Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (60)
  • Open Access

    ARTICLE

    Tight Sandstone Image Augmentation for Image Identification Using Deep Learning

    Dongsheng Li, Chunsheng Li*, Kejia Zhang, Tao Liu, Fang Liu, Jingsong Yin, Mingyue Liao

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1209-1231, 2023, DOI:10.32604/csse.2023.034395 - 26 May 2023

    Abstract Intelligent identification of sandstone slice images using deep learning technology is the development trend of mineral identification, and accurate mineral particle segmentation is the most critical step for intelligent identification. A typical identification model requires many training samples to learn as many distinguishable features as possible. However, limited by the difficulty of data acquisition, the high cost of labeling, and privacy protection, this has led to a sparse sample number and cannot meet the training requirements of deep learning image identification models. In order to increase the number of samples and improve the training effect… More >

  • Open Access

    ARTICLE

    Data Augmentation Using Contour Image for Convolutional Neural Network

    Seung-Yeon Hwang1, Jeong-Joon Kim2,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4669-4680, 2023, DOI:10.32604/cmc.2023.031129 - 29 April 2023

    Abstract With the development of artificial intelligence-related technologies such as deep learning, various organizations, including the government, are making various efforts to generate and manage big data for use in artificial intelligence. However, it is difficult to acquire big data due to various social problems and restrictions such as personal information leakage. There are many problems in introducing technology in fields that do not have enough training data necessary to apply deep learning technology. Therefore, this study proposes a mixed contour data augmentation technique, which is a data augmentation technique using contour images, to solve a… More >

  • Open Access

    ARTICLE

    Question-Answering Pair Matching Based on Question Classification and Ensemble Sentence Embedding

    Jae-Seok Jang1, Hyuk-Yoon Kwon2,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3471-3489, 2023, DOI:10.32604/csse.2023.035570 - 03 April 2023

    Abstract Question-answering (QA) models find answers to a given question. The necessity of automatically finding answers is increasing because it is very important and challenging from the large-scale QA data sets. In this paper, we deal with the QA pair matching approach in QA models, which finds the most relevant question and its recommended answer for a given question. Existing studies for the approach performed on the entire dataset or datasets within a category that the question writer manually specifies. In contrast, we aim to automatically find the category to which the question belongs by employing… More >

  • Open Access

    ARTICLE

    Multi-Task Learning Model with Data Augmentation for Arabic Aspect-Based Sentiment Analysis

    Arwa Saif Fadel1,2,*, Osama Ahmed Abulnaja1, Mostafa Elsayed Saleh1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4419-4444, 2023, DOI:10.32604/cmc.2023.037112 - 31 March 2023

    Abstract Aspect-based sentiment analysis (ABSA) is a fine-grained process. Its fundamental subtasks are aspect term extraction (ATE) and aspect polarity classification (APC), and these subtasks are dependent and closely related. However, most existing works on Arabic ABSA content separately address them, assume that aspect terms are preidentified, or use a pipeline model. Pipeline solutions design different models for each task, and the output from the ATE model is used as the input to the APC model, which may result in error propagation among different steps because APC is affected by ATE error. These methods are impractical… More >

  • Open Access

    ARTICLE

    Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification

    Younghoon Ban, Jeong Hyun Yi, Haehyun Cho*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2215-2230, 2023, DOI:10.32604/csse.2023.036555 - 09 February 2023

    Abstract Android malware has evolved in various forms such as adware that continuously exposes advertisements, banking malware designed to access users’ online banking accounts, and Short Message Service (SMS) malware that uses a Command & Control (C&C) server to send malicious SMS, intercept SMS, and steal data. By using many malicious strategies, the number of malware is steadily increasing. Increasing Android malware threats numerous users, and thus, it is necessary to detect malware quickly and accurately. Each malware has distinguishable characteristics based on its actions. Therefore, security researchers have tried to categorize malware based on their… More >

  • Open Access

    ARTICLE

    Brain Tumor Identification Using Data Augmentation and Transfer Learning Approach

    K. Kavin Kumar1, P. M. Dinesh2, P. Rayavel3, L. Vijayaraja4, R. Dhanasekar4, Rupa Kesavan5, Kannadasan Raju6, Arfat Ahmad Khan7, Chitapong Wechtaisong8,*, Mohd Anul Haq9, Zamil S. Alzamil9, Ahmed Alhussen10

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1845-1861, 2023, DOI:10.32604/csse.2023.033927 - 09 February 2023

    Abstract A brain tumor is a lethal neurological disease that affects the average performance of the brain and can be fatal. In India, around 15 million cases are diagnosed yearly. To mitigate the seriousness of the tumor it is essential to diagnose at the beginning. Notwithstanding, the manual evaluation process utilizing Magnetic Resonance Imaging (MRI) causes a few worries, remarkably inefficient and inaccurate brain tumor diagnoses. Similarly, the examination process of brain tumors is intricate as they display high unbalance in nature like shape, size, appearance, and location. Therefore, a precise and expeditious prognosis of brain… More >

  • Open Access

    ARTICLE

    A Novel Motor Fault Diagnosis Method Based on Generative Adversarial Learning with Distribution Fusion of Discrete Working Conditions

    Qixin Lan, Binqiang Chen*, Bin Yao

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 2017-2037, 2023, DOI:10.32604/cmes.2023.025307 - 06 February 2023

    Abstract Many kinds of electrical equipment are used in civil and building engineering. The motor is one of the main power components of this electrical equipment, which can provide stable power output. During the long-term use of motors, various motor faults may occur, which affects the normal use of electrical equipment and even causes accidents. It is significant to apply fault diagnosis for the motors at the construction site. Aiming at the problem that signal data of faulty motor lack diversity, this research designs a multi-layer perceptron Wasserstein generative adversarial network, which is used to enhance… More >

  • Open Access

    ARTICLE

    Fruit Leaf Diseases Classification: A Hierarchical Deep Learning Framework

    Samra Rehman1, Muhammad Attique Khan1, Majed Alhaisoni2, Ammar Armghan3, Fayadh Alenezi3, Abdullah Alqahtani4, Khean Vesal5, Yunyoung Nam5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1179-1194, 2023, DOI:10.32604/cmc.2023.035324 - 06 February 2023

    Abstract Manual inspection of fruit diseases is a time-consuming and costly because it is based on naked-eye observation. The authors present computer vision techniques for detecting and classifying fruit leaf diseases. Examples of computer vision techniques are preprocessing original images for visualization of infected regions, feature extraction from raw or segmented images, feature fusion, feature selection, and classification. The following are the major challenges identified by researchers in the literature: (i) low-contrast infected regions extract irrelevant and redundant information, which misleads classification accuracy; (ii) irrelevant and redundant information may increase computational time and reduce the designed… More >

  • Open Access

    ARTICLE

    Breast Cancer Detection Using Breastnet-18 Augmentation with Fine Tuned Vgg-16

    S. J. K. Jagadeesh Kumar1, P. Parthasarathi2, Mofreh A. Hogo3, Mehedi Masud4, Jehad F. Al-Amri5, Mohamed Abouhawwash6,7,*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2363-2378, 2023, DOI:10.32604/iasc.2023.033800 - 05 January 2023

    Abstract Women from middle age to old age are mostly screened positive for Breast cancer which leads to death. Times over the past decades, the overall survival rate in breast cancer has improved due to advancements in early-stage diagnosis and tailored therapy. Today all hospital brings high awareness and early detection technologies for breast cancer. This increases the survival rate of women. Though traditional breast cancer treatment takes so long, early cancer techniques require an automation system. This research provides a new methodology for classifying breast cancer using ultrasound pictures that use deep learning and the… More >

  • Open Access

    ARTICLE

    Data Augmentation and Random Multi-Model Deep Learning for Data Classification

    Fatma Harby1, Adel Thaljaoui1, Durre Nayab2, Suliman Aladhadh3,*, Salim EL Khediri3,4, Rehan Ullah Khan3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5191-5207, 2023, DOI:10.32604/cmc.2022.029420 - 28 December 2022

    Abstract In the machine learning (ML) paradigm, data augmentation serves as a regularization approach for creating ML models. The increase in the diversification of training samples increases the generalization capabilities, which enhances the prediction performance of classifiers when tested on unseen examples. Deep learning (DL) models have a lot of parameters, and they frequently overfit. Effectively, to avoid overfitting, data plays a major role to augment the latest improvements in DL. Nevertheless, reliable data collection is a major limiting factor. Frequently, this problem is undertaken by combining augmentation of data, transfer learning, dropout, and methods of More >

Displaying 21-30 on page 3 of 60. Per Page