Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (498)
  • Open Access

    ARTICLE

    Speech Recognition via CTC-CNN Model

    Wen-Tsai Sung1, Hao-Wei Kang1, Sung-Jung Hsiao2,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3833-3858, 2023, DOI:10.32604/cmc.2023.040024

    Abstract In the speech recognition system, the acoustic model is an important underlying model, and its accuracy directly affects the performance of the entire system. This paper introduces the construction and training process of the acoustic model in detail and studies the Connectionist temporal classification (CTC) algorithm, which plays an important role in the end-to-end framework, established a convolutional neural network (CNN) combined with an acoustic model of Connectionist temporal classification to improve the accuracy of speech recognition. This study uses a sound sensor, ReSpeaker Mic Array v2.0.1, to convert the collected speech signals into text or corresponding speech signals to… More >

  • Open Access

    ARTICLE

    Detection of Different Stages of Alzheimer’s Disease Using CNN Classifier

    S M Hasan Mahmud1,2, Md Mamun Ali3, Mohammad Fahim Shahriar1, Fahad Ahmed Al-Zahrani4, Kawsar Ahmed5,6,*, Dip Nandi1, Francis M. Bui5

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3933-3948, 2023, DOI:10.32604/cmc.2023.039020

    Abstract Alzheimer’s disease (AD) is a neurodevelopmental impairment that results in a person’s behavior, thinking, and memory loss. The most common symptoms of AD are losing memory and early aging. In addition to these, there are several serious impacts of AD. However, the impact of AD can be mitigated by early-stage detection though it cannot be cured permanently. Early-stage detection is the most challenging task for controlling and mitigating the impact of AD. The study proposes a predictive model to detect AD in the initial phase based on machine learning and a deep learning approach to address the issue. To build… More >

  • Open Access

    ARTICLE

    Improved Shark Smell Optimization Algorithm for Human Action Recognition

    Inzamam Mashood Nasir1,*, Mudassar Raza1, Jamal Hussain Shah1, Muhammad Attique Khan2, Yun-Cheol Nam3, Yunyoung Nam4,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2667-2684, 2023, DOI:10.32604/cmc.2023.035214

    Abstract Human Action Recognition (HAR) in uncontrolled environments targets to recognition of different actions from a video. An effective HAR model can be employed for an application like human-computer interaction, health care, person tracking, and video surveillance. Machine Learning (ML) approaches, specifically, Convolutional Neural Network (CNN) models had been widely used and achieved impressive results through feature fusion. The accuracy and effectiveness of these models continue to be the biggest challenge in this field. In this article, a novel feature optimization algorithm, called improved Shark Smell Optimization (iSSO) is proposed to reduce the redundancy of extracted features. This proposed technique is… More >

  • Open Access

    ARTICLE

    Hybrid Model for Short-Term Passenger Flow Prediction in Rail Transit

    Yinghua Song1,2, Hairong Lyu1,2, Wei Zhang1,2,*

    Journal on Big Data, Vol.5, pp. 19-40, 2023, DOI:10.32604/jbd.2023.038249

    Abstract A precise and timely forecast of short-term rail transit passenger flow provides data support for traffic management and operation, assisting rail operators in efficiently allocating resources and timely relieving pressure on passenger safety and operation. First, the passenger flow sequence models in the study are broken down using VMD for noise reduction. The objective environment features are then added to the characteristic factors that affect the passenger flow. The target station serves as an additional spatial feature and is mined concurrently using the KNN algorithm. It is shown that the hybrid model VMD-CLSMT has a higher prediction accuracy, by setting… More >

  • Open Access

    ARTICLE

    A Degradation Type Adaptive and Deep CNN-Based Image Classification Model for Degraded Images

    Huanhua Liu, Wei Wang*, Hanyu Liu, Shuheng Yi, Yonghao Yu, Xunwen Yao

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 459-472, 2024, DOI:10.32604/cmes.2023.029084

    Abstract Deep Convolutional Neural Networks (CNNs) have achieved high accuracy in image classification tasks, however, most existing models are trained on high-quality images that are not subject to image degradation. In practice, images are often affected by various types of degradation which can significantly impact the performance of CNNs. In this work, we investigate the influence of image degradation on three typical image classification CNNs and propose a Degradation Type Adaptive Image Classification Model (DTA-ICM) to improve the existing CNNs’ classification accuracy on degraded images. The proposed DTA-ICM comprises two key components: a Degradation Type Predictor (DTP) and a Degradation Type… More >

  • Open Access

    ARTICLE

    Detection of a Quasiperiodic Phenomenon of a Binary Star System Using Convolutional Neural Network

    Denis Benka*, Sabína Vašová, Michal Kebísek, Maximilián Strémy

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2519-2535, 2023, DOI:10.32604/iasc.2023.040799

    Abstract Pattern recognition algorithms are commonly utilized to discover certain patterns, particularly in image-based data. Our study focuses on quasiperiodic oscillations (QPO) in celestial objects referred to as cataclysmic variables (CV). We are dealing with interestingly indistinct QPO signals, which we analyze using a power density spectrum (PDS). The confidence in detecting the latter using certain statistical approaches may come out with less significance than the truth. We work with real and simulated QPO data of a CV called MV Lyrae. Our primary statistical tool for determining confidence levels is sigma intervals. The aforementioned CV has scientifically proven QPO existence, but… More >

  • Open Access

    ARTICLE

    Aspect-Based Sentiment Classification Using Deep Learning and Hybrid of Word Embedding and Contextual Position

    Waqas Ahmad1, Hikmat Ullah Khan1,2,*, Fawaz Khaled Alarfaj3,*, Saqib Iqbal4, Abdullah Mohammad Alomair3, Naif Almusallam3

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3101-3124, 2023, DOI:10.32604/iasc.2023.040614

    Abstract Aspect-based sentiment analysis aims to detect and classify the sentiment polarities as negative, positive, or neutral while associating them with their identified aspects from the corresponding context. In this regard, prior methodologies widely utilize either word embedding or tree-based representations. Meanwhile, the separate use of those deep features such as word embedding and tree-based dependencies has become a significant cause of information loss. Generally, word embedding preserves the syntactic and semantic relations between a couple of terms lying in a sentence. Besides, the tree-based structure conserves the grammatical and logical dependencies of context. In addition, the sentence-oriented word position describes… More >

  • Open Access

    ARTICLE

    A Novel Attack on Complex APUFs Using the Evolutionary Deep Convolutional Neural Network

    Ali Ahmadi Shahrakht1, Parisa Hajirahimi2, Omid Rostami3, Diego Martín4,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3059-3081, 2023, DOI:10.32604/iasc.2023.040502

    Abstract As the internet of things (IoT) continues to expand rapidly, the significance of its security concerns has grown in recent years. To address these concerns, physical unclonable functions (PUFs) have emerged as valuable tools for enhancing IoT security. PUFs leverage the inherent randomness found in the embedded hardware of IoT devices. However, it has been shown that some PUFs can be modeled by attackers using machine-learning-based approaches. In this paper, a new deep learning (DL)-based modeling attack is introduced to break the resistance of complex XAPUFs. Because training DL models is a problem that falls under the category of NP-hard… More >

  • Open Access

    EDITORIAL

    Grad-CAM: Understanding AI Models

    Shuihua Wang1,2, Yudong Zhang2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1321-1324, 2023, DOI:10.32604/cmc.2023.041419

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    CNN-Based RF Fingerprinting Method for Securing Passive Keyless Entry and Start System

    Hyeon Park1, SeoYeon Kim2, Seok Min Ko1, TaeGuen Kim2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1891-1909, 2023, DOI:10.32604/cmc.2023.039464

    Abstract The rapid growth of modern vehicles with advanced technologies requires strong security to ensure customer safety. One key system that needs protection is the passive key entry system (PKES). To prevent attacks aimed at defeating the PKES, we propose a novel radio frequency (RF) fingerprinting method. Our method extracts the cepstral coefficient feature as a fingerprint of a radio frequency signal. This feature is then analyzed using a convolutional neural network (CNN) for device identification. In evaluation, we conducted experiments to determine the effectiveness of different cepstral coefficient features and the convolutional neural network-based model. Our experimental results revealed that… More >

Displaying 61-70 on page 7 of 498. Per Page