Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (182)
  • Open Access

    ARTICLE

    An Improved Encoder-Decoder CNN with Region-Based Filtering for Vibrant Colorization

    Mrityunjoy Gain1, Md Arifur Rahman1, Rameswar Debnath1, Mrim M. Alnfiai2, Abdullah Sheikh3, Mehedi Masud3, Anupam Kumar Bairagi1,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1059-1077, 2023, DOI:10.32604/csse.2023.034809 - 20 January 2023

    Abstract Colorization is the practice of adding appropriate chromatic values to monochrome photographs or videos. A real-valued luminance image can be mapped to a three-dimensional color image. However, it is a severely ill-defined problem and not has a single solution. In this paper, an encoder-decoder Convolutional Neural Network (CNN) model is used for colorizing gray images where the encoder is a Densely Connected Convolutional Network (DenseNet) and the decoder is a conventional CNN. The DenseNet extracts image features from gray images and the conventional CNN outputs a * b * color channels. Due to a large number of desaturated… More >

  • Open Access

    ARTICLE

    A Lightweight Deep Autoencoder Scheme for Cyberattack Detection in the Internet of Things

    Maha Sabir1, Jawad Ahmad2,*, Daniyal Alghazzawi1

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 57-72, 2023, DOI:10.32604/csse.2023.034277 - 20 January 2023

    Abstract The Internet of things (IoT) is an emerging paradigm that integrates devices and services to collect real-time data from surroundings and process the information at a very high speed to make a decision. Despite several advantages, the resource-constrained and heterogeneous nature of IoT networks makes them a favorite target for cybercriminals. A single successful attempt of network intrusion can compromise the complete IoT network which can lead to unauthorized access to the valuable information of consumers and industries. To overcome the security challenges of IoT networks, this article proposes a lightweight deep autoencoder (DAE) based… More >

  • Open Access

    ARTICLE

    A Convolutional Autoencoder Based Fault Detection Method for Metro Railway Turnout

    Chen Chen1,2, Xingqiu Li2,3,*, Kai Huang4, Zhongwei Xu1, Meng Mei1

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 471-485, 2023, DOI:10.32604/cmes.2023.024033 - 05 January 2023

    Abstract Railway turnout is one of the critical equipment of Switch & Crossing (S&C) Systems in railway, related to the train’s safety and operation efficiency. With the advancement of intelligent sensors, data-driven fault detection technology for railway turnout has become an important research topic. However, little research in the literature has investigated the capability of data-driven fault detection technology for metro railway turnout. This paper presents a convolutional autoencoder-based fault detection method for the metro railway turnout considering human field inspection scenarios. First, the one-dimensional original time-series signal is converted into a two-dimensional image by data More >

  • Open Access

    ARTICLE

    Optimal Deep Learning Driven Intrusion Detection in SDN-Enabled IoT Environment

    Mohammed Maray1, Haya Mesfer Alshahrani2, Khalid A. Alissa3, Najm Alotaibi4, Abdulbaset Gaddah5, Ali Meree1,6, Mahmoud Othman7, Manar Ahmed Hamza8,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6587-6604, 2023, DOI:10.32604/cmc.2023.034176 - 28 December 2022

    Abstract In recent years, wireless networks are widely used in different domains. This phenomenon has increased the number of Internet of Things (IoT) devices and their applications. Though IoT has numerous advantages, the commonly-used IoT devices are exposed to cyber-attacks periodically. This scenario necessitates real-time automated detection and the mitigation of different types of attacks in high-traffic networks. The Software-Defined Networking (SDN) technique and the Machine Learning (ML)-based intrusion detection technique are effective tools that can quickly respond to different types of attacks in the IoT networks. The Intrusion Detection System (IDS) models can be employed… More >

  • Open Access

    ARTICLE

    Identification of Anomaly Scenes in Videos Using Graph Neural Networks

    Khalid Masood1, Mahmoud M. Al-Sakhnini2,3, Waqas Nawaz4,*, Tauqeer Faiz5,6, Abdul Salam Mohammad7, Hamza Kashif8

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5417-5430, 2023, DOI:10.32604/cmc.2023.033590 - 28 December 2022

    Abstract Generally, conventional methods for anomaly detection rely on clustering, proximity, or classification. With the massive growth in surveillance videos, outliers or anomalies find ingenious ways to obscure themselves in the network and make conventional techniques inefficient. This research explores the structure of Graph neural networks (GNNs) that generalize deep learning frameworks to graph-structured data. Every node in the graph structure is labeled and anomalies, represented by unlabeled nodes, are predicted by performing random walks on the node-based graph structures. Due to their strong learning abilities, GNNs gained popularity in various domains such as natural language… More >

  • Open Access

    ARTICLE

    An End-to-End Transformer-Based Automatic Speech Recognition for Qur’an Reciters

    Mohammed Hadwan1,2,*, Hamzah A. Alsayadi3,4, Salah AL-Hagree5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3471-3487, 2023, DOI:10.32604/cmc.2023.033457 - 31 October 2022

    Abstract The attention-based encoder-decoder technique, known as the trans-former, is used to enhance the performance of end-to-end automatic speech recognition (ASR). This research focuses on applying ASR end-to-end transformer-based models for the Arabic language, as the researchers’ community pays little attention to it. The Muslims Holy Qur’an book is written using Arabic diacritized text. In this paper, an end-to-end transformer model to building a robust Qur’an vs. recognition is proposed. The acoustic model was built using the transformer-based model as deep learning by the PyTorch framework. A multi-head attention mechanism is utilized to represent the encoder and… More >

  • Open Access

    ARTICLE

    Deep Learning Based Face Detection and Identification of Criminal Suspects

    S. Sandhya1, A. Balasundaram2,*, Ayesha Shaik1

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2331-2343, 2023, DOI:10.32604/cmc.2023.032715 - 31 October 2022

    Abstract Occurrence of crimes has been on the constant rise despite the emerging discoveries and advancements in the technological field in the past decade. One of the most tedious tasks is to track a suspect once a crime is committed. As most of the crimes are committed by individuals who have a history of felonies, it is essential for a monitoring system that does not just detect the person’s face who has committed the crime, but also their identity. Hence, a smart criminal detection and identification system that makes use of the OpenCV Deep Neural Network… More >

  • Open Access

    ARTICLE

    A Dual Attention Encoder-Decoder Text Summarization Model

    Nada Ali Hakami1, Hanan Ahmed Hosni Mahmoud2,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3697-3710, 2023, DOI:10.32604/cmc.2023.031525 - 31 October 2022

    Abstract A worthy text summarization should represent the fundamental content of the document. Recent studies on computerized text summarization tried to present solutions to this challenging problem. Attention models are employed extensively in text summarization process. Classical attention techniques are utilized to acquire the context data in the decoding phase. Nevertheless, without real and efficient feature extraction, the produced summary may diverge from the core topic. In this article, we present an encoder-decoder attention system employing dual attention mechanism. In the dual attention mechanism, the attention algorithm gathers main data from the encoder side. In the More >

  • Open Access

    ARTICLE

    ALBERT with Knowledge Graph Encoder Utilizing Semantic Similarity for Commonsense Question Answering

    Byeongmin Choi1, YongHyun Lee1, Yeunwoong Kyung2, Eunchan Kim3,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 71-82, 2023, DOI:10.32604/iasc.2023.032783 - 29 September 2022

    Abstract Recently, pre-trained language representation models such as bidirectional encoder representations from transformers (BERT) have been performing well in commonsense question answering (CSQA). However, there is a problem that the models do not directly use explicit information of knowledge sources existing outside. To augment this, additional methods such as knowledge-aware graph network (KagNet) and multi-hop graph relation network (MHGRN) have been proposed. In this study, we propose to use the latest pre-trained language model a lite bidirectional encoder representations from transformers (ALBERT) with knowledge graph information extraction technique. We also propose to applying the novel method, More >

  • Open Access

    ARTICLE

    An Efficient Encryption and Compression of Sensed IoT Medical Images Using Auto-Encoder

    Passent El-kafrawy1,2, Maie Aboghazalah2,*, Abdelmoty M. Ahmed3, Hanaa Torkey4, Ayman El-Sayed4

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 909-926, 2023, DOI:10.32604/cmes.2022.021713 - 31 August 2022

    Abstract Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common practice. Encryption of medical images is very important to secure patient information. Encrypting these images consumes a lot of time on edge computing; therefore, the use of an auto-encoder for compression before encoding will solve such a problem. In this paper, we use an auto-encoder to compress a medical image before encryption, and an encryption output (vector) is sent out over the network. On the other hand, a decoder was used to reproduce the original image back after the… More >

Displaying 91-100 on page 10 of 182. Per Page