Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    A Data Mining Approach to Detecting Bias and Favoritism in Public Procurement

    Yeferson Torres-Berru1,2,*, Vivian F. Lopez-Batista1, Lorena Conde Zhingre3

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3501-3516, 2023, DOI:10.32604/iasc.2023.035367

    Abstract In a public procurement process, corruption can occur at each stage, favoring a participant with a previous agreement, which can result in over-pricing and purchases of substandard products, as well as gender discrimination. This paper’s aim is to detect biased purchases using a Spanish Language corpus, analyzing text from the questions and answers registry platform by applicants in a public procurement process in Ecuador. Additionally, gender bias is detected, promoting both men and women to participate under the same conditions. In order to detect gender bias and favoritism towards certain providers by contracting entities, the study proposes a unique hybrid… More >

  • Open Access

    ARTICLE

    Chinese News Text Classification Based on Convolutional Neural Network

    Hanxu Wang, Xin Li*

    Journal on Big Data, Vol.4, No.1, pp. 41-60, 2022, DOI:10.32604/jbd.2022.027717

    Abstract With the explosive growth of Internet text information, the task of text classification is more important. As a part of text classification, Chinese news text classification also plays an important role. In public security work, public opinion news classification is an important topic. Effective and accurate classification of public opinion news is a necessary prerequisite for relevant departments to grasp the situation of public opinion and control the trend of public opinion in time. This paper introduces a combined-convolutional neural network text classification model based on word2vec and improved TF-IDF: firstly, the word vector is trained through word2vec model, then… More >

  • Open Access

    ARTICLE

    XGBRS Framework Integrated with Word2Vec Sentiment Analysis for Augmented Drug Recommendation

    Shweta Paliwal1, Amit Kumar Mishra2,*, Ram Krishn Mishra3, Nishad Nawaz4, M. Senthilkumar5

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5345-5362, 2022, DOI:10.32604/cmc.2022.025858

    Abstract Machine Learning is revolutionizing the era day by day and the scope is no more limited to computer science as the advancements are evident in the field of healthcare. Disease diagnosis, personalized medicine, and Recommendation system (RS) are among the promising applications that are using Machine Learning (ML) at a higher level. A recommendation system helps inefficient decision-making and suggests personalized recommendations accordingly. Today people share their experiences through reviews and hence designing of recommendation system based on users’ sentiments is a challenge. The recommendation system has gained significant attention in different fields but considering healthcare, little is being done… More >

  • Open Access

    ARTICLE

    Insider Threat Detection Based on NLP Word Embedding and Machine Learning

    Mohd Anul Haq1, Mohd Abdul Rahim Khan1,*, Mohammed Alshehri2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 619-635, 2022, DOI:10.32604/iasc.2022.021430

    Abstract The growth of edge computing, the Internet of Things (IoT), and cloud computing have been accompanied by new security issues evolving in the information security infrastructure. Recent studies suggest that the cost of insider attacks is higher than the external threats, making it an essential aspect of information security for organizations. Efficient insider threat detection requires state-of-the-art Artificial Intelligence models and utility. Although significant have been made to detect insider threats for more than a decade, there are many limitations, including a lack of real data, low accuracy, and a relatively low false alarm, which are major concerns needing further… More >

  • Open Access

    ARTICLE

    Machine Learning-Based Advertisement Banner Identification Technique for Effective Piracy Website Detection Process

    Lelisa Adeba Jilcha1, Jin Kwak2,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2883-2899, 2022, DOI:10.32604/cmc.2022.023167

    Abstract In the contemporary world, digital content that is subject to copyright is facing significant challenges against the act of copyright infringement. Billions of dollars are lost annually because of this illegal act. The current most effective trend to tackle this problem is believed to be blocking those websites, particularly through affiliated government bodies. To do so, an effective detection mechanism is a necessary first step. Some researchers have used various approaches to analyze the possible common features of suspected piracy websites. For instance, most of these websites serve online advertisement, which is considered as their main source of revenue. In… More >

  • Open Access

    ARTICLE

    LogUAD: Log Unsupervised Anomaly Detection Based on Word2Vec

    Jin Wang1, Changqing Zhao1, Shiming He1,*, Yu Gu2, Osama Alfarraj3, Ahed Abugabah4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1207-1222, 2022, DOI:10.32604/csse.2022.022365

    Abstract System logs record detailed information about system operation and are important for analyzing the system's operational status and performance. Rapid and accurate detection of system anomalies is of great significance to ensure system stability. However, large-scale distributed systems are becoming more and more complex, and the number of system logs gradually increases, which brings challenges to analyze system logs. Some recent studies show that logs can be unstable due to the evolution of log statements and noise introduced by log collection and parsing. Moreover, deep learning-based detection methods take a long time to train models. Therefore, to reduce the computational… More >

  • Open Access

    ARTICLE

    An Automated System to Predict Popular Cybersecurity News Using Document Embeddings

    Ramsha Saeed1, Saddaf Rubab1, Sara Asif1, Malik M. Khan1, Saeed Murtaza1, Seifedine Kadry2, Yunyoung Nam3,*, Muhammad Attique Khan4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.2, pp. 533-547, 2021, DOI:10.32604/cmes.2021.014355

    Abstract The substantial competition among the news industries puts editors under the pressure of posting news articles which are likely to gain more user attention. Anticipating the popularity of news articles can help the editorial teams in making decisions about posting a news article. Article similarity extracted from the articles posted within a small period of time is found to be a useful feature in existing popularity prediction approaches. This work proposes a new approach to estimate the popularity of news articles by adding semantics in the article similarity based approach of popularity estimation. A semantically enriched model is proposed which… More >

  • Open Access

    ARTICLE

    An Abstractive Summarization Technique with Variable Length Keywords as per Document Diversity

    Muhammad Yahya Saeed1, Muhammad Awais1, Muhammad Younas1, Muhammad Arif Shah2,*, Atif Khan3, M. Irfan Uddin4, Marwan Mahmoud5

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2409-2423, 2021, DOI:10.32604/cmc.2021.014330

    Abstract Text Summarization is an essential area in text mining, which has procedures for text extraction. In natural language processing, text summarization maps the documents to a representative set of descriptive words. Therefore, the objective of text extraction is to attain reduced expressive contents from the text documents. Text summarization has two main areas such as abstractive, and extractive summarization. Extractive text summarization has further two approaches, in which the first approach applies the sentence score algorithm, and the second approach follows the word embedding principles. All such text extractions have limitations in providing the basic theme of the underlying documents.… More >

Displaying 1-10 on page 1 of 8. Per Page