Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (206)
  • Open Access

    ARTICLE

    An improved CRNN for Vietnamese Identity Card Information Recognition

    Trinh Tan Dat1, Le Tran Anh Dang1,2, Nguyen Nhat Truong1,2, Pham Cung Le Thien Vu1, Vu Ngoc Thanh Sang1, Pham Thi Vuong1, Pham The Bao1,*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 539-555, 2022, DOI:10.32604/csse.2022.019064

    Abstract This paper proposes an enhancement of an automatic text recognition system for extracting information from the front side of the Vietnamese citizen identity (CID) card. First, we apply Mask-RCNN to segment and align the CID card from the background. Next, we present two approaches to detect the CID card’s text lines using traditional image processing techniques compared to the EAST detector. Finally, we introduce a new end-to-end Convolutional Recurrent Neural Network (CRNN) model based on a combination of Connectionist Temporal Classification (CTC) and attention mechanism for Vietnamese text recognition by jointly train the CTC and attention objective functions together. The… More >

  • Open Access

    ARTICLE

    Comparison of Missing Data Imputation Methods in Time Series Forecasting

    Hyun Ahn1, Kyunghee Sun2, Kwanghoon Pio Kim3,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 767-779, 2022, DOI:10.32604/cmc.2022.019369

    Abstract Time series forecasting has become an important aspect of data analysis and has many real-world applications. However, undesirable missing values are often encountered, which may adversely affect many forecasting tasks. In this study, we evaluate and compare the effects of imputation methods for estimating missing values in a time series. Our approach does not include a simulation to generate pseudo-missing data, but instead perform imputation on actual missing data and measure the performance of the forecasting model created therefrom. In an experiment, therefore, several time series forecasting models are trained using different training datasets prepared using each imputation method. Subsequently,… More >

  • Open Access

    ARTICLE

    Target Projection Feature Matching Based Deep ANN with LSTM for Lung Cancer Prediction

    Chandrasekar Thaventhiran, K. R. Sekar*

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 495-506, 2022, DOI:10.32604/iasc.2022.019546

    Abstract Prediction of lung cancer at early stages is essential for diagnosing and prescribing the correct treatment. With the continuous development of medical data in healthcare services, Lung cancer prediction is the most concerning area of interest. Therefore, early prediction of cancer helps in reducing the mortality rate of humans. The existing techniques are time-consuming and have very low accuracy. The proposed work introduces a novel technique called Target Projection Feature Matched Deep Artificial Neural Network with LSTM (TPFMDANN-LSTM) for accurate lung cancer prediction with minimum time consumption. The proposed deep learning model consists of multiple layers to learn the given… More >

  • Open Access

    ARTICLE

    Stock-Price Forecasting Based on XGBoost and LSTM

    Pham Hoang Vuong1, Trinh Tan Dat1, Tieu Khoi Mai1, Pham Hoang Uyen2, Pham The Bao1,*

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 237-246, 2022, DOI:10.32604/csse.2022.017685

    Abstract Using time-series data analysis for stock-price forecasting (SPF) is complex and challenging because many factors can influence stock prices (e.g., inflation, seasonality, economic policy, societal behaviors). Such factors can be analyzed over time for SPF. Machine learning and deep learning have been shown to obtain better forecasts of stock prices than traditional approaches. This study, therefore, proposed a method to enhance the performance of an SPF system based on advanced machine learning and deep learning approaches. First, we applied extreme gradient boosting as a feature-selection technique to extract important features from high-dimensional time-series data and remove redundant features. Then, we… More >

  • Open Access

    ARTICLE

    Method of Bidirectional LSTM Modelling for the Atmospheric Temperature

    Shuo Liang1, Dingcheng Wang1,*, Jingrong Wu1, Rui Wang1, Ruiqi Wang2

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 701-714, 2021, DOI:10.32604/iasc.2021.020010

    Abstract Atmospheric temperature forecast plays an important role in weather forecast and has a significant impact on human daily and economic life. However, due to the complexity and uncertainty of the atmospheric system, exploring advanced forecasting methods to improve the accuracy of meteorological prediction has always been a research topic for scientists. With the continuous improvement of computer performance and data acquisition technology, meteorological data has gained explosive growth, which creates the necessary hardware support conditions for more accurate weather forecast. The more accurate forecast results need advanced weather forecast methods suitable for hardware. Therefore, this paper proposes a deep learning… More >

  • Open Access

    ARTICLE

    Binaural Speech Separation Algorithm Based on Deep Clustering

    Lin Zhou1,*, Kun Feng1, Tianyi Wang1, Yue Xu1, Jingang Shi2

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 527-537, 2021, DOI:10.32604/iasc.2021.018414

    Abstract Neutral network (NN) and clustering are the two commonly used methods for speech separation based on supervised learning. Recently, deep clustering methods have shown promising performance. In our study, considering that the spectrum of the sound source has time correlation, and the spatial position of the sound source has short-term stability, we combine the spectral and spatial features for deep clustering. In this work, the logarithmic amplitude spectrum (LPS) and the interaural phase difference (IPD) function of each time frequency (TF) unit for the binaural speech signal are extracted as feature. Then, these features of consecutive frames construct feature map,… More >

  • Open Access

    ARTICLE

    AttEF: Convolutional LSTM Encoder-Forecaster with Attention Module for Precipitation Nowcasting

    Wei Fang1,2,*, Lin Pang1, Weinan Yi1, Victor S. Sheng3

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 453-466, 2021, DOI:10.32604/iasc.2021.016589

    Abstract Precipitation nowcasting has become an essential technology underlying various public services ranging from weather advisories to citywide rainfall alerts. The main challenge facing many algorithms is the high non-linearity and temporal-spatial complexity of the radar image. Convolutional Long Short-Term Memory (ConvLSTM) is appropriate for modeling spatiotemporal variations as it integrates the convolution operator into recurrent state transition functions. However, the technical characteristic of encoding the input sequence into a fixed-size vector cannot guarantee that ConvLSTM maintains adequate sequence representations in the information flow, which affects the performance of the task. In this paper, we propose Attention ConvLSTM Encoder-Forecaster(AttEF) which allows… More >

  • Open Access

    ARTICLE

    A Hybrid Deep Learning Intrusion Detection Model for Fog Computing Environment

    K. Kalaivani*, M. Chinnadurai

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 1-15, 2021, DOI:10.32604/iasc.2021.017515

    Abstract Fog computing extends the concept of cloud computing by providing the services of computing, storage, and networking connectivity at the edge between data centers in cloud computing environments and end devices. Having the intelligence at the edge enables faster real-time decision-making and reduces the amount of data forwarded to the cloud. When enhanced by fog computing, the Internet of Things (IoT) brings low latency and improves real time and quality of service (QoS) in IoT applications of augmented reality, smart grids, smart vehicles, and healthcare. However, both cloud and fog computing environments are vulnerable to several kinds of attacks that… More >

  • Open Access

    ARTICLE

    Deep Learning Anomaly Detection Based on Hierarchical Status-Connection Features in Networked Control Systems

    Jianming Zhao1,2,3,4, Peng Zeng1,2,3,4,*, Chunyu Chen1,2,3,4, Zhiwei Dong5, Jongho Han6

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 337-350, 2021, DOI:10.32604/iasc.2021.016966

    Abstract As networked control systems continue to be widely used in large-scale industrial productions, industrial cyber-attacks have become an inevitable problem that can cause serious damage to critical infrastructures. In practice, industrial intrusion detection has been widely acknowledged to detect abnormal communication behaviors. However, unlike traditional IT systems, networked control systems have their own communication characteristics due to specific industrial communication protocols. Thus, simple cyber-attack modeling is inadequate and impractical for high-efficiency intrusion detection because the characteristics of network control systems are less considered. Based on the status information and transmission connection in industrial communication data payloads, which can properly express… More >

  • Open Access

    ARTICLE

    Steganalysis of Low Embedding Rate CNV-QIM in Speech

    Wanxia Yang*, Miaoqi Li, Beibei Zhou, Yan Liu, Kenan Liu, Zhiyu Hu

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.2, pp. 623-637, 2021, DOI:10.32604/cmes.2021.015629

    Abstract To address the difficulty of detecting low embedding rate and high-concealment CNV-QIM (complementary neighbor vertices-quantization index modulation) steganography in low bit-rate speech codec, the code-word correlation model based on a BiLSTM (bi-directional long short-term memory) neural network is built to obtain the correlation features of the LPC codewords in speech codec in this paper. Then, softmax is used to classify and effectively detect low embedding rate CNV-QIM steganography in VoIP streams. The experimental results show that for speech steganography of short samples with low embedding rate, the BiLSTM method in this paper has a superior detection accuracy than state-of-the-art methods… More >

Displaying 151-160 on page 16 of 206. Per Page