Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,370)
  • Open Access


    A Survey on Face Anti-Spoofing Algorithms

    Meigui Zhang*, Kehui Zeng, Jinwei Wang

    Journal of Information Hiding and Privacy Protection, Vol.2, No.1, pp. 21-34, 2020, DOI:10.32604/jihpp.2020.010467

    Abstract The development of artificial intelligence makes the application of face recognition more and more extensive, which also leads to the security of face recognition technology increasingly prominent. How to design a face anti-spoofing method with high accuracy, strong generalization ability and meeting practical needs is the focus of current research. This paper introduces the research progress of face anti-spoofing algorithm, and divides the existing face anti-spoofing methods into two categories: methods based on manual feature expression and methods based on deep learning. Then, the typical algorithms included in them are classified twice, and the basic ideas, advantages and disadvantages of… More >

  • Open Access


    Research on Denoising of Cryo-em Images Based on Deep Learning

    Jianquan Ouyang*, Yi He, Huanrong Tang, Zhousong Fu

    Journal of Information Hiding and Privacy Protection, Vol.2, No.1, pp. 1-9, 2020, DOI:10.32604/jihpp.2020.010657

    Abstract Cryo-em (Cryogenic electron microscopy) is a technology this can build bio-macromolecule of three-dimensional structure. Under the condition of now, the projection image of the biological macromolecule which is collected by the Cryo-em technology that the contrast is low, the signal to noise is low, image blurring, and not easy to distinguish single particle from background, the corresponding processing technology is lagging behind. Therefore, make Cryoem image denoising useful, and maintaining bio-macromolecule of contour or signal of function-construct improve Cryo-em image quality or resolution of Cryo-em three-dimensional structure have important effect. This paper researched a denoising function base on GANs (generative… More >

  • Open Access


    A Classification–Detection Approach of COVID-19 Based on Chest X-ray and CT by Using Keras Pre-Trained Deep Learning Models

    Xing Deng1,2, Haijian Shao1,2,*, Liang Shi3, Xia Wang4,5, Tongling Xie6

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.2, pp. 579-596, 2020, DOI:10.32604/cmes.2020.011920

    Abstract The Coronavirus Disease 2019 (COVID-19) is wreaking havoc around the world, bring out that the enormous pressure on national health and medical staff systems. One of the most effective and critical steps in the fight against COVID-19, is to examine the patient’s lungs based on the Chest X-ray and CT generated by radiation imaging. In this paper, five keras-related deep learning models: ResNet50, InceptionResNetV2, Xception, transfer learning and pre-trained VGGNet16 is applied to formulate an classification–detection approaches of COVID-19. Two benchmark methods SVM (Support Vector Machine), CNN (Convolutional Neural Networks) are provided to compare with the classification–detection approaches based on… More >

  • Open Access


    PGCA-Net: Progressively Aggregating Hierarchical Features with the Pyramid Guided Channel Attention for Saliency Detection

    Jiajie Mai1, Xuemiao Xu2,*, Guorong Xiao3, Zijun Deng2, Jiaxing Chen2

    Intelligent Automation & Soft Computing, Vol.26, No.4, pp. 847-855, 2020, DOI:10.32604/iasc.2020.010119

    Abstract The Salient object detection aims to segment out the most visually distinctive objects in an image, which is a challenging task in computer vision. In this paper, we present the PGCA-Net equipped with the pyramid guided channel attention fusion block (PGCAFB) for the saliency detection task. Given an input image, the hierarchical features are extracted using a deep convolutional neural network (DCNN), then starting from the highest-level semantic features, we stage-by-stage restore the spatial saliency details by aggregating the lowerlevel detailed features. Since for the weak discriminative ability of the shallow detailed features, directly introducing them to the semantic features… More >

  • Open Access


    An Emotion Analysis Method Using Multi-Channel Convolution Neural Network in Social Networks

    Xinxin Lu1,*, Hong Zhang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 281-297, 2020, DOI:10.32604/cmes.2020.010948

    Abstract As an interdisciplinary comprehensive subject involving multidisciplinary knowledge, emotional analysis has become a hot topic in psychology, health medicine and computer science. It has a high comprehensive and practical application value. Emotion research based on the social network is a relatively new topic in the field of psychology and medical health research. The text emotion analysis of college students also has an important research significance for the emotional state of students at a certain time or a certain period, so as to understand their normal state, abnormal state and the reason of state change from the information they wrote. In… More >

  • Open Access


    Short-Term Traffic Flow Prediction Based on LSTM-XGBoost Combination Model

    Xijun Zhang*, Qirui Zhang

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 95-109, 2020, DOI:10.32604/cmes.2020.011013

    Abstract According to the time series characteristics of the trajectory history data, we predicted and analyzed the traffic flow. This paper proposed a LSTMXGBoost model based urban road short-term traffic flow prediction in order to analyze and solve the problems of periodicity, stationary and abnormality of time series. It can improve the traffic flow prediction effect, achieve efficient traffic guidance and traffic control. The model combined the characteristics of LSTM (Long Short-Term Memory) network and XGBoost (Extreme Gradient Boosting) algorithms. First, we used the LSTM model that increases dropout layer to train the data set after preprocessing. Second, we replaced the… More >

  • Open Access


    A Survey on Adversarial Examples in Deep Learning

    Kai Chen1,*, Haoqi Zhu2, Leiming Yan1, Jinwei Wang1

    Journal on Big Data, Vol.2, No.2, pp. 71-84, 2020, DOI:10.32604/jbd.2020.012294

    Abstract Adversarial examples are hot topics in the field of security in deep learning. The feature, generation methods, attack and defense methods of the adversarial examples are focuses of the current research on adversarial examples. This article explains the key technologies and theories of adversarial examples from the concept of adversarial examples, the occurrences of the adversarial examples, the attacking methods of adversarial examples. This article lists the possible reasons for the adversarial examples. This article also analyzes several typical generation methods of adversarial examples in detail: Limited-memory BFGS (L-BFGS), Fast Gradient Sign Method (FGSM), Basic Iterative Method (BIM), Iterative Least-likely… More >

  • Open Access


    Image and Feature Space Based Domain Adaptation for Vehicle Detection

    Ying Tian1, *, Libing Wang1, Hexin Gu2, Lin Fan3

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2397-2412, 2020, DOI:10.32604/cmc.2020.011386

    Abstract The application of deep learning in the field of object detection has experienced much progress. However, due to the domain shift problem, applying an off-the-shelf detector to another domain leads to a significant performance drop. A large number of ground truth labels are required when using another domain to train models, demanding a large amount of human and financial resources. In order to avoid excessive resource requirements and performance drop caused by domain shift, this paper proposes a new domain adaptive approach to cross-domain vehicle detection. Our approach improves the cross-domain vehicle detection model from image space and feature space.… More >

  • Open Access


    Deep Learning Approach with Optimizatized Hidden-Layers Topology for Short-Term Wind Power Forecasting

    Xing Deng1,2, Haijian Shao1,2,*

    Energy Engineering, Vol.117, No.5, pp. 279-287, 2020, DOI:10.32604/EE.2020.011619

    Abstract Recurrent neural networks (RNNs) as one of the representative deep learning methods, has restricted its generalization ability because of its indigestion hidden-layer information presentation. In order to properly handle of hidden-layer information, directly reduce the risk of over-fitting caused by too many neuron nodes, as well as realize the goal of streamlining the number of hidden layer neurons, and then improve the generalization ability of RNNs, the hidden-layer information of RNNs is precisely analyzed by using the unsupervised clustering methods, such as Kmeans, Kmeans++ and Iterative self-organizing data analysis (Isodata), to divide the similarity of raw data points, and maps… More >

  • Open Access


    Research on the Automatic Extraction Method of Web Data Objects Based on Deep Learning

    Hao Peng*, Qiao Li

    Intelligent Automation & Soft Computing, Vol.26, No.3, pp. 609-616, 2020, DOI:10.32604/iasc.2020.013939

    Abstract This paper represents a neural network model for the Web page information extraction based on the depth learning technology, and implements the model algorithm using the TensorFlow system. We then complete a detailed experimental analysis of the information extraction effect of Web pages on the same website, then show statistics on the accuracy index of the page information extraction, and optimize some parameters in the model according to the experimental results. On the premise of achieving ideal experimental results, an algorithm for migrating the model to the same pages of other websites for information extraction is proposed, and the experimental… More >

Displaying 1291-1300 on page 130 of 1370. Per Page