Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Chinese Clinical Named Entity Recognition Using Multi-Feature Fusion and Multi-Scale Local Context Enhancement

    Meijing Li*, Runqing Huang, Xianxian Qi

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2283-2299, 2024, DOI:10.32604/cmc.2024.053630

    Abstract Chinese Clinical Named Entity Recognition (CNER) is a crucial step in extracting medical information and is of great significance in promoting medical informatization. However, CNER poses challenges due to the specificity of clinical terminology, the complexity of Chinese text semantics, and the uncertainty of Chinese entity boundaries. To address these issues, we propose an improved CNER model, which is based on multi-feature fusion and multi-scale local context enhancement. The model simultaneously fuses multi-feature representations of pinyin, radical, Part of Speech (POS), word boundary with BERT deep contextual representations to enhance the semantic representation of text… More >

  • Open Access

    ARTICLE

    Posture Detection of Heart Disease Using Multi-Head Attention Vision Hybrid (MHAVH) Model

    Hina Naz1, Zuping Zhang1,*, Mohammed Al-Habib1, Fuad A. Awwad2, Emad A. A. Ismail2, Zaid Ali Khan3

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2673-2696, 2024, DOI:10.32604/cmc.2024.049186

    Abstract Cardiovascular disease is the leading cause of death globally. This disease causes loss of heart muscles and is also responsible for the death of heart cells, sometimes damaging their functionality. A person’s life may depend on receiving timely assistance as soon as possible. Thus, minimizing the death ratio can be achieved by early detection of heart attack (HA) symptoms. In the United States alone, an estimated 610,000 people die from heart attacks each year, accounting for one in every four fatalities. However, by identifying and reporting heart attack symptoms early on, it is possible to… More >

  • Open Access

    ARTICLE

    Implementation of Rapid Code Transformation Process Using Deep Learning Approaches

    Bao Rong Chang1, Hsiu-Fen Tsai2,*, Han-Lin Chou1

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 107-134, 2023, DOI:10.32604/cmes.2023.024018

    Abstract Our previous work has introduced the newly generated program using the code transformation model GPT-2, verifying the generated programming codes through simhash (SH) and longest common subsequence (LCS) algorithms. However, the entire code transformation process has encountered a time-consuming problem. Therefore, the objective of this study is to speed up the code transformation process significantly. This paper has proposed deep learning approaches for modifying SH using a variational simhash (VSH) algorithm and replacing LCS with a piecewise longest common subsequence (PLCS) algorithm to faster the verification process in the test phase. Besides the code transformation More > Graphic Abstract

    Implementation of Rapid Code Transformation Process Using Deep Learning Approaches

  • Open Access

    ARTICLE

    Code Transform Model Producing High-Performance Program

    Bao Rong Chang1,*, Hsiu-Fen Tsai2, Po-Wen Su1

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.1, pp. 253-277, 2021, DOI:10.32604/cmes.2021.015673

    Abstract This paper introduces a novel transform method to produce the newly generated programs through code transform model called the second generation of Generative Pre-trained Transformer (GPT-2) reasonably, improving the program execution performance significantly. Besides, a theoretical estimation in statistics has given the minimum number of generated programs as required, which guarantees to find the best one within them. The proposed approach can help the voice assistant machine resolve the problem of inefficient execution of application code. In addition to GPT-2, this study develops the variational Simhash algorithm to check the code similarity between sample program More >

  • Open Access

    ARTICLE

    An Encrypted Image Retrieval Method Based on SimHash in Cloud Computing

    Jiaohua Qin1, Yusi Cao1, Xuyu Xiang1, *, Yun Tan1, Lingyun Xiang2, Jianjun Zhang3

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 389-399, 2020, DOI:10.32604/cmc.2020.07819

    Abstract With the massive growth of images data and the rise of cloud computing that can provide cheap storage space and convenient access, more and more users store data in cloud server. However, how to quickly query the expected data with privacy-preserving is still a challenging in the encryption image data retrieval. Towards this goal, this paper proposes a ciphertext image retrieval method based on SimHash in cloud computing. Firstly, we extract local feature of images, and then cluster the features by K-means. Based on it, the visual word codebook is introduced to represent feature information More >

Displaying 1-10 on page 1 of 5. Per Page