Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Predicting and Curing Depression Using Long Short Term Memory and Global Vector

    Ayan Kumar1, Abdul Quadir Md1, J. Christy Jackson1,*, Celestine Iwendi2

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5837-5852, 2023, DOI:10.32604/cmc.2023.033431 - 28 December 2022

    Abstract In today’s world, there are many people suffering from mental health problems such as depression and anxiety. If these conditions are not identified and treated early, they can get worse quickly and have far-reaching negative effects. Unfortunately, many people suffering from these conditions, especially depression and hypertension, are unaware of their existence until the conditions become chronic. Thus, this paper proposes a novel approach using Bi-directional Long Short-Term Memory (Bi-LSTM) algorithm and Global Vector (GloVe) algorithm for the prediction and treatment of these conditions. Smartwatches and fitness bands can be equipped with these algorithms which… More >

  • Open Access

    ARTICLE

    Image Captioning Using Detectors and Swarm Based Learning Approach for Word Embedding Vectors

    B. Lalitha1,*, V. Gomathi2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 173-189, 2023, DOI:10.32604/csse.2023.024118 - 01 June 2022

    Abstract IC (Image Captioning) is a crucial part of Visual Data Processing and aims at understanding for providing captions that verbalize an image’s important elements. However, in existing works, because of the complexity in images, neglecting major relation between the object in an image, poor quality image, labelling it remains a big problem for researchers. Hence, the main objective of this work attempts to overcome these challenges by proposing a novel framework for IC. So in this research work the main contribution deals with the framework consists of three phases that is image understanding, textual understanding and… More >

  • Open Access

    ARTICLE

    Insider Threat Detection Based on NLP Word Embedding and Machine Learning

    Mohd Anul Haq1, Mohd Abdul Rahim Khan1,*, Mohammed Alshehri2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 619-635, 2022, DOI:10.32604/iasc.2022.021430 - 05 January 2022

    Abstract The growth of edge computing, the Internet of Things (IoT), and cloud computing have been accompanied by new security issues evolving in the information security infrastructure. Recent studies suggest that the cost of insider attacks is higher than the external threats, making it an essential aspect of information security for organizations. Efficient insider threat detection requires state-of-the-art Artificial Intelligence models and utility. Although significant have been made to detect insider threats for more than a decade, there are many limitations, including a lack of real data, low accuracy, and a relatively low false alarm, which… More >

Displaying 1-10 on page 1 of 3. Per Page