Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (184)
  • Open Access

    ARTICLE

    ALBERT with Knowledge Graph Encoder Utilizing Semantic Similarity for Commonsense Question Answering

    Byeongmin Choi1, YongHyun Lee1, Yeunwoong Kyung2, Eunchan Kim3,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 71-82, 2023, DOI:10.32604/iasc.2023.032783 - 29 September 2022

    Abstract Recently, pre-trained language representation models such as bidirectional encoder representations from transformers (BERT) have been performing well in commonsense question answering (CSQA). However, there is a problem that the models do not directly use explicit information of knowledge sources existing outside. To augment this, additional methods such as knowledge-aware graph network (KagNet) and multi-hop graph relation network (MHGRN) have been proposed. In this study, we propose to use the latest pre-trained language model a lite bidirectional encoder representations from transformers (ALBERT) with knowledge graph information extraction technique. We also propose to applying the novel method, More >

  • Open Access

    ARTICLE

    An Efficient Encryption and Compression of Sensed IoT Medical Images Using Auto-Encoder

    Passent El-kafrawy1,2, Maie Aboghazalah2,*, Abdelmoty M. Ahmed3, Hanaa Torkey4, Ayman El-Sayed4

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 909-926, 2023, DOI:10.32604/cmes.2022.021713 - 31 August 2022

    Abstract Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common practice. Encryption of medical images is very important to secure patient information. Encrypting these images consumes a lot of time on edge computing; therefore, the use of an auto-encoder for compression before encoding will solve such a problem. In this paper, we use an auto-encoder to compress a medical image before encryption, and an encryption output (vector) is sent out over the network. On the other hand, a decoder was used to reproduce the original image back after the… More >

  • Open Access

    ARTICLE

    Optimizing Big Data Retrieval and Job Scheduling Using Deep Learning Approaches

    Bao Rong Chang1, Hsiu-Fen Tsai2,*, Yu-Chieh Lin1

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 783-815, 2023, DOI:10.32604/cmes.2022.020128 - 31 August 2022

    Abstract Big data analytics in business intelligence do not provide effective data retrieval methods and job scheduling that will cause execution inefficiency and low system throughput. This paper aims to enhance the capability of data retrieval and job scheduling to speed up the operation of big data analytics to overcome inefficiency and low throughput problems. First, integrating stacked sparse autoencoder and Elasticsearch indexing explored fast data searching and distributed indexing, which reduces the search scope of the database and dramatically speeds up data searching. Next, exploiting a deep neural network to predict the approximate execution time More >

  • Open Access

    ARTICLE

    Spoofing Face Detection Using Novel Edge-Net Autoencoder for Security

    Amal H. Alharbi1, S. Karthick2, K. Venkatachalam3, Mohamed Abouhawwash4,5, Doaa Sami Khafaga1,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2773-2787, 2023, DOI:10.32604/iasc.2023.030763 - 17 August 2022

    Abstract Recent security applications in mobile technologies and computer systems use face recognition for high-end security. Despite numerous security techniques, face recognition is considered a high-security control. Developers fuse and carry out face identification as an access authority into these applications. Still, face identification authentication is sensitive to attacks with a 2-D photo image or captured video to access the system as an authorized user. In the existing spoofing detection algorithm, there was some loss in the recreation of images. This research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame… More >

  • Open Access

    ARTICLE

    LSTM Based Spectrum Prediction for Real-Time Spectrum Access for IoT Applications

    R. Nandakumar1, Vijayakumar Ponnusamy2,*, Aman Kumar Mishra2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2805-2819, 2023, DOI:10.32604/iasc.2023.028645 - 17 August 2022

    Abstract In the Internet of Things (IoT) scenario, many devices will communicate in the presence of the cellular network; the chances of availability of spectrum will be very scary given the presence of large numbers of mobile users and large amounts of applications. Spectrum prediction is very encouraging for high traffic next-generation wireless networks, where devices/machines which are part of the Cognitive Radio Network (CRN) can predict the spectrum state prior to transmission to save their limited energy by avoiding unnecessarily sensing radio spectrum. Long short-term memory (LSTM) is employed to simultaneously predict the Radio Spectrum More >

  • Open Access

    ARTICLE

    Feature Selection with Optimal Variational Auto Encoder for Financial Crisis Prediction

    Kavitha Muthukumaran*, K. Hariharanath, Vani Haridasan

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 887-901, 2023, DOI:10.32604/csse.2023.030627 - 16 August 2022

    Abstract Financial crisis prediction (FCP) received significant attention in the financial sector for decision-making. Proper forecasting of the number of firms possible to fail is important to determine the growth index and strength of a nation’s economy. Conventionally, numerous approaches have been developed in the design of accurate FCP processes. At the same time, classifier efficacy and predictive accuracy are inadequate for real-time applications. In addition, several established techniques carry out well to any of the specific datasets but are not adjustable to distinct datasets. Thus, there is a necessity for developing an effectual prediction technique… More >

  • Open Access

    ARTICLE

    Hybrid Bacterial Foraging Optimization with Sparse Autoencoder for Energy Systems

    Helen Josephine V L1, Ramchand Vedaiyan2, V. M. Arul Xavier3, Joy Winston J4, A. Jegatheesan5, D. Lakshmi6, Joshua Samuel Raj7,*

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 701-714, 2023, DOI:10.32604/csse.2023.030611 - 16 August 2022

    Abstract The Internet of Things (IoT) technologies has gained significant interest in the design of smart grids (SGs). The increasing amount of distributed generations, maturity of existing grid infrastructures, and demand network transformation have received maximum attention. An essential energy storing model mostly the electrical energy stored methods are developing as the diagnoses for its procedure was becoming further compelling. The dynamic electrical energy stored model using Electric Vehicles (EVs) is comparatively standard because of its excellent electrical property and flexibility however the chance of damage to its battery was there in event of overcharging or… More >

  • Open Access

    ARTICLE

    Early Detection of Heartbeat from Multimodal Data Using RPA Learning with KDNN-SAE

    A. K. S. Saranya1,*, T. Jaya2

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 545-562, 2023, DOI:10.32604/csse.2023.029975 - 16 August 2022

    Abstract Heartbeat detection stays central to cardiovascular an electrocardiogram (ECG) is used to help with disease diagnosis and management. Existing Convolutional Neural Network (CNN)-based methods suffer from the less generalization problem thus; the effectiveness and robustness of the traditional heartbeat detector methods cannot be guaranteed. In contrast, this work proposes a heartbeat detector Krill based Deep Neural Network Stacked Auto Encoders (KDNN-SAE) that computes the disease before the exact heart rate by combining features from multiple ECG Signals. Heartbeats are classified independently and multiple signals are fused to estimate life threatening conditions earlier without any error… More >

  • Open Access

    ARTICLE

    Latent Space Representational Learning of Deep Features for Acute Lymphoblastic Leukemia Diagnosis

    Ghada Emam Atteia*

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 361-376, 2023, DOI:10.32604/csse.2023.029597 - 16 August 2022

    Abstract Acute Lymphoblastic Leukemia (ALL) is a fatal malignancy that is featured by the abnormal increase of immature lymphocytes in blood or bone marrow. Early prognosis of ALL is indispensable for the effectual remediation of this disease. Initial screening of ALL is conducted through manual examination of stained blood smear microscopic images, a process which is time-consuming and prone to errors. Therefore, many deep learning-based computer-aided diagnosis (CAD) systems have been established to automatically diagnose ALL. This paper proposes a novel hybrid deep learning system for ALL diagnosis in blood smear images. The introduced system integrates… More >

  • Open Access

    ARTICLE

    An Efficient Unsupervised Learning Approach for Detecting Anomaly in Cloud

    P. Sherubha1,*, S. P. Sasirekha2, A. Dinesh Kumar Anguraj3, J. Vakula Rani4, Raju Anitha3, S. Phani Praveen5,6, R. Hariharan Krishnan5,6

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 149-166, 2023, DOI:10.32604/csse.2023.024424 - 16 August 2022

    Abstract The Cloud system shows its growing functionalities in various industrial applications. The safety towards data transfer seems to be a threat where Network Intrusion Detection System (NIDS) is measured as an essential element to fulfill security. Recently, Machine Learning (ML) approaches have been used for the construction of intellectual IDS. Most IDS are based on ML techniques either as unsupervised or supervised. In supervised learning, NIDS is based on labeled data where it reduces the efficiency of the reduced model to identify attack patterns. Similarly, the unsupervised model fails to provide a satisfactory outcome. Hence,… More >

Displaying 101-110 on page 11 of 184. Per Page