Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (130)
  • Open Access

    ARTICLE

    Differentially Private Support Vector Machines with Knowledge Aggregation

    Teng Wang, Yao Zhang, Jiangguo Liang, Shuai Wang, Shuanggen Liu*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3891-3907, 2024, DOI:10.32604/cmc.2024.048115

    Abstract With the widespread data collection and processing, privacy-preserving machine learning has become increasingly important in addressing privacy risks related to individuals. Support vector machine (SVM) is one of the most elementary learning models of machine learning. Privacy issues surrounding SVM classifier training have attracted increasing attention. In this paper, we investigate Differential Privacy-compliant Federated Machine Learning with Dimensionality Reduction, called FedDPDR-DPML, which greatly improves data utility while providing strong privacy guarantees. Considering in distributed learning scenarios, multiple participants usually hold unbalanced or small amounts of data. Therefore, FedDPDR-DPML enables multiple participants to collaboratively learn a global model based on weighted… More >

  • Open Access

    ARTICLE

    RoBGP: A Chinese Nested Biomedical Named Entity Recognition Model Based on RoBERTa and Global Pointer

    Xiaohui Cui1,2,#, Chao Song1,2,#, Dongmei Li1,2,*, Xiaolong Qu1,2, Jiao Long1,2, Yu Yang1,2, Hanchao Zhang3

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3603-3618, 2024, DOI:10.32604/cmc.2024.047321

    Abstract Named Entity Recognition (NER) stands as a fundamental task within the field of biomedical text mining, aiming to extract specific types of entities such as genes, proteins, and diseases from complex biomedical texts and categorize them into predefined entity types. This process can provide basic support for the automatic construction of knowledge bases. In contrast to general texts, biomedical texts frequently contain numerous nested entities and local dependencies among these entities, presenting significant challenges to prevailing NER models. To address these issues, we propose a novel Chinese nested biomedical NER model based on RoBERTa and Global Pointer (RoBGP). Our model… More >

  • Open Access

    REVIEW

    Survey and Prospect for Applying Knowledge Graph in Enterprise Risk Management

    Pengjun Li1, Qixin Zhao1, Yingmin Liu1, Chao Zhong1, Jinlong Wang1,*, Zhihan Lyu2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3825-3865, 2024, DOI:10.32604/cmc.2024.046851

    Abstract Enterprise risk management holds significant importance in fostering sustainable growth of businesses and in serving as a critical element for regulatory bodies to uphold market order. Amidst the challenges posed by intricate and unpredictable risk factors, knowledge graph technology is effectively driving risk management, leveraging its ability to associate and infer knowledge from diverse sources. This review aims to comprehensively summarize the construction techniques of enterprise risk knowledge graphs and their prominent applications across various business scenarios. Firstly, employing bibliometric methods, the aim is to uncover the developmental trends and current research hotspots within the domain of enterprise risk knowledge… More >

  • Open Access

    ARTICLE

    A Health State Prediction Model Based on Belief Rule Base and LSTM for Complex Systems

    Yu Zhao, Zhijie Zhou*, Hongdong Fan, Xiaoxia Han, Jie Wang, Manlin Chen

    Intelligent Automation & Soft Computing, Vol.39, No.1, pp. 73-91, 2024, DOI:10.32604/iasc.2024.042285

    Abstract In industrial production and engineering operations, the health state of complex systems is critical, and predicting it can ensure normal operation. Complex systems have many monitoring indicators, complex coupling structures, non-linear and time-varying characteristics, so it is a challenge to establish a reliable prediction model. The belief rule base (BRB) can fuse observed data and expert knowledge to establish a nonlinear relationship between input and output and has well modeling capabilities. Since each indicator of the complex system can reflect the health state to some extent, the BRB is built based on the causal relationship between system indicators and the… More >

  • Open Access

    ARTICLE

    Use of Patient-Specific “4D” Tele-Education to Enhance Actual and Perceived Knowledge in Congenital Heart Disease (CHD) Patients

    Molly Clarke1,*, Karin Hamann2, Nancy Klein2, Laura Olivieri3, Yue-Hin Loke2

    Congenital Heart Disease, Vol.19, No.1, pp. 5-17, 2024, DOI:10.32604/chd.2024.046328

    Abstract Background: Patients with congenital heart disease (CHD) will transition to lifelong adult congenital cardiac care. However, their structural heart disease is challenging to convey via two-dimensional drawings. This study utilized a tele-educational environment, with personalized three-dimensional (3D) modeling and health Details (3D + Details = “4D”), to improve actual and perceived knowledge, both important components of transition readiness in CHD patients. Methods: Participants aged ≥13 years with a history of CHD and cardiac magnetic resonance imaging (MRI) studies were eligible. Cardiac MRI datasets were then used to segment and create 3D heart models (using Mimics, Materialize Inc.). Participants first completed… More >

  • Open Access

    ARTICLE

    A Fair and Trusted Trading Scheme for Medical Data Based on Smart Contracts

    Xiaohui Yang, Kun Zhang*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1843-1859, 2024, DOI:10.32604/cmc.2023.047660

    Abstract Data is regarded as a valuable asset, and sharing data is a prerequisite for fully exploiting the value of data. However, the current medical data sharing scheme lacks a fair incentive mechanism, and the authenticity of data cannot be guaranteed, resulting in low enthusiasm of participants. A fair and trusted medical data trading scheme based on smart contracts is proposed, which aims to encourage participants to be honest and improve their enthusiasm for participation. The scheme uses zero-knowledge range proof for trusted verification, verifies the authenticity of the patient’s data and the specific attributes of the data before the transaction,… More >

  • Open Access

    ARTICLE

    Recommendation Method for Contrastive Enhancement of Neighborhood Information

    Hairong Wang, Beijing Zhou*, Lisi Zhang, He Ma

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 453-472, 2024, DOI:10.32604/cmc.2023.046560

    Abstract Knowledge graph can assist in improving recommendation performance and is widely applied in various personalized recommendation domains. However, existing knowledge-aware recommendation methods face challenges such as weak user-item interaction supervisory signals and noise in the knowledge graph. To tackle these issues, this paper proposes a neighbor information contrast-enhanced recommendation method by adding subtle noise to construct contrast views and employing contrastive learning to strengthen supervisory signals and reduce knowledge noise. Specifically, first, this paper adopts heterogeneous propagation and knowledge-aware attention networks to obtain multi-order neighbor embedding of users and items, mining the high-order neighbor information of users and items. Next,… More >

  • Open Access

    ARTICLE

    Network Configuration Entity Extraction Method Based on Transformer with Multi-Head Attention Mechanism

    Yang Yang1, Zhenying Qu1, Zefan Yan1, Zhipeng Gao1,*, Ti Wang2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 735-757, 2024, DOI:10.32604/cmc.2023.045807

    Abstract Nowadays, ensuring the quality of network services has become increasingly vital. Experts are turning to knowledge graph technology, with a significant emphasis on entity extraction in the identification of device configurations. This research paper presents a novel entity extraction method that leverages a combination of active learning and attention mechanisms. Initially, an improved active learning approach is employed to select the most valuable unlabeled samples, which are subsequently submitted for expert labeling. This approach successfully addresses the problems of isolated points and sample redundancy within the network configuration sample set. Then the labeled samples are utilized to train the model… More >

  • Open Access

    ARTICLE

    IndRT-GCNets: Knowledge Reasoning with Independent Recurrent Temporal Graph Convolutional Representations

    Yajing Ma1,2,3, Gulila Altenbek1,2,3,*, Yingxia Yu1

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 695-712, 2024, DOI:10.32604/cmc.2023.045486

    Abstract Due to the structural dependencies among concurrent events in the knowledge graph and the substantial amount of sequential correlation information carried by temporally adjacent events, we propose an Independent Recurrent Temporal Graph Convolution Networks (IndRT-GCNets) framework to efficiently and accurately capture event attribute information. The framework models the knowledge graph sequences to learn the evolutionary representations of entities and relations within each period. Firstly, by utilizing the temporal graph convolution module in the evolutionary representation unit, the framework captures the structural dependency relationships within the knowledge graph in each period. Meanwhile, to achieve better event representation and establish effective correlations,… More >

  • Open Access

    ARTICLE

    A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain

    Yurong Luo, Wei You*, Chao Shang, Xiongpeng Ren, Jin Cao, Hui Li

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 2237-2260, 2024, DOI:10.32604/cmes.2023.045679

    Abstract The dynamic landscape of the Internet of Things (IoT) is set to revolutionize the pace of interaction among entities, ushering in a proliferation of applications characterized by heightened quality and diversity. Among the pivotal applications within the realm of IoT, as a significant example, the Smart Grid (SG) evolves into intricate networks of energy deployment marked by data integration. This evolution concurrently entails data interchange with other IoT entities. However, there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem. In this paper, we introduce a hierarchical secure data-sharing platform empowered… More >

Displaying 1-10 on page 1 of 130. Per Page