Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (150)
  • Open Access

    ARTICLE

    AF-Net: A Medical Image Segmentation Network Based on Attention Mechanism and Feature Fusion

    Guimin Hou1, Jiaohua Qin1,*, Xuyu Xiang1, Yun Tan1, Neal N. Xiong2

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1877-1891, 2021, DOI:10.32604/cmc.2021.017481

    Abstract Medical image segmentation is an important application field of computer vision in medical image processing. Due to the close location and high similarity of different organs in medical images, the current segmentation algorithms have problems with mis-segmentation and poor edge segmentation. To address these challenges, we propose a medical image segmentation network (AF-Net) based on attention mechanism and feature fusion, which can effectively capture global information while focusing the network on the object area. In this approach, we add dual attention blocks (DA-block) to the backbone network, which comprises parallel channels and spatial attention branches, More >

  • Open Access

    ARTICLE

    Short-term Wind Speed Prediction with a Two-layer Attention-based LSTM

    Jingcheng Qian1, Mingfang Zhu1, Yingnan Zhao2,*, Xiangjian He3

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 197-209, 2021, DOI:10.32604/csse.2021.016911

    Abstract Wind speed prediction is of great importance because it affects the efficiency and stability of power systems with a high proportion of wind power. Temporal-spatial wind speed features contain rich information; however, their use to predict wind speed remains one of the most challenging and less studied areas. This paper investigates the problem of predicting wind speeds for multiple sites using temporal and spatial features and proposes a novel two-layer attention-based long short-term memory (LSTM), termed 2Attn-LSTM, a unified framework of encoder and decoder mechanisms to handle temporal-spatial wind speed data. To eliminate the unevenness… More >

  • Open Access

    ARTICLE

    Algorithm of Helmet Wearing Detection Based on AT-YOLO Deep Mode

    Qingyang Zhou1, Jiaohua Qin1,*, Xuyu Xiang1, Yun Tan1, Neal N. Xiong2

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 159-174, 2021, DOI:10.32604/cmc.2021.017480

    Abstract The existing safety helmet detection methods are mainly based on one-stage object detection algorithms with high detection speed to reach the real-time detection requirements, but they can’t accurately detect small objects and objects with obstructions. Therefore, we propose a helmet detection algorithm based on the attention mechanism (AT-YOLO). First of all, a channel attention module is added to the YOLOv3 backbone network, which can adaptively calibrate the channel features of the direction to improve the feature utilization, and a spatial attention module is added to the neck of the YOLOv3 network to capture the correlation… More >

  • Open Access

    ARTICLE

    ANC: Attention Network for COVID-19 Explainable Diagnosis Based on Convolutional Block Attention Module

    Yudong Zhang1,3,*, Xin Zhang2,*, Weiguo Zhu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.3, pp. 1037-1058, 2021, DOI:10.32604/cmes.2021.015807

    Abstract Aim: To diagnose COVID-19 more efficiently and more correctly, this study proposed a novel attention network for COVID-19 (ANC). Methods: Two datasets were used in this study. An 18-way data augmentation was proposed to avoid overfitting. Then, convolutional block attention module (CBAM) was integrated to our model, the structure of which is fine-tuned. Finally, Grad-CAM was used to provide an explainable diagnosis. Results: The accuracy of our ANC methods on two datasets are 96.32% ± 1.06%, and 96.00% ± 1.03%, respectively. Conclusions: This proposed ANC method is superior to 9 state-of-the-art approaches. More >

  • Open Access

    ARTICLE

    Chinese Q&A Community Medical Entity Recognition with Character-Level Features and Self-Attention Mechanism

    Pu Han1,2, Mingtao Zhang1, Jin Shi3, Jinming Yang4, Xiaoyan Li5,*

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 55-72, 2021, DOI:10.32604/iasc.2021.017021

    Abstract With the rapid development of Internet, the medical Q&A community has become an important channel for people to obtain and share medical and health knowledge. Online medical entity recognition (OMER), as the foundation of medical and health information extraction, has attracted extensive attention of researchers in recent years. In order to further improve the research progress of Chinese OMER, LSTM-Att-Med model is proposed in this paper to capture more external semantic features and important information. First, Word2vec is used to generate the character-level vectors with semantic features on the basis of the unlabeled corpus in the… More >

  • Open Access

    ARTICLE

    Joint Event Extraction Based on Global Event-Type Guidance and Attention Enhancement

    Daojian Zeng1, Jian Tian2, Ruoyao Peng1, Jianhua Dai1,*, Hui Gao3, Peng Peng4

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4161-4173, 2021, DOI:10.32604/cmc.2021.017028

    Abstract Event extraction is one of the most challenging tasks in information extraction. It is a common phenomenon where multiple events exist in the same sentence. However, extracting multiple events is more difficult than extracting a single event. Existing event extraction methods based on sequence models ignore the interrelated information between events because the sequence is too long. In addition, the current argument extraction relies on the results of syntactic dependency analysis, which is complicated and prone to error transmission. In order to solve the above problems, a joint event extraction method based on global event-type… More >

  • Open Access

    ARTICLE

    Image-to-Image Style Transfer Based on the Ghost Module

    Yan Jiang1, Xinrui Jia1, Liguo Zhang1,2,*, Ye Yuan1, Lei Chen3, Guisheng Yin1

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4051-4067, 2021, DOI:10.32604/cmc.2021.016481

    Abstract The technology for image-to-image style transfer (a prevalent image processing task) has developed rapidly. The purpose of style transfer is to extract a texture from the source image domain and transfer it to the target image domain using a deep neural network. However, the existing methods typically have a large computational cost. To achieve efficient style transfer, we introduce a novel Ghost module into the GANILLA architecture to produce more feature maps from cheap operations. Then we utilize an attention mechanism to transform images with various styles. We optimize the original generative adversarial network (GAN) More >

  • Open Access

    ARTICLE

    YOLOv3 Attention Face Detector with High Accuracy and Efficiency

    Qiyuan Liu, Shuhua Lu*, Lingqiang Lan

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 283-295, 2021, DOI:10.32604/csse.2021.014086

    Abstract In recent years, face detection has attracted much attention and achieved great progress due to its extensively practical applications in the field of face based computer vision. However, the tradeoff between accuracy and efficiency of the face detectors still needs to be further studied. In this paper, using Darknet-53 as backbone, we propose an improved YOLOv3-attention model by introducing attention mechanism and data augmentation to obtain the robust face detector with high accuracy and efficiency. The attention mechanism is introduced to enhance much higher discrimination of the deep features, and the trick of data augmentation… More >

  • Open Access

    ARTICLE

    Adversarial Active Learning for Named Entity Recognition in Cybersecurity

    Tao Li1, Yongjin Hu1,*, Ankang Ju1, Zhuoran Hu2

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 407-420, 2021, DOI:10.32604/cmc.2020.012023

    Abstract Owing to the continuous barrage of cyber threats, there is a massive amount of cyber threat intelligence. However, a great deal of cyber threat intelligence come from textual sources. For analysis of cyber threat intelligence, many security analysts rely on cumbersome and time-consuming manual efforts. Cybersecurity knowledge graph plays a significant role in automatics analysis of cyber threat intelligence. As the foundation for constructing cybersecurity knowledge graph, named entity recognition (NER) is required for identifying critical threat-related elements from textual cyber threat intelligence. Recently, deep neural network-based models have attained very good results in NER.… More >

  • Open Access

    ARTICLE

    Straw Segmentation Algorithm Based on Modified UNet in Complex Farmland Environment

    Yuanyuan Liu1,2, Shuo Zhang1, Haiye Yu3, Yueyong Wang4,*, Yuehan Feng1, Jiahui Sun1, Xiaokang Zhou1

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 247-262, 2021, DOI:10.32604/cmc.2020.012328

    Abstract Intelligent straw coverage detection plays an important role in agricultural production and the ecological environment. Traditional pattern recognition has some problems, such as low precision and a long processing time, when segmenting complex farmland, which cannot meet the conditions of embedded equipment deployment. Based on these problems, we proposed a novel deep learning model with high accuracy, small model size and fast running speed named Residual Unet with Attention mechanism using depthwise convolution (RADw–UNet). This algorithm is based on the UNet symmetric codec model. All the feature extraction modules of the network adopt the residual… More >

Displaying 131-140 on page 14 of 150. Per Page