Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Detecting Ethereum Ponzi Schemes Through Opcode Context Analysis and Oversampling-Based AdaBoost Algorithm

    Mengxiao Wang1,2, Jing Huang1,2,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1023-1042, 2023, DOI:10.32604/csse.2023.039569

    Abstract Due to the anonymity of blockchain, frequent security incidents and attacks occur through it, among which the Ponzi scheme smart contract is a classic type of fraud resulting in huge economic losses. Machine learning-based methods are believed to be promising for detecting ethereum Ponzi schemes. However, there are still some flaws in current research, e.g., insufficient feature extraction of Ponzi scheme smart contracts, without considering class imbalance. In addition, there is room for improvement in detection precision. Aiming at the above problems, this paper proposes an ethereum Ponzi scheme detection scheme through opcode context analysis and adaptive boosting (AdaBoost) algorithm.… More >

  • Open Access

    ARTICLE

    Deep Learning Algorithm for Detection of Protein Remote Homology

    Fahriye Gemci1,*, Turgay Ibrikci2, Ulus Cevik3

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3703-3713, 2023, DOI:10.32604/csse.2023.032706

    Abstract The study aims to find a successful solution by using computer algorithms to detect remote homologous proteins, which is a significant problem in the bioinformatics field. In this experimental study, structural classification of proteins (SCOP) 1.53, SCOP benchmark, and the newly created SCOP protein database from the structural classification of proteins—extended (SCOPe) 2.07 were used to detect remote homolog proteins. N-gram method and then Term Frequency-Inverse Document Frequency (TF-IDF) weighting were performed to extract features of the protein sequences taken from these databases. Next, a smoothing process on the obtained features was performed to avoid misclassification. Finally, the proteins with… More >

  • Open Access

    ARTICLE

    Deep Learning with Natural Language Processing Enabled Sentimental Analysis on Sarcasm Classification

    Abdul Rahaman Wahab Sait1,*, Mohamad Khairi Ishak2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2553-2567, 2023, DOI:10.32604/csse.2023.029603

    Abstract Sentiment analysis (SA) is the procedure of recognizing the emotions related to the data that exist in social networking. The existence of sarcasm in textual data is a major challenge in the efficiency of the SA. Earlier works on sarcasm detection on text utilize lexical as well as pragmatic cues namely interjection, punctuations, and sentiment shift that are vital indicators of sarcasm. With the advent of deep-learning, recent works, leveraging neural networks in learning lexical and contextual features, removing the need for handcrafted feature. In this aspect, this study designs a deep learning with natural language processing enabled SA (DLNLP-SA)… More >

  • Open Access

    ARTICLE

    The Method for Extracting New Login Sentiment Words from Chinese Micro-Blog Basedf on Improved Mutual Information

    Guangli Zhu, Wenting Liu, Shunxiang Zhang*, Xiang Chen , Chang Yin

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 223-232, 2020, DOI:10.32604/csse.2020.35.223

    Abstract The current method of extracting new login sentiment words not only ignores the diversity of patterns constituted by new multi-character words (the number of words is greater than two), but also disregards the influence of other new words co-occurring with a new word connoting sentiment. To solve this problem, this paper proposes a method for extracting new login sentiment words from Chinese micro-blog based on improved mutual information. First, micro-blog data are preprocessed, taking into consideration some nonsense signals such as web links and punctuation. Based on preprocessed data, the candidate strings are obtained by applying the N-gram segmentation method.… More >

Displaying 1-10 on page 1 of 4. Per Page