Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (63)
  • Open Access

    ARTICLE

    An Optimized Chinese Filtering Model Using Value Scale Extended Text Vector

    Siyu Lu1, Ligao Cai1, Zhixin Liu2, Shan Liu1, Bo Yang1, Lirong Yin3, Mingzhe Liu4, Wenfeng Zheng1,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1881-1899, 2023, DOI:10.32604/csse.2023.034853 - 28 July 2023

    Abstract With the development of Internet technology, the explosive growth of Internet information presentation has led to difficulty in filtering effective information. Finding a model with high accuracy for text classification has become a critical problem to be solved by text filtering, especially for Chinese texts. This paper selected the manually calibrated Douban movie website comment data for research. First, a text filtering model based on the BP neural network has been built; Second, based on the Term Frequency-Inverse Document Frequency (TF-IDF) vector space model and the doc2vec method, the text word frequency vector and the More >

  • Open Access

    ARTICLE

    PCATNet: Position-Class Awareness Transformer for Image Captioning

    Ziwei Tang1, Yaohua Yi2,*, Changhui Yu2, Aiguo Yin3

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6007-6022, 2023, DOI:10.32604/cmc.2023.037861 - 29 April 2023

    Abstract Existing image captioning models usually build the relation between visual information and words to generate captions, which lack spatial information and object classes. To address the issue, we propose a novel Position-Class Awareness Transformer (PCAT) network which can serve as a bridge between the visual features and captions by embedding spatial information and awareness of object classes. In our proposal, we construct our PCAT network by proposing a novel Grid Mapping Position Encoding (GMPE) method and refining the encoder-decoder framework. First, GMPE includes mapping the regions of objects to grids, calculating the relative distance among… More >

  • Open Access

    ARTICLE

    Whale Optimization Algorithm-Based Deep Learning Model for Driver Identification in Intelligent Transport Systems

    Yuzhou Li*, Chuanxia Sun, Yinglei Hu

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3497-3515, 2023, DOI:10.32604/cmc.2023.035878 - 31 March 2023

    Abstract Driver identification in intelligent transport systems has immense demand, considering the safety and convenience of traveling in a vehicle. The rapid growth of driver assistance systems (DAS) and driver identification system propels the need for understanding the root causes of automobile accidents. Also, in the case of insurance, it is necessary to track the number of drivers who commonly drive a car in terms of insurance pricing. It is observed that drivers with frequent records of paying “fines” are compelled to pay higher insurance payments than drivers without any penalty records. Thus driver identification act… More >

  • Open Access

    ARTICLE

    Infrared Spectroscopy-Based Chemometric Analysis for Lard Differentiation in Meat Samples

    Muhammad Aadil Siddiqui1,*, M. H. Md Khir1, Zaka Ullah2, Muath Al Hasan2, Abdul Saboor3, Saeed Ahmed Magsi1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2859-2871, 2023, DOI:10.32604/cmc.2023.034164 - 31 March 2023

    Abstract One of the most pressing concerns for the consumer market is the detection of adulteration in meat products due to their preciousness. The rapid and accurate identification mechanism for lard adulteration in meat products is highly necessary, for developing a mechanism trusted by consumers and that can be used to make a definitive diagnosis. Fourier Transform Infrared Spectroscopy (FTIR) is used in this work to identify lard adulteration in cow, lamb, and chicken samples. A simplified extraction method was implied to obtain the lipids from pure and adulterated meat. Adulterated samples were obtained by mixing… More >

  • Open Access

    ARTICLE

    Changes of protein expression during tumorosphere formation of small cell lung cancer circulating tumor cells

    SANDRA STICKLER1, BARBARA RATH1, MAXIMILIAN HOCHMAIR2, CLEMENS LANG3, LUKAS WEIGL4, GERHARD HAMILTON1,*

    Oncology Research, Vol.31, No.1, pp. 13-22, 2023, DOI:10.32604/or.2022.027281 - 01 March 2023

    Abstract Small cell lung cancer (SCLC) is frequently disseminated and has a dismal prognosis with survival times of approximately two years. This cancer responds well to initial chemotherapy but recurs within a short time as a globally chemoresistant tumor. Circulating tumor cells (CTCs) are held responsible for metastasis, the extremely high numbers of these cells in advanced SCLC allowed us to establish several permanent CTC cell lines. These CTCs are distinguished by the spontaneous formation of large spheroids, termed tumorospheres, in regular tissue culture. These contain quiescent and hypoxic cells in their interior and are associated… More >

  • Open Access

    ARTICLE

    An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection

    Deris Stiawan1, Ali Bardadi1, Nurul Afifah1, Lisa Melinda1, Ahmad Heryanto1, Tri Wanda Septian1, Mohd Yazid Idris2, Imam Much Ibnu Subroto3, Lukman4, Rahmat Budiarto5,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1759-1774, 2023, DOI:10.32604/csse.2023.034047 - 09 February 2023

    Abstract The Repository Mahasiswa (RAMA) is a national repository of research reports in the form of final assignments, student projects, theses, dissertations, and research reports of lecturers or researchers that have not yet been published in journals, conferences, or integrated books from the scientific repository of universities and research institutes in Indonesia. The increasing popularity of the RAMA Repository leads to security issues, including the two most widespread, vulnerable attacks i.e., Structured Query Language (SQL) injection and cross-site scripting (XSS) attacks. An attacker gaining access to data and performing unauthorized data modifications is extremely dangerous. This… More >

  • Open Access

    ARTICLE

    Chi-Square and PCA Based Feature Selection for Diabetes Detection with Ensemble Classifier

    Vaibhav Rupapara1, Furqan Rustam2, Abid Ishaq2, Ernesto Lee3, Imran Ashraf4,*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1931-1949, 2023, DOI:10.32604/iasc.2023.028257 - 05 January 2023

    Abstract Diabetes mellitus is a metabolic disease that is ranked among the top 10 causes of death by the world health organization. During the last few years, an alarming increase is observed worldwide with a 70% rise in the disease since 2000 and an 80% rise in male deaths. If untreated, it results in complications of many vital organs of the human body which may lead to fatality. Early detection of diabetes is a task of significant importance to start timely treatment. This study introduces a methodology for the classification of diabetic and normal people using… More >

  • Open Access

    ARTICLE

    3D Face Reconstruction from a Single Image Using a Combined PCA-LPP Method

    Jee-Sic Hur1, Hyeong-Geun Lee1, Shinjin Kang2, Yeo Chan Yoon3, Soo Kyun Kim1,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6213-6227, 2023, DOI:10.32604/cmc.2023.035344 - 28 December 2022

    Abstract In this paper, we proposed a combined PCA-LPP algorithm to improve 3D face reconstruction performance. Principal component analysis (PCA) is commonly used to compress images and extract features. One disadvantage of PCA is local feature loss. To address this, various studies have proposed combining a PCA-LPP-based algorithm with a locality preserving projection (LPP). However, the existing PCA-LPP method is unsuitable for 3D face reconstruction because it focuses on data classification and clustering. In the existing PCA-LPP, the adjacency graph, which primarily shows the connection relationships between data, is composed of the e-or k-nearest neighbor techniques. More >

  • Open Access

    ARTICLE

    Suicide Ideation Detection of Covid Patients Using Machine Learning Algorithm

    R. Punithavathi1,*, S. Thenmozhi2, R. Jothilakshmi3, V. Ellappan4, Islam Md Tahzib Ul5

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 247-261, 2023, DOI:10.32604/csse.2023.025972 - 16 August 2022

    Abstract During Covid pandemic, many individuals are suffering from suicidal ideation in the world. Social distancing and quarantining, affects the patient emotionally. Affective computing is the study of recognizing human feelings and emotions. This technology can be used effectively during pandemic for facial expression recognition which automatically extracts the features from the human face. Monitoring system plays a very important role to detect the patient condition and to recognize the patterns of expression from the safest distance. In this paper, a new method is proposed for emotion recognition and suicide ideation detection in COVID patients. This More >

  • Open Access

    ARTICLE

    Investigation of Android Malware with Machine Learning Classifiers using Enhanced PCA Algorithm

    V. Joseph Raymond1,2,*, R. Jeberson Retna Raj1

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2147-2163, 2023, DOI:10.32604/csse.2023.028227 - 01 August 2022

    Abstract Android devices are popularly available in the commercial market at different price levels for various levels of customers. The Android stack is more vulnerable compared to other platforms because of its open-source nature. There are many android malware detection techniques available to exploit the source code and find associated components during execution time. To obtain a better result we create a hybrid technique merging static and dynamic processes. In this paper, in the first part, we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid… More >

Displaying 21-30 on page 3 of 63. Per Page