Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (28)
  • Open Access

    ARTICLE

    Developing Lexicons for Enhanced Sentiment Analysis in Software Engineering: An Innovative Multilingual Approach for Social Media Reviews

    Zohaib Ahmad Khan1, Yuanqing Xia1,*, Ahmed Khan2, Muhammad Sadiq2, Mahmood Alam3, Fuad A. Awwad4, Emad A. A. Ismail4

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2771-2793, 2024, DOI:10.32604/cmc.2024.046897

    Abstract Sentiment analysis is becoming increasingly important in today’s digital age, with social media being a significant source of user-generated content. The development of sentiment lexicons that can support languages other than English is a challenging task, especially for analyzing sentiment analysis in social media reviews. Most existing sentiment analysis systems focus on English, leaving a significant research gap in other languages due to limited resources and tools. This research aims to address this gap by building a sentiment lexicon for local languages, which is then used with a machine learning algorithm for efficient sentiment analysis. In the first step, a… More >

  • Open Access

    ARTICLE

    An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data

    Linlin Yuan1,2, Tiantian Zhang1,3, Yuling Chen1,*, Yuxiang Yang1, Huang Li1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1561-1579, 2024, DOI:10.32604/cmc.2023.046907

    Abstract The development of technologies such as big data and blockchain has brought convenience to life, but at the same time, privacy and security issues are becoming more and more prominent. The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users’ privacy by anonymizing big data. However, the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability. In addition, ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced. Based on this, we propose a… More >

  • Open Access

    REVIEW

    Targeting brain tumors with innovative nanocarriers: bridging the gap through the blood-brain barrier

    KARAN WADHWA1, PAYAL CHAUHAN1, SHOBHIT KUMAR2, RAKESH PAHWA3,*, RAVINDER VERMA4, RAJAT GOYAL5, GOVIND SINGH1, ARCHANA SHARMA6, NEHA RAO3, DEEPAK KAUSHIK1,*

    Oncology Research, Vol.32, No.5, pp. 877-897, 2024, DOI:10.32604/or.2024.047278

    Abstract Background: Glioblastoma multiforme (GBM) is recognized as the most lethal and most highly invasive tumor. The high likelihood of treatment failure arises from the presence of the blood-brain barrier (BBB) and stem cells around GBM, which avert the entry of chemotherapeutic drugs into the tumor mass. Objective: Recently, several researchers have designed novel nanocarrier systems like liposomes, dendrimers, metallic nanoparticles, nanodiamonds, and nanorobot approaches, allowing drugs to infiltrate the BBB more efficiently, opening up innovative avenues to prevail over therapy problems and radiation therapy. Methods: Relevant literature for this manuscript has been collected from a comprehensive and systematic search of… More > Graphic Abstract

    Targeting brain tumors with innovative nanocarriers: bridging the gap through the blood-brain barrier

  • Open Access

    ARTICLE

    A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM

    Navaneetha Krishnan Muthunambu1, Senthil Prabakaran2, Balasubramanian Prabhu Kavin3, Kishore Senthil Siruvangur4, Kavitha Chinnadurai1, Jehad Ali5,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3089-3127, 2024, DOI:10.32604/cmc.2023.043172

    Abstract The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the Internet. Regrettably, this development has expanded the potential targets that hackers might exploit. Without adequate safeguards, data transmitted on the internet is significantly more susceptible to unauthorized access, theft, or alteration. The identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious attacks. This research paper introduces a novel intrusion detection framework that utilizes Recurrent Neural Networks (RNN) integrated with… More >

  • Open Access

    ARTICLE

    Energy and Exergy Analysis of Pyramid-Type Solar Still Coupled with Magnetic and Electrical Effects by Using Matlab Simulation

    Karrar A. Hammoodi1,*, Hayder A. Dhahad2, Wissam H. Alawee3, Z. M. Omara4

    Frontiers in Heat and Mass Transfer, Vol.22, No.1, pp. 217-262, 2024, DOI:10.32604/fhmt.2024.047329

    Abstract In the face of an escalating global water crisis, countries worldwide grapple with the crippling effects of scarcity, jeopardizing economic progress and hindering societal advancement. Solar energy emerges as a beacon of hope, offering a sustainable and environmentally friendly solution to desalination. Solar distillation technology, harnessing the power of the sun, transforms seawater into freshwater, expanding the availability of this precious resource. Optimizing solar still performance under specific climatic conditions and evaluating different configurations is crucial for practical implementation and widespread adoption of solar energy. In this study, we conducted theoretical investigations on three distinct solar still configurations to evaluate… More > Graphic Abstract

    Energy and Exergy Analysis of Pyramid-Type Solar Still Coupled with Magnetic and Electrical Effects by Using Matlab Simulation

  • Open Access

    ARTICLE

    An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault

    Syeda Wajiha Zahra1, Muhammad Nadeem2, Ali Arshad3,*, Saman Riaz3, Muhammad Abu Bakr4, Ashit Kumar Dutta5, Zaid Alzaid6, Badr Almutairi7, Sultan Almotairi8

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 589-616, 2024, DOI:10.32604/cmc.2023.042386

    Abstract Various organizations store data online rather than on physical servers. As the number of user’s data stored in cloud servers increases, the attack rate to access data from cloud servers also increases. Different researchers worked on different algorithms to protect cloud data from replay attacks. None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack. This study presents the development of a TKN (Text, Key and Name) cryptographic algorithm aimed at protecting data from replay attacks. The program employs distinct ways to encrypt plain text [P], a user-defined Key [K], and a Secret Code… More >

  • Open Access

    ARTICLE

    An Innovative Deep Architecture for Flight Safety Risk Assessment Based on Time Series Data

    Hong Sun1, Fangquan Yang2, Peiwen Zhang3,*, Yang Jiao4, Yunxiang Zhao5

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2549-2569, 2024, DOI:10.32604/cmes.2023.030131

    Abstract With the development of the integration of aviation safety and artificial intelligence, research on the combination of risk assessment and artificial intelligence is particularly important in the field of risk management, but searching for an efficient and accurate risk assessment algorithm has become a challenge for the civil aviation industry. Therefore, an improved risk assessment algorithm (PS-AE-LSTM) based on long short-term memory network (LSTM) with autoencoder (AE) is proposed for the various supervised deep learning algorithms in flight safety that cannot adequately address the problem of the quality on risk level labels. Firstly, based on the normal distribution characteristics of… More >

  • Open Access

    ARTICLE

    An Innovative Finite Element Geometric Modeling of Single-Layer Multi-Bead WAAMed Part

    Xiangman Zhou1,*, Jingping Qin1, Zichuan Fu1, Min Wang1, Youlu Yuan1, Junjian Fu1, Haiou Zhang2, Seyed Reza Elmi Hosseini3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2383-2401, 2024, DOI:10.32604/cmes.2023.029249

    Abstract Finite element (FE) coupled thermal-mechanical analysis is widely used to predict the deformation and residual stress of wire arc additive manufacturing (WAAM) parts. In this study, an innovative single-layer multi-bead profile geometric modeling method through the isosceles trapezoid function is proposed to build the FE model of the WAAM process. Firstly, a straight-line model for overlapping beads based on the parabola function was established to calculate the optimal center distance. Then, the isosceles trapezoid-based profile was employed to replace the parabola profiles of the parabola-based overlapping model to establish an innovative isosceles trapezoid-based multi-bead overlapping geometric model. The rationality of… More >

  • Open Access

    ARTICLE

    Explainable AI and Interpretable Model for Insurance Premium Prediction

    Umar Abdulkadir Isa*, Anil Fernando*

    Journal on Artificial Intelligence, Vol.5, pp. 31-42, 2023, DOI:10.32604/jai.2023.040213

    Abstract Traditional machine learning metrics (TMLMs) are quite useful for the current research work precision, recall, accuracy, MSE and RMSE. Not enough for a practitioner to be confident about the performance and dependability of innovative interpretable model 85%–92%. We included in the prediction process, machine learning models (MLMs) with greater than 99% accuracy with a sensitivity of 95%–98% and specifically in the database. We need to explain the model to domain specialists through the MLMs. Human-understandable explanations in addition to ML professionals must establish trust in the prediction of our model. This is achieved by creating a model-independent, locally accurate explanation… More >

  • Open Access

    ARTICLE

    An Innovative Technique for Constructing Highly Non-Linear Components of Block Cipher for Data Security against Cyber Attacks

    Abid Mahboob1, Muhammad Asif2, Rana Muhammad Zulqarnain3,*, Imran Siddique4, Hijaz Ahmad5, Sameh Askar6, Giovanni Pau7

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2547-2562, 2023, DOI:10.32604/csse.2023.040855

    Abstract The rapid advancement of data in web-based communication has created one of the biggest issues concerning the security of data carried over the internet from unauthorized access. To improve data security, modern cryptosystems use substitution-boxes. Nowadays, data privacy has become a key concern for consumers who transfer sensitive data from one place to another. To address these problems, many companies rely on cryptographic techniques to secure data from illegal activities and assaults. Among these cryptographic approaches, AES is a well-known algorithm that transforms plain text into cipher text by employing substitution box (S-box). The S-box disguises the relationship between cipher… More >

Displaying 1-10 on page 1 of 28. Per Page