. Conventional methods are based on a set of assumptions that reduce the solution search space. However, the multiplication of these assumptions tends to restrict the solutions to particular cases that cannot account for the reality of the observed image. In this paper we reduce the number of simplified hypotheses in order to attain… More >

  • Open Access

    ARTICLE

    Pseudo NLP Joint Spam Classification Technique for Big Data Cluster

    WooHyun Park1, Nawab Muhammad Faseeh Qureshi2,*, Dong Ryeol Shin1

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 517-535, 2022, DOI:10.32604/cmc.2022.021421

    Abstract Spam mail classification considered complex and error-prone task in the distributed computing environment. There are various available spam mail classification approaches such as the naive Bayesian classifier, logistic regression and support vector machine and decision tree, recursive neural network, and long short-term memory algorithms. However, they do not consider the document when analyzing spam mail content. These approaches use the bag-of-words method, which analyzes a large amount of text data and classifies features with the help of term frequency-inverse document frequency. Because there are many words in a document, these approaches consume a massive amount of resources and become infeasible… More >

Displaying 11-20 on page 2 of 39. Per Page