Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (138)
  • Open Access

    ARTICLE

    Identification of Anomaly Scenes in Videos Using Graph Neural Networks

    Khalid Masood1, Mahmoud M. Al-Sakhnini2,3, Waqas Nawaz4,*, Tauqeer Faiz5,6, Abdul Salam Mohammad7, Hamza Kashif8

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5417-5430, 2023, DOI:10.32604/cmc.2023.033590

    Abstract Generally, conventional methods for anomaly detection rely on clustering, proximity, or classification. With the massive growth in surveillance videos, outliers or anomalies find ingenious ways to obscure themselves in the network and make conventional techniques inefficient. This research explores the structure of Graph neural networks (GNNs) that generalize deep learning frameworks to graph-structured data. Every node in the graph structure is labeled and anomalies, represented by unlabeled nodes, are predicted by performing random walks on the node-based graph structures. Due to their strong learning abilities, GNNs gained popularity in various domains such as natural language processing, social network analytics and… More >

  • Open Access

    ARTICLE

    A New Intrusion Detection Algorithm AE-3WD for Industrial Control Network

    Yongzhong Li1,2,*, Cong Li1, Yuheng Li3, Shipeng Zhang2

    Journal of New Media, Vol.4, No.4, pp. 205-217, 2022, DOI:10.32604/jnm.2022.034778

    Abstract In this paper, we propose a intrusion detection algorithm based on auto-encoder and three-way decisions (AE-3WD) for industrial control networks, aiming at the security problem of industrial control network. The ideology of deep learning is similar to the idea of intrusion detection. Deep learning is a kind of intelligent algorithm and has the ability of automatically learning. It uses self-learning to enhance the experience and dynamic classification capabilities. We use deep learning to improve the intrusion detection rate and reduce the false alarm rate through learning, a denoising AutoEncoder and three-way decisions intrusion detection method AE-3WD is proposed to improve… More >

  • Open Access

    ARTICLE

    An End-to-End Transformer-Based Automatic Speech Recognition for Qur’an Reciters

    Mohammed Hadwan1,2,*, Hamzah A. Alsayadi3,4, Salah AL-Hagree5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3471-3487, 2023, DOI:10.32604/cmc.2023.033457

    Abstract The attention-based encoder-decoder technique, known as the trans-former, is used to enhance the performance of end-to-end automatic speech recognition (ASR). This research focuses on applying ASR end-to-end transformer-based models for the Arabic language, as the researchers’ community pays little attention to it. The Muslims Holy Qur’an book is written using Arabic diacritized text. In this paper, an end-to-end transformer model to building a robust Qur’an vs. recognition is proposed. The acoustic model was built using the transformer-based model as deep learning by the PyTorch framework. A multi-head attention mechanism is utilized to represent the encoder and decoder in the acoustic… More >

  • Open Access

    ARTICLE

    Deep Learning Based Face Detection and Identification of Criminal Suspects

    S. Sandhya1, A. Balasundaram2,*, Ayesha Shaik1

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2331-2343, 2023, DOI:10.32604/cmc.2023.032715

    Abstract Occurrence of crimes has been on the constant rise despite the emerging discoveries and advancements in the technological field in the past decade. One of the most tedious tasks is to track a suspect once a crime is committed. As most of the crimes are committed by individuals who have a history of felonies, it is essential for a monitoring system that does not just detect the person’s face who has committed the crime, but also their identity. Hence, a smart criminal detection and identification system that makes use of the OpenCV Deep Neural Network (DNN) model which employs a… More >

  • Open Access

    ARTICLE

    A Dual Attention Encoder-Decoder Text Summarization Model

    Nada Ali Hakami1, Hanan Ahmed Hosni Mahmoud2,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3697-3710, 2023, DOI:10.32604/cmc.2023.031525

    Abstract A worthy text summarization should represent the fundamental content of the document. Recent studies on computerized text summarization tried to present solutions to this challenging problem. Attention models are employed extensively in text summarization process. Classical attention techniques are utilized to acquire the context data in the decoding phase. Nevertheless, without real and efficient feature extraction, the produced summary may diverge from the core topic. In this article, we present an encoder-decoder attention system employing dual attention mechanism. In the dual attention mechanism, the attention algorithm gathers main data from the encoder side. In the dual attention model, the system… More >

  • Open Access

    ARTICLE

    ALBERT with Knowledge Graph Encoder Utilizing Semantic Similarity for Commonsense Question Answering

    Byeongmin Choi1, YongHyun Lee1, Yeunwoong Kyung2, Eunchan Kim3,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 71-82, 2023, DOI:10.32604/iasc.2023.032783

    Abstract Recently, pre-trained language representation models such as bidirectional encoder representations from transformers (BERT) have been performing well in commonsense question answering (CSQA). However, there is a problem that the models do not directly use explicit information of knowledge sources existing outside. To augment this, additional methods such as knowledge-aware graph network (KagNet) and multi-hop graph relation network (MHGRN) have been proposed. In this study, we propose to use the latest pre-trained language model a lite bidirectional encoder representations from transformers (ALBERT) with knowledge graph information extraction technique. We also propose to applying the novel method, schema graph expansion to recent… More >

  • Open Access

    ARTICLE

    Fault Diagnosis of Wind Turbine Generator with Stacked Noise Reduction Autoencoder Based on Group Normalization

    Sihua Wang1,2, Wenhui Zhang1,2,*, Gaofei Zheng1,2, Xujie Li1,2, Yougeng Zhao1,2

    Energy Engineering, Vol.119, No.6, pp. 2431-2445, 2022, DOI:10.32604/ee.2022.020779

    Abstract In order to improve the condition monitoring and fault diagnosis of wind turbines, a stacked noise reduction autoencoding network based on group normalization is proposed in this paper. The network is based on SCADA data of wind turbine operation, firstly, the group normalization (GN) algorithm is added to solve the problems of stack noise reduction autoencoding network training and slow convergence speed, and the RMSProp algorithm is used to update the weight and the bias of the autoenccoder, which further optimizes the problem that the loss function swings too much during the update process. Finally, in the last layer of… More >

  • Open Access

    ARTICLE

    An Efficient Encryption and Compression of Sensed IoT Medical Images Using Auto-Encoder

    Passent El-kafrawy1,2, Maie Aboghazalah2,*, Abdelmoty M. Ahmed3, Hanaa Torkey4, Ayman El-Sayed4

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 909-926, 2023, DOI:10.32604/cmes.2022.021713

    Abstract Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common practice. Encryption of medical images is very important to secure patient information. Encrypting these images consumes a lot of time on edge computing; therefore, the use of an auto-encoder for compression before encoding will solve such a problem. In this paper, we use an auto-encoder to compress a medical image before encryption, and an encryption output (vector) is sent out over the network. On the other hand, a decoder was used to reproduce the original image back after the vector was received and decrypted.… More >

  • Open Access

    ARTICLE

    Optimizing Big Data Retrieval and Job Scheduling Using Deep Learning Approaches

    Bao Rong Chang1, Hsiu-Fen Tsai2,*, Yu-Chieh Lin1

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 783-815, 2023, DOI:10.32604/cmes.2022.020128

    Abstract Big data analytics in business intelligence do not provide effective data retrieval methods and job scheduling that will cause execution inefficiency and low system throughput. This paper aims to enhance the capability of data retrieval and job scheduling to speed up the operation of big data analytics to overcome inefficiency and low throughput problems. First, integrating stacked sparse autoencoder and Elasticsearch indexing explored fast data searching and distributed indexing, which reduces the search scope of the database and dramatically speeds up data searching. Next, exploiting a deep neural network to predict the approximate execution time of a job gives prioritized… More >

  • Open Access

    ARTICLE

    Spoofing Face Detection Using Novel Edge-Net Autoencoder for Security

    Amal H. Alharbi1, S. Karthick2, K. Venkatachalam3, Mohamed Abouhawwash4,5, Doaa Sami Khafaga1,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2773-2787, 2023, DOI:10.32604/iasc.2023.030763

    Abstract Recent security applications in mobile technologies and computer systems use face recognition for high-end security. Despite numerous security techniques, face recognition is considered a high-security control. Developers fuse and carry out face identification as an access authority into these applications. Still, face identification authentication is sensitive to attacks with a 2-D photo image or captured video to access the system as an authorized user. In the existing spoofing detection algorithm, there was some loss in the recreation of images. This research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame of the sequenced set of… More >

Displaying 51-60 on page 6 of 138. Per Page