Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,955)
  • Open Access

    ARTICLE

    Optimal Artificial Intelligence Based Automated Skin Lesion Detection and Classification Model

    Kingsley A. Ogudo1, R. Surendran2,*, Osamah Ibrahim Khalaf3

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 693-707, 2023, DOI:10.32604/csse.2023.024154 - 01 June 2022

    Abstract Skin lesions have become a critical illness worldwide, and the earlier identification of skin lesions using dermoscopic images can raise the survival rate. Classification of the skin lesion from those dermoscopic images will be a tedious task. The accuracy of the classification of skin lesions is improved by the use of deep learning models. Recently, convolutional neural networks (CNN) have been established in this domain, and their techniques are extremely established for feature extraction, leading to enhanced classification. With this motivation, this study focuses on the design of artificial intelligence (AI) based solutions, particularly deep… More >

  • Open Access

    ARTICLE

    Research on Improving Teaching Quality and Optimizing Teaching Scheme Based on Deep Learning in Chinese Literature Scene

    Yali Wang*

    Journal of Quantum Computing, Vol.4, No.3, pp. 165-181, 2022, DOI:10.32604/jqc.2022.039795 - 03 July 2023

    Abstract With the rapid development of society nowadays, this paper begins to study the teaching strategies of promoting students’ deep learning in the Chinese literature scene, and the attitudes and teaching quality of students and teachers when learning Chinese literature. The investigation and analysis show that: (1) For example, the relationship between literary scenes and characters in the famous literary work “Three Kingdoms” is analyzed. The complex character relationships in literature are important to literary scenes and learning. (2) It explains that the suggestions when writing Chinese literary scenes need to be pragmatic, pay attention to More >

  • Open Access

    ARTICLE

    A Detailed Study on IoT Platform for ECG Monitoring Using Transfer Learning

    Md Saidul Islam*

    Journal on Internet of Things, Vol.4, No.3, pp. 127-140, 2022, DOI:10.32604/jiot.2022.037489 - 12 June 2023

    Abstract Internet of Things (IoT) technologies used in health have the potential to address systemic difficulties by offering tools for cost reduction while improving diagnostic and treatment efficiency. Numerous works on this subject focus on clarifying the constructs and interfaces between various components of an IoT platform, such as knowledge generation via smart sensors collecting biosignals from the human body and processing them via data mining and, in recent times, deep neural networks offered to host on cloud computing architecture. These approaches are intended to assist healthcare professionals in their daily activities. In this comparative research, More >

  • Open Access

    REVIEW

    A Survey of GAN Based Image Synthesis

    Jiahe Ni*

    Journal of Information Hiding and Privacy Protection, Vol.4, No.2, pp. 79-88, 2022, DOI:10.32604/jihpp.2022.039751 - 17 April 2023

    Abstract Image generation is a hot topic in the academic recently, and has been applied to AI drawing, which can bring Vivid AI paintings without labor costs. In image generation, we represent the image as a random vector, assuming that the images of the natural scene obey an unknown distribution, we hope to estimate its distribution through some observation samples. Especially, with the development of GAN (Generative Adversarial Network), The generator and discriminator improve the model capability through adversarial, the quality of the generated image is also increasing. The image quality generated by the existing GAN More >

  • Open Access

    REVIEW

    A Survey of Privacy Preservation for Deep Learning Applications

    Ling Zhang1,*, Lina Nie1, Leyan Yu2

    Journal of Information Hiding and Privacy Protection, Vol.4, No.2, pp. 69-78, 2022, DOI:10.32604/jihpp.2022.039284 - 17 April 2023

    Abstract Deep learning is widely used in artificial intelligence fields such as computer vision, natural language recognition, and intelligent robots. With the development of deep learning, people’s expectations for this technology are increasing daily. Enterprises and individuals usually need a lot of computing power to support the practical work of deep learning technology. Many cloud service providers provide and deploy cloud computing environments. However, there are severe risks of privacy leakage when transferring data to cloud service providers and using data for model training, which makes users unable to use deep learning technology in cloud computing More >

  • Open Access

    ARTICLE

    A New Intrusion Detection Algorithm AE-3WD for Industrial Control Network

    Yongzhong Li1,2,*, Cong Li1, Yuheng Li3, Shipeng Zhang2

    Journal of New Media, Vol.4, No.4, pp. 205-217, 2022, DOI:10.32604/jnm.2022.034778 - 12 December 2022

    Abstract In this paper, we propose a intrusion detection algorithm based on auto-encoder and three-way decisions (AE-3WD) for industrial control networks, aiming at the security problem of industrial control network. The ideology of deep learning is similar to the idea of intrusion detection. Deep learning is a kind of intelligent algorithm and has the ability of automatically learning. It uses self-learning to enhance the experience and dynamic classification capabilities. We use deep learning to improve the intrusion detection rate and reduce the false alarm rate through learning, a denoising AutoEncoder and three-way decisions intrusion detection method More >

  • Open Access

    ARTICLE

    X-ray Based COVID-19 Classification Using Lightweight EfficientNet

    Tahani Maazi Almutairi*, Mohamed Maher Ben Ismail, Ouiem Bchir

    Journal on Artificial Intelligence, Vol.4, No.3, pp. 167-187, 2022, DOI:10.32604/jai.2022.032974 - 01 December 2022

    Abstract The world has been suffering from the Coronavirus (COVID-19) pandemic since its appearance in late 2019. COVID-19 spread has led to a drastic increase of the number of infected people and deaths worldwide. Imminent and accurate diagnosis of positive cases emerged as a natural alternative to reduce the number of serious infections and limit the spread of the disease. In this paper, we proposed an X-ray based COVID-19 classification system that aims at diagnosing positive COVID-19 cases. Specifically, we adapted lightweight versions of EfficientNet as backbone of the proposed recognition system. Particularly, lightweight EfficientNet networks… More >

  • Open Access

    ARTICLE

    Evaluating Neural Dialogue Systems Using Deep Learning and Conversation History

    Inshirah Ali AlMutairi*, Ali Mustafa Qamar

    Journal on Artificial Intelligence, Vol.4, No.3, pp. 155-165, 2022, DOI:10.32604/jai.2022.032390 - 01 December 2022

    Abstract Neural talk models play a leading role in the growing popular building of conversational managers. A commonplace criticism of those systems is that they seldom understand or use the conversation data efficiently. The development of profound concentration on innovations has increased the use of neural models for a discussion display. In recent years, deep learning (DL) models have achieved significant success in various tasks, and many dialogue systems are also employing DL techniques. The primary issues involved in the generation of the dialogue system are acquiring perspectives into instinctual linguistics, comprehension provision, and conversation assessment.… More >

  • Open Access

    ARTICLE

    Applications Classification of VPN Encryption Tunnel Based on SAE-2dCNN Model

    Jie Luo*, Qingbing Ji, Lvlin Ni

    Journal on Artificial Intelligence, Vol.4, No.3, pp. 133-142, 2022, DOI:10.32604/jai.2022.031800 - 01 December 2022

    Abstract How to quickly and accurately identify applications in VPN encrypted tunnels is a difficult technique. Traditional technologies such as DPI can no longer identify applications in VPN encrypted tunnel. Various VPN protocols make the feature engineering of machine learning extremely difficult. Deep learning has the advantages that feature extraction does not rely on manual labor and has a good early application in classification. This article uses deep learning technology to classify the applications of VPN encryption tunnel based on the SAE-2dCNN model. SAE can effectively reduce the dimensionality of the data, which not only improves More >

  • Open Access

    ARTICLE

    An Improved Biometric Fuzzy Signature with Timestamp of Blockchain Technology for Electrical Equipment Maintenance

    Rao Fu1,*, Liming Wang2, Xuesong Huo2, Pei Pei2, Haitao Jiang3, Zhongxing Fu4

    Energy Engineering, Vol.119, No.6, pp. 2621-2636, 2022, DOI:10.32604/ee.2022.020873 - 14 September 2022

    Abstract The power infrastructure of the power system is massive in size and dispersed throughout the system. Therefore, how to protect the information security in the operation and maintenance of power equipment is a difficult problem. This paper proposes an improved time-stamped blockchain technology biometric fuzzy feature for electrical equipment maintenance. Compared with previous blockchain transactions, the time-stamped fuzzy biometric signature proposed in this paper overcomes the difficulty that the key is easy to be stolen by hackers and can protect the security of information during operation and maintenance. Finally, the effectiveness of the proposed method More >

Displaying 1261-1270 on page 127 of 1955. Per Page