Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    Mathematical Named Entity Recognition Based on Adversarial Training and Self-Attention

    Qiuyu Lai1,2, Wang Kang3, Lei Yang1,2, Chun Yang1,2,*, Delin Zhang2,*

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 649-664, 2024, DOI:10.32604/iasc.2024.051724 - 06 September 2024

    Abstract Mathematical named entity recognition (MNER) is one of the fundamental tasks in the analysis of mathematical texts. To solve the existing problems of the current neural network that has local instability, fuzzy entity boundary, and long-distance dependence between entities in Chinese mathematical entity recognition task, we propose a series of optimization processing methods and constructed an Adversarial Training and Bidirectional long short-term memory-Selfattention Conditional random field (AT-BSAC) model. In our model, the mathematical text was vectorized by the word embedding technique, and small perturbations were added to the word vector to generate adversarial samples, while More >

  • Open Access

    ARTICLE

    Chinese Cyber Threat Intelligence Named Entity Recognition via RoBERTa-wwm-RDCNN-CRF

    Zhen Zhen1, Jian Gao1,2,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 299-323, 2023, DOI:10.32604/cmc.2023.042090 - 31 October 2023

    Abstract In recent years, cyber attacks have been intensifying and causing great harm to individuals, companies, and countries. The mining of cyber threat intelligence (CTI) can facilitate intelligence integration and serve well in combating cyber attacks. Named Entity Recognition (NER), as a crucial component of text mining, can structure complex CTI text and aid cybersecurity professionals in effectively countering threats. However, current CTI NER research has mainly focused on studying English CTI. In the limited studies conducted on Chinese text, existing models have shown poor performance. To fully utilize the power of Chinese pre-trained language models… More >

  • Open Access

    ARTICLE

    Modelling of Wideband Concentric Ring Frequency Selective Surface for 5G Devices

    Ankush Kapoor1, Pradeep Kumar2,*, Ranjan Mishra3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 341-361, 2023, DOI:10.32604/cmc.2023.028874 - 22 September 2022

    Abstract Frequency selective surfaces (FSSs) play an important role in wireless systems as these can be used as filters, in isolating the unwanted radiation, in microstrip patch antennas for improving the performance of these antennas and in other 5G applications. The analysis and design of the double concentric ring frequency selective surface (DCRFSS) is presented in this research. In the sub-6 GHz 5G FR1 spectrum, a computational synthesis technique for creating DCRFSS based spatial filters is proposed. The analytical tools presented in this study can be used to gain a better understanding of filtering processes and… More >

  • Open Access

    ARTICLE

    CNN and Fuzzy Rules Based Text Detection and Recognition from Natural Scenes

    T. Mithila1,*, R. Arunprakash2, A. Ramachandran3

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1165-1179, 2022, DOI:10.32604/csse.2022.023308 - 08 February 2022

    Abstract In today’s real world, an important research part in image processing is scene text detection and recognition. Scene text can be in different languages, fonts, sizes, colours, orientations and structures. Moreover, the aspect ratios and layouts of a scene text may differ significantly. All these variations appear assignificant challenges for the detection and recognition algorithms that are considered for the text in natural scenes. In this paper, a new intelligent text detection and recognition method for detectingthe text from natural scenes and forrecognizing the text by applying the newly proposed Conditional Random Field-based fuzzy rules… More >

  • Open Access

    ARTICLE

    Understand Students Feedback Using Bi-Integrated CRF Model Based Target Extraction

    K. Sangeetha1,*, D. Prabha2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 735-747, 2022, DOI:10.32604/csse.2022.019310 - 09 September 2021

    Abstract Educational institutions showing interest to find the opinion of the students about their course and the instructors to enhance the teaching-learning process. For this, most research uses sentiment analysis to track students’ behavior. Traditional sentence-level sentiment analysis focuses on the whole sentence sentiment. Previous studies show that the sentiments alone are not enough to observe the feeling of the students because different words express different sentiments in a sentence. There is a need to extract the targets in a given sentence which helps to find the sentiment towards those targets. Target extraction is the subtask More >

  • Open Access

    ARTICLE

    A Hybrid Method of Coreference Resolution in Information Security

    Yongjin Hu1, Yuanbo Guo1, Junxiu Liu2, Han Zhang3, *

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1297-1315, 2020, DOI:10.32604/cmc.2020.010855 - 10 June 2020

    Abstract In the field of information security, a gap exists in the study of coreference resolution of entities. A hybrid method is proposed to solve the problem of coreference resolution in information security. The work consists of two parts: the first extracts all candidates (including noun phrases, pronouns, entities, and nested phrases) from a given document and classifies them; the second is coreference resolution of the selected candidates. In the first part, a method combining rules with a deep learning model (Dictionary BiLSTM-Attention-CRF, or DBAC) is proposed to extract all candidates in the text and classify… More >

Displaying 1-10 on page 1 of 6. Per Page