Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (133)
  • Open Access

    ARTICLE

    RT-YOLO: A Residual Feature Fusion Triple Attention Network for Aerial Image Target Detection

    Pan Zhang, Hongwei Deng*, Zhong Chen

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1411-1430, 2023, DOI:10.32604/cmc.2023.034876

    Abstract In recent years, target detection of aerial images of unmanned aerial vehicle (UAV) has become one of the hottest topics. However, target detection of UAV aerial images often presents false detection and missed detection. We proposed a modified you only look once (YOLO) model to improve the problems arising in object detection in UAV aerial images: (1) A new residual structure is designed to improve the ability to extract features by enhancing the fusion of the inner features of the single layer. At the same time, triplet attention module is added to strengthen the connection between space and channel and… More >

  • Open Access

    ARTICLE

    License Plate Recognition via Attention Mechanism

    Longjuan Wang1,2, Chunjie Cao1,2, Binghui Zou1,2, Jun Ye1,2,*, Jin Zhang3

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1801-1814, 2023, DOI:10.32604/cmc.2023.032785

    Abstract License plate recognition technology use widely in intelligent traffic management and control. Researchers have been committed to improving the speed and accuracy of license plate recognition for nearly 30 years. This paper is the first to propose combining the attention mechanism with YOLO-v5 and LPRnet to construct a new license plate recognition model (LPR-CBAM-Net). Through the attention mechanism CBAM (Convolutional Block Attention Module), the importance of different feature channels in license plate recognition can be re-calibrated to obtain proper attention to features. Force information to achieve the purpose of improving recognition speed and accuracy. Experimental results show that the model… More >

  • Open Access

    ARTICLE

    Discharge Summaries Based Sentiment Detection Using Multi-Head Attention and CNN-BiGRU

    Samer Abdulateef Waheeb*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 981-998, 2023, DOI:10.32604/csse.2023.035753

    Abstract Automatic extraction of the patient’s health information from the unstructured data concerning the discharge summary remains challenging. Discharge summary related documents contain various aspects of the patient health condition to examine the quality of treatment and thereby help improve decision-making in the medical field. Using a sentiment dictionary and feature engineering, the researchers primarily mine semantic text features. However, choosing and designing features requires a lot of manpower. The proposed approach is an unsupervised deep learning model that learns a set of clusters embedded in the latent space. A composite model including Active Learning (AL), Convolutional Neural Network (CNN), BiGRU,… More >

  • Open Access

    ARTICLE

    3D Object Detection with Attention: Shell-Based Modeling

    Xiaorui Zhang1,2,3,4,*, Ziquan Zhao1, Wei Sun4,5, Qi Cui6

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 537-550, 2023, DOI:10.32604/csse.2023.034230

    Abstract LIDAR point cloud-based 3D object detection aims to sense the surrounding environment by anchoring objects with the Bounding Box (BBox). However, under the three-dimensional space of autonomous driving scenes, the previous object detection methods, due to the pre-processing of the original LIDAR point cloud into voxels or pillars, lose the coordinate information of the original point cloud, slow detection speed, and gain inaccurate bounding box positioning. To address the issues above, this study proposes a new two-stage network structure to extract point cloud features directly by PointNet++, which effectively preserves the original point cloud coordinate information. To improve the detection… More >

  • Open Access

    ARTICLE

    Image Semantic Segmentation for Autonomous Driving Based on Improved U-Net

    Chuanlong Sun, Hong Zhao*, Liang Mu, Fuliang Xu, Laiwei Lu

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 787-801, 2023, DOI:10.32604/cmes.2023.025119

    Abstract Image semantic segmentation has become an essential part of autonomous driving. To further improve the generalization ability and the robustness of semantic segmentation algorithms, a lightweight algorithm network based on Squeeze-and-Excitation Attention Mechanism (SE) and Depthwise Separable Convolution (DSC) is designed. Meanwhile, Adam-GC, an Adam optimization algorithm based on Gradient Compression (GC), is proposed to improve the training speed, segmentation accuracy, generalization ability and stability of the algorithm network. To verify and compare the effectiveness of the algorithm network proposed in this paper, the trained network model is used for experimental verification and comparative test on the Cityscapes semantic segmentation… More >

  • Open Access

    ARTICLE

    Bridge Crack Segmentation Method Based on Parallel Attention Mechanism and Multi-Scale Features Fusion

    Jianwei Yuan1, Xinli Song1,*, Huaijian Pu2, Zhixiong Zheng3, Ziyang Niu3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6485-6503, 2023, DOI:10.32604/cmc.2023.035165

    Abstract Regular inspection of bridge cracks is crucial to bridge maintenance and repair. The traditional manual crack detection methods are time-consuming, dangerous and subjective. At the same time, for the existing mainstream vision-based automatic crack detection algorithms, it is challenging to detect fine cracks and balance the detection accuracy and speed. Therefore, this paper proposes a new bridge crack segmentation method based on parallel attention mechanism and multi-scale features fusion on top of the DeeplabV3+ network framework. First, the improved lightweight MobileNet-v2 network and dilated separable convolution are integrated into the original DeeplabV3+ network to improve the original backbone network Xception… More >

  • Open Access

    ARTICLE

    Forecasting Future Trajectories with an Improved Transformer Network

    Wei Wu1, Weigong Zhang1,*, Dong Wang1, Lydia Zhu2, Xiang Song3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3811-3828, 2023, DOI:10.32604/cmc.2023.029787

    Abstract An increase in car ownership brings convenience to people’s life. However, it also leads to frequent traffic accidents. Precisely forecasting surrounding agents’ future trajectories could effectively decrease vehicle-vehicle and vehicle-pedestrian collisions. Long-short-term memory (LSTM) network is often used for vehicle trajectory prediction, but it has some shortages such as gradient explosion and low efficiency. A trajectory prediction method based on an improved Transformer network is proposed to forecast agents’ future trajectories in a complex traffic environment. It realizes the transformation from sequential step processing of LSTM to parallel processing of Transformer based on attention mechanism. To perform trajectory prediction more… More >

  • Open Access

    ARTICLE

    CEMA-LSTM: Enhancing Contextual Feature Correlation for Radar Extrapolation Using Fine-Grained Echo Datasets

    Zhiyun Yang1,#, Qi Liu1,#,*, Hao Wu1, Xiaodong Liu2, Yonghong Zhang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 45-64, 2023, DOI:10.32604/cmes.2022.022045

    Abstract Accurate precipitation nowcasting can provide great convenience to the public so they can conduct corresponding arrangements in advance to deal with the possible impact of upcoming heavy rain. Recent relevant research activities have shown their concerns on various deep learning models for radar echo extrapolation, where radar echo maps were used to predict their consequent moment, so as to recognize potential severe convective weather events. However, these approaches suffer from an inaccurate prediction of echo dynamics and unreliable depiction of echo aggregation or dissipation, due to the size limitation of convolution filter, lack of global feature, and less attention to… More > Graphic Abstract

    CEMA-LSTM: Enhancing Contextual Feature Correlation for Radar Extrapolation Using Fine-Grained Echo Datasets

  • Open Access

    ARTICLE

    Performance Analysis of a Chunk-Based Speech Emotion Recognition Model Using RNN

    Hyun-Sam Shin1, Jun-Ki Hong2,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 235-248, 2023, DOI:10.32604/iasc.2023.033082

    Abstract Recently, artificial-intelligence-based automatic customer response system has been widely used instead of customer service representatives. Therefore, it is important for automatic customer service to promptly recognize emotions in a customer’s voice to provide the appropriate service accordingly. Therefore, we analyzed the performance of the emotion recognition (ER) accuracy as a function of the simulation time using the proposed chunk-based speech ER (CSER) model. The proposed CSER model divides voice signals into 3-s long chunks to efficiently recognize characteristically inherent emotions in the customer’s voice. We evaluated the performance of the ER of voice signal chunks by applying four RNN techniques—long… More >

  • Open Access

    ARTICLE

    Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism

    Yongjie Yang1, Shanshan Tu1, Raja Hashim Ali2, Hisham Alasmary3,4, Muhammad Waqas5,6,*, Muhammad Nouman Amjad7

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 801-815, 2023, DOI:10.32604/cmc.2023.031907

    Abstract With the recent developments in the Internet of Things (IoT), the amount of data collected has expanded tremendously, resulting in a higher demand for data storage, computational capacity, and real-time processing capabilities. Cloud computing has traditionally played an important role in establishing IoT. However, fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility, location awareness, heterogeneity, scalability, low latency, and geographic distribution. However, IoT networks are vulnerable to unwanted assaults because of their open and shared nature. As a result, various fog computing-based security models that protect IoT networks have been developed.… More >

Displaying 81-90 on page 9 of 133. Per Page