Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (36)
  • Open Access

    REVIEW

    A Survey on Chinese Sign Language Recognition: From Traditional Methods to Artificial Intelligence

    Xianwei Jiang1, Yanqiong Zhang1,*, Juan Lei1, Yudong Zhang2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 1-40, 2024, DOI:10.32604/cmes.2024.047649

    Abstract Research on Chinese Sign Language (CSL) provides convenience and support for individuals with hearing impairments to communicate and integrate into society. This article reviews the relevant literature on Chinese Sign Language Recognition (CSLR) in the past 20 years. Hidden Markov Models (HMM), Support Vector Machines (SVM), and Dynamic Time Warping (DTW) were found to be the most commonly employed technologies among traditional identification methods. Benefiting from the rapid development of computer vision and artificial intelligence technology, Convolutional Neural Networks (CNN), 3D-CNN, YOLO, Capsule Network (CapsNet) and various deep neural networks have sprung up. Deep Neural Networks (DNNs) and their derived… More >

  • Open Access

    ARTICLE

    Optimizing Deep Neural Networks for Face Recognition to Increase Training Speed and Improve Model Accuracy

    Mostafa Diba*, Hossein Khosravi

    Intelligent Automation & Soft Computing, Vol.38, No.3, pp. 315-332, 2023, DOI:10.32604/iasc.2023.046590

    Abstract Convolutional neural networks continually evolve to enhance accuracy in addressing various problems, leading to an increase in computational cost and model size. This paper introduces a novel approach for pruning face recognition models based on convolutional neural networks. The proposed method identifies and removes inefficient filters based on the information volume in feature maps. In each layer, some feature maps lack useful information, and there exists a correlation between certain feature maps. Filters associated with these two types of feature maps impose additional computational costs on the model. By eliminating filters related to these categories of feature maps, the reduction… More >

  • Open Access

    ARTICLE

    Abstractive Arabic Text Summarization Using Hyperparameter Tuned Denoising Deep Neural Network

    Ibrahim M. Alwayle1, Hala J. Alshahrani2, Saud S. Alotaibi3, Khaled M. Alalayah1, Amira Sayed A. Aziz4, Khadija M. Alaidarous1, Ibrahim Abdulrab Ahmed5, Manar Ahmed Hamza6,*

    Intelligent Automation & Soft Computing, Vol.38, No.2, pp. 153-168, 2023, DOI:10.32604/iasc.2023.034718

    Abstract Abstractive text summarization is crucial to produce summaries of natural language with basic concepts from large text documents. Despite the achievement of English language-related abstractive text summarization models, the models that support Arabic language text summarization are fewer in number. Recent abstractive Arabic summarization models encounter different issues that need to be resolved. Syntax inconsistency is a crucial issue resulting in the low-accuracy summary. A new technique has achieved remarkable outcomes by adding topic awareness in the text summarization process that guides the module by imitating human awareness. The current research article presents Abstractive Arabic Text Summarization using Hyperparameter Tuned… More >

  • Open Access

    ARTICLE

    An Intelligent Secure Adversarial Examples Detection Scheme in Heterogeneous Complex Environments

    Weizheng Wang1,3, Xiangqi Wang2,*, Xianmin Pan1, Xingxing Gong3, Jian Liang3, Pradip Kumar Sharma4, Osama Alfarraj5, Wael Said6

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3859-3876, 2023, DOI:10.32604/cmc.2023.041346

    Abstract Image-denoising techniques are widely used to defend against Adversarial Examples (AEs). However, denoising alone cannot completely eliminate adversarial perturbations. The remaining perturbations tend to amplify as they propagate through deeper layers of the network, leading to misclassifications. Moreover, image denoising compromises the classification accuracy of original examples. To address these challenges in AE defense through image denoising, this paper proposes a novel AE detection technique. The proposed technique combines multiple traditional image-denoising algorithms and Convolutional Neural Network (CNN) network structures. The used detector model integrates the classification results of different models as the input to the detector and calculates the… More >

  • Open Access

    ARTICLE

    Early Diagnosis of Lung Tumors for Extending Patients’ Life Using Deep Neural Networks

    A. Manju1, R. kaladevi2, Shanmugasundaram Hariharan3, Shih-Yu Chen4,5,*, Vinay Kukreja6, Pradip Kumar Sharma7, Fayez Alqahtani8, Amr Tolba9, Jin Wang10

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 993-1007, 2023, DOI:10.32604/cmc.2023.039567

    Abstract The medical community has more concern on lung cancer analysis. Medical experts’ physical segmentation of lung cancers is time-consuming and needs to be automated. The research study’s objective is to diagnose lung tumors at an early stage to extend the life of humans using deep learning techniques. Computer-Aided Diagnostic (CAD) system aids in the diagnosis and shortens the time necessary to detect the tumor detected. The application of Deep Neural Networks (DNN) has also been exhibited as an excellent and effective method in classification and segmentation tasks. This research aims to separate lung cancers from images of Magnetic Resonance Imaging… More >

  • Open Access

    ARTICLE

    New Denial of Service Attacks Detection Approach Using Hybridized Deep Neural Networks and Balanced Datasets

    Ouail Mjahed1,*, Salah El Hadaj1, El Mahdi El Guarmah1,2, Soukaina Mjahed1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 757-775, 2023, DOI:10.32604/csse.2023.039111

    Abstract Denial of Service (DoS/DDoS) intrusions are damaging cyber-attacks, and their identification is of great interest to the Intrusion Detection System (IDS). Existing IDS are mainly based on Machine Learning (ML) methods including Deep Neural Networks (DNN), but which are rarely hybridized with other techniques. The intrusion data used are generally imbalanced and contain multiple features. Thus, the proposed approach aims to use a DNN-based method to detect DoS/DDoS attacks using CICIDS2017, CSE-CICIDS2018 and CICDDoS 2019 datasets, according to the following key points. a) Three imbalanced CICIDS2017-2018-2019 datasets, including Benign and DoS/DDoS attack classes, are used. b) A new technique based… More >

  • Open Access

    ARTICLE

    ResCD-FCN: Semantic Scene Change Detection Using Deep Neural Networks

    S. Eliza Femi Sherley1,*, J. M. Karthikeyan1, N. Bharath Raj1, R. Prabakaran2, A. Abinaya1, S. V. V. Lakshmi3

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 215-227, 2022, DOI:10.32604/jai.2022.034931

    Abstract Semantic change detection is extension of change detection task in which it is not only used to identify the changed regions but also to analyze the land area semantic (labels/categories) details before and after the timelines are analyzed. Periodical land change analysis is used for many real time applications for valuation purposes. Majority of the research works are focused on Convolutional Neural Networks (CNN) which tries to analyze changes alone. Semantic information of changes appears to be missing, there by absence of communication between the different semantic timelines and changes detected over the region happens. To overcome this limitation, a… More >

  • Open Access

    ARTICLE

    Hyperparameter Tuning for Deep Neural Networks Based Optimization Algorithm

    D. Vidyabharathi1,*, V. Mohanraj2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2559-2573, 2023, DOI:10.32604/iasc.2023.032255

    Abstract For training the present Neural Network (NN) models, the standard technique is to utilize decaying Learning Rates (LR). While the majority of these techniques commence with a large LR, they will decay multiple times over time. Decaying has been proved to enhance generalization as well as optimization. Other parameters, such as the network’s size, the number of hidden layers, dropouts to avoid overfitting, batch size, and so on, are solely based on heuristics. This work has proposed Adaptive Teaching Learning Based (ATLB) Heuristic to identify the optimal hyperparameters for diverse networks. Here we consider three architectures Recurrent Neural Networks (RNN),… More >

  • Open Access

    ARTICLE

    Adaptive Backdoor Attack against Deep Neural Networks

    Honglu He, Zhiying Zhu, Xinpeng Zhang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2617-2633, 2023, DOI:10.32604/cmes.2023.025923

    Abstract In recent years, the number of parameters of deep neural networks (DNNs) has been increasing rapidly. The training of DNNs is typically computation-intensive. As a result, many users leverage cloud computing and outsource their training procedures. Outsourcing computation results in a potential risk called backdoor attack, in which a welltrained DNN would perform abnormally on inputs with a certain trigger. Backdoor attacks can also be classified as attacks that exploit fake images. However, most backdoor attacks design a uniform trigger for all images, which can be easily detected and removed. In this paper, we propose a novel adaptive backdoor attack.… More >

  • Open Access

    ARTICLE

    A Novel Light Weight CNN Framework Integrated with Marine Predator Optimization for the Assessment of Tear Film-Lipid Layer Patterns

    Bejoy Abraham1, Jesna Mohan2, Linu Shine3, Sivakumar Ramachandran3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 87-106, 2023, DOI:10.32604/cmes.2023.023384

    Abstract Tear film, the outermost layer of the eye, is a complex and dynamic structure responsible for tear production. The tear film lipid layer is a vital component of the tear film that provides a smooth optical surface for the cornea and wetting the ocular surface. Dry eye syndrome (DES) is a symptomatic disease caused by reduced tear production, poor tear quality, or excessive evaporation. Its diagnosis is a difficult task due to its multifactorial etiology. Out of several clinical tests available, the evaluation of the interference patterns of the tear film lipid layer forms a potential tool for DES diagnosis.… More >

Displaying 1-10 on page 1 of 36. Per Page