Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (26)
  • Open Access

    ARTICLE

    Action Recognition for Multiview Skeleton 3D Data Using NTURGB + D Dataset

    Rosepreet Kaur Bhogal1,*, V. Devendran2

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2759-2772, 2023, DOI:10.32604/csse.2023.034862

    Abstract Human activity recognition is a recent area of research for researchers. Activity recognition has many applications in smart homes to observe and track toddlers or oldsters for their safety, monitor indoor and outdoor activities, develop Tele immersion systems, or detect abnormal activity recognition. Three dimensions (3D) skeleton data is robust and somehow view-invariant. Due to this, it is one of the popular choices for human action recognition. This paper proposed using a transversal tree from 3D skeleton data to represent videos in a sequence. Further proposed two neural networks: convolutional neural network recurrent neural network_1… More >

  • Open Access

    ARTICLE

    Injections Attacks Efficient and Secure Techniques Based on Bidirectional Long Short Time Memory Model

    Abdulgbar A. R. Farea1, Gehad Abdullah Amran2,*, Ebraheem Farea3, Amerah Alabrah4,*, Ahmed A. Abdulraheem5, Muhammad Mursil6, Mohammed A. A. Al-qaness7

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3605-3622, 2023, DOI:10.32604/cmc.2023.040121

    Abstract E-commerce, online ticketing, online banking, and other web-based applications that handle sensitive data, such as passwords, payment information, and financial information, are widely used. Various web developers may have varying levels of understanding when it comes to securing an online application. Structured Query language SQL injection and cross-site scripting are the two vulnerabilities defined by the Open Web Application Security Project (OWASP) for its 2017 Top Ten List Cross Site Scripting (XSS). An attacker can exploit these two flaws and launch malicious web-based actions as a result of these flaws. Many published articles focused on… More >

  • Open Access

    ARTICLE

    A Robust Approach for Detection and Classification of KOA Based on BILSTM Network

    Abdul Qadir1, Rabbia Mahum1, Suliman Aladhadh2,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1365-1384, 2023, DOI:10.32604/csse.2023.037033

    Abstract A considerable portion of the population now experiences osteoarthritis of the knee, spine, and hip due to lifestyle changes. Therefore, early treatment, recognition and prevention are essential to reduce damage; nevertheless, this time-consuming activity necessitates a variety of tests and in-depth analysis by physicians. To overcome the existing challenges in the early detection of Knee Osteoarthritis (KOA), an effective automated technique, prompt recognition, and correct categorization are required. This work suggests a method based on an improved deep learning algorithm that makes use of data from the knee images after segmentation to detect KOA and… More >

  • Open Access

    ARTICLE

    Prediction-Based Thunderstorm Path Recovery Method Using CNN-BiLSTM

    Xu Yang1,2, Ling Zhuang1, Yuqiang Sun3, Wenjie Zhang4,5,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1637-1654, 2023, DOI:10.32604/iasc.2023.039879

    Abstract The loss of three-dimensional atmospheric electric field (3DAEF) data has a negative impact on thunderstorm detection. This paper proposes a method for thunderstorm point charge path recovery. Based on the relationship between a point charge and 3DAEF, we derive corresponding localization formulae by establishing a point charge localization model. Generally, point charge movement paths are obtained after fitting time series localization results. However, AEF data losses make it difficult to fit and visualize paths. Therefore, using available AEF data without loss as input, we design a hybrid model combining the convolutional neural network (CNN) and… More >

  • Open Access

    ARTICLE

    A PERT-BiLSTM-Att Model for Online Public Opinion Text Sentiment Analysis

    Mingyong Li, Zheng Jiang*, Zongwei Zhao, Longfei Ma

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2387-2406, 2023, DOI:10.32604/iasc.2023.037900

    Abstract As an essential category of public event management and control, sentiment analysis of online public opinion text plays a vital role in public opinion early warning, network rumor management, and netizens’ personality portraits under massive public opinion data. The traditional sentiment analysis model is not sensitive to the location information of words, it is difficult to solve the problem of polysemy, and the learning representation ability of long and short sentences is very different, which leads to the low accuracy of sentiment classification. This paper proposes a sentiment analysis model PERT-BiLSTM-Att for public opinion text… More >

  • Open Access

    ARTICLE

    Kalman Filter-Based CNN-BiLSTM-ATT Model for Traffic Flow Prediction

    Hong Zhang1,2,*, Gang Yang1, Hailiang Yu1, Zan Zheng1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1047-1063, 2023, DOI:10.32604/cmc.2023.039274

    Abstract To accurately predict traffic flow on the highways, this paper proposes a Convolutional Neural Network-Bi-directional Long Short-Term Memory-Attention Mechanism (CNN-BiLSTM-Attention) traffic flow prediction model based on Kalman-filtered data processing. Firstly, the original fluctuating data is processed by Kalman filtering, which can reduce the instability of short-term traffic flow prediction due to unexpected accidents. Then the local spatial features of the traffic data during different periods are extracted, dimensionality is reduced through a one-dimensional CNN, and the BiLSTM network is used to analyze the time series information. Finally, the Attention Mechanism assigns feature weights and performs… More >

  • Open Access

    ARTICLE

    CBOE Volatility Index Forecasting under COVID-19: An Integrated BiLSTM-ARIMA-GARCH Model

    Min Hyung Park1, Dongyan Nan2,3, Yerin Kim1, Jang Hyun Kim1,2,3,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 121-134, 2023, DOI:10.32604/csse.2023.033247

    Abstract After the outbreak of COVID-19, the global economy entered a deep freeze. This observation is supported by the Volatility Index (VIX), which reflects the market risk expected by investors. In the current study, we predicted the VIX using variables obtained from the sentiment analysis of data on Twitter posts related to the keyword “COVID-19,” using a model integrating the bidirectional long-term memory (BiLSTM), autoregressive integrated moving average (ARIMA) algorithm, and generalized autoregressive conditional heteroskedasticity (GARCH) model. The Linguistic Inquiry and Word Count (LIWC) program and Valence Aware Dictionary for Sentiment Reasoning (VADER) model were utilized More >

  • Open Access

    ARTICLE

    Using Recurrent Neural Network Structure and Multi-Head Attention with Convolution for Fraudulent Phone Text Recognition

    Junjie Zhou, Hongkui Xu*, Zifeng Zhang, Jiangkun Lu, Wentao Guo, Zhenye Li

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2277-2297, 2023, DOI:10.32604/csse.2023.036419

    Abstract Fraud cases have been a risk in society and people’s property security has been greatly threatened. In recent studies, many promising algorithms have been developed for social media offensive text recognition as well as sentiment analysis. These algorithms are also suitable for fraudulent phone text recognition. Compared to these tasks, the semantics of fraudulent words are more complex and more difficult to distinguish. Recurrent Neural Networks (RNN), the variants of RNN, Convolutional Neural Networks (CNN), and hybrid neural networks to extract text features are used by most text classification research. However, a single network or… More >

  • Open Access

    ARTICLE

    Short-Term Power Load Forecasting with Hybrid TPA-BiLSTM Prediction Model Based on CSSA

    Jiahao Wen, Zhijian Wang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 749-765, 2023, DOI:10.32604/cmes.2023.023865

    Abstract Since the existing prediction methods have encountered difficulties in processing the multiple influencing factors in short-term power load forecasting, we propose a bidirectional long short-term memory (BiLSTM) neural network model based on the temporal pattern attention (TPA) mechanism. Firstly, based on the grey relational analysis, datasets similar to forecast day are obtained. Secondly, the bidirectional LSTM layer models the data of the historical load, temperature, humidity, and date-type and extracts complex relationships between data from the hidden row vectors obtained by the BiLSTM network, so that the influencing factors (with different characteristics) can select relevant… More >

  • Open Access

    ARTICLE

    A Novel Anomaly Detection Method in Sensor Based Cyber-Physical Systems

    K. Muthulakshmi1,*, N. Krishnaraj2, R. S. Ravi Sankar3, A. Balakumar4, S. Kanimozhi5, B. Kiruthika6

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2083-2096, 2022, DOI:10.32604/iasc.2022.026628

    Abstract In recent times, Cyber-physical system (CPS) integrates the cyber systems and physical world for performing critical processes that are started from the development in digital electronics. The sensors deployed in CPS are commonly employed for monitoring and controlling processes that are susceptible to anomalies. For identifying and detecting anomalies, an effective anomaly detection system (ADS) is developed. But ADS faces high false alarms and miss detection rate, which led to the degraded performance in CPS applications. This study develops a novel deep learning (DL) approach for anomaly detection in sensor-based CPS using Bidirectional Long Short… More >

Displaying 11-20 on page 2 of 26. Per Page