Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,276)
  • Open Access

    ARTICLE

    An Enhanced Hybrid Model Based on CNN and BiLSTM for Identifying Individuals via Handwriting Analysis

    Md. Abdur Rahim1, Fahmid Al Farid2, Abu Saleh Musa Miah3, Arpa Kar Puza1, Md. Nur Alam4, Md. Najmul Hossain5, Sarina Mansor2, Hezerul Abdul Karim2,6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1689-1710, 2024, DOI:10.32604/cmes.2024.048714

    Abstract Handwriting is a unique and significant human feature that distinguishes them from one another. There are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for person identification through verification. However, such systems are susceptible to forgery, posing security risks. In response to these challenges, we propose an innovative hybrid technique for individual identification based on independent handwriting, eliminating the reliance on specific signatures or symbols. In response to these challenges, we propose an innovative hybrid technique for individual identification based on independent handwriting, eliminating the reliance on specific signatures… More >

  • Open Access

    ARTICLE

    Multi-Material Topology Optimization of 2D Structures Using Convolutional Neural Networks

    Jiaxiang Luo1,2, Weien Zhou2,3, Bingxiao Du1,*, Daokui Li1, Wen Yao2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1919-1947, 2024, DOI:10.32604/cmes.2024.048118

    Abstract In recent years, there has been significant research on the application of deep learning (DL) in topology optimization (TO) to accelerate structural design. However, these methods have primarily focused on solving binary TO problems, and effective solutions for multi-material topology optimization (MMTO) which requires a lot of computing resources are still lacking. Therefore, this paper proposes the framework of multiphase topology optimization using deep learning to accelerate MMTO design. The framework employs convolutional neural network (CNN) to construct a surrogate model for solving MMTO, and the obtained surrogate model can rapidly generate multi-material structure topologies… More >

  • Open Access

    ARTICLE

    Comprehensive Analysis of Gender Classification Accuracy across Varied Geographic Regions through the Application of Deep Learning Algorithms to Speech Signals

    Abhishek Singhal*, Devendra Kumar Sharma

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 609-625, 2024, DOI:10.32604/csse.2023.046730

    Abstract This article presents an exhaustive comparative investigation into the accuracy of gender identification across diverse geographical regions, employing a deep learning classification algorithm for speech signal analysis. In this study, speech samples are categorized for both training and testing purposes based on their geographical origin. Category 1 comprises speech samples from speakers outside of India, whereas Category 2 comprises live-recorded speech samples from Indian speakers. Testing speech samples are likewise classified into four distinct sets, taking into consideration both geographical origin and the language spoken by the speakers. Significantly, the results indicate a noticeable difference… More >

  • Open Access

    ARTICLE

    Multimodal Deep Neural Networks for Digitized Document Classification

    Aigerim Baimakhanova1,*, Ainur Zhumadillayeva2, Bigul Mukhametzhanova3, Natalya Glazyrina2, Rozamgul Niyazova2, Nurseit Zhunissov1, Aizhan Sambetbayeva4

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 793-811, 2024, DOI:10.32604/csse.2024.043273

    Abstract As digital technologies have advanced more rapidly, the number of paper documents recently converted into a digital format has exponentially increased. To respond to the urgent need to categorize the growing number of digitized documents, the classification of digitized documents in real time has been identified as the primary goal of our study. A paper classification is the first stage in automating document control and efficient knowledge discovery with no or little human involvement. Artificial intelligence methods such as Deep Learning are now combined with segmentation to study and interpret those traits, which were not… More >

  • Open Access

    ARTICLE

    Artificial Neural Network Modeling for Predicting Thermal Conductivity of EG/Water-Based CNC Nanofluid for Engine Cooling Using Different Activation Functions

    Md. Munirul Hasan1, Md Mustafizur Rahman2,*, Mohammad Saiful Islam3, Wong Hung Chan4, Yasser M. Alginahi5, Muhammad Nomani Kabir6, Suraya Abu Bakar1, Devarajan Ramasamy2

    Frontiers in Heat and Mass Transfer, Vol.22, No.2, pp. 537-556, 2024, DOI:10.32604/fhmt.2024.047428

    Abstract A vehicle engine cooling system is of utmost importance to ensure that the engine operates in a safe temperature range. In most radiators that are used to cool an engine, water serves as a cooling fluid. The performance of a radiator in terms of heat transmission is significantly influenced by the incorporation of nanoparticles into the cooling water. Concentration and uniformity of nanoparticle distribution are the two major factors for the practical use of nanofluids. The shape and size of nanoparticles also have a great impact on the performance of heat transfer. Many researchers are… More > Graphic Abstract

    Artificial Neural Network Modeling for Predicting Thermal Conductivity of EG/Water-Based CNC Nanofluid for Engine Cooling Using Different Activation Functions

  • Open Access

    ARTICLE

    A Hybrid Manufacturing Process Monitoring Method Using Stacked Gated Recurrent Unit and Random Forest

    Chao-Lung Yang1,*, Atinkut Atinafu Yilma1,2, Bereket Haile Woldegiorgis2, Hendrik Tampubolon3,4, Hendri Sutrisno5

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 233-254, 2024, DOI:10.32604/iasc.2024.043091

    Abstract This study proposed a new real-time manufacturing process monitoring method to monitor and detect process shifts in manufacturing operations. Since real-time production process monitoring is critical in today’s smart manufacturing. The more robust the monitoring model, the more reliable a process is to be under control. In the past, many researchers have developed real-time monitoring methods to detect process shifts early. However, these methods have limitations in detecting process shifts as quickly as possible and handling various data volumes and varieties. In this paper, a robust monitoring model combining Gated Recurrent Unit (GRU) and Random… More >

  • Open Access

    ARTICLE

    A Framework for Driver Drowsiness Monitoring Using a Convolutional Neural Network and the Internet of Things

    Muhamad Irsan1,2,*, Rosilah Hassan2, Anwar Hassan Ibrahim3, Mohamad Khatim Hasan2, Meng Chun Lam2, Wan Mohd Hirwani Wan Hussain4

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 157-174, 2024, DOI:10.32604/iasc.2024.042193

    Abstract One of the major causes of road accidents is sleepy drivers. Such accidents typically result in fatalities and financial losses and disadvantage other road users. Numerous studies have been conducted to identify the driver’s sleepiness and integrate it into a warning system. Most studies have examined how the mouth and eyelids move. However, this limits the system’s ability to identify drowsiness traits. Therefore, this study designed an Accident Detection Framework (RPK) that could be used to reduce road accidents due to sleepiness and detect the location of accidents. The drowsiness detection model used three facial… More >

  • Open Access

    ARTICLE

    Malware Attacks Detection in IoT Using Recurrent Neural Network (RNN)

    Abeer Abdullah Alsadhan1, Abdullah A. Al-Atawi2, Hanen karamti3, Abid Jameel4, Islam Zada5, Tan N. Nguyen6,*

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 135-155, 2024, DOI:10.32604/iasc.2023.041130

    Abstract IoT (Internet of Things) devices are being used more and more in a variety of businesses and for a variety of tasks, such as environmental data collection in both civilian and military situations. They are a desirable attack target for malware intended to infect specific IoT devices due to their growing use in a variety of applications and their increasing computational and processing power. In this study, we investigate the possibility of detecting IoT malware using recurrent neural networks (RNNs). RNN is used in the proposed method to investigate the execution operation codes of ARM-based More >

  • Open Access

    ARTICLE

    Damage Diagnosis of Bleacher Based on an Enhanced Convolutional Neural Network with Training Interference

    Chaozhi Cai*, Xiaoyu Guo, Yingfang Xue, Jianhua Ren

    Structural Durability & Health Monitoring, Vol.18, No.3, pp. 321-339, 2024, DOI:10.32604/sdhm.2024.045831

    Abstract Bleachers play a crucial role in practical engineering applications, and any damage incurred during their operation poses a significant threat to the safety of both life and property. Consequently, it becomes imperative to conduct damage diagnosis and health monitoring of bleachers. The intricate structure of bleachers, the varied types of potential damage, and the presence of similar vibration data in adjacent locations make it challenging to achieve satisfactory diagnosis accuracy through traditional time-frequency analysis methods. Furthermore, field environmental noise can adversely impact the accuracy of bleacher damage diagnosis. To enhance the accuracy and anti-noise capabilities… More > Graphic Abstract

    Damage Diagnosis of Bleacher Based on an Enhanced Convolutional Neural Network with Training Interference

  • Open Access

    ARTICLE

    Smart Contract Vulnerability Detection Method Based on Feature Graph and Multiple Attention Mechanisms

    Zhenxiang He*, Zhenyu Zhao, Ke Chen, Yanlin Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3023-3045, 2024, DOI:10.32604/cmc.2024.050281

    Abstract The fast-paced development of blockchain technology is evident. Yet, the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem. Conventional smart contract vulnerability detection primarily relies on static analysis tools, which are less efficient and accurate. Although deep learning methods have improved detection efficiency, they are unable to fully utilize the static relationships within contracts. Therefore, we have adopted the advantages of the above two methods, combining feature extraction mode of tools with deep learning techniques. Firstly, we have constructed corresponding feature extraction mode for… More >

Displaying 1-10 on page 1 of 1276. Per Page