Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (945)
  • Open Access

    ARTICLE

    Chinese Q&A Community Medical Entity Recognition with Character-Level Features and Self-Attention Mechanism

    Pu Han1,2, Mingtao Zhang1, Jin Shi3, Jinming Yang4, Xiaoyan Li5,*

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 55-72, 2021, DOI:10.32604/iasc.2021.017021

    Abstract With the rapid development of Internet, the medical Q&A community has become an important channel for people to obtain and share medical and health knowledge. Online medical entity recognition (OMER), as the foundation of medical and health information extraction, has attracted extensive attention of researchers in recent years. In order to further improve the research progress of Chinese OMER, LSTM-Att-Med model is proposed in this paper to capture more external semantic features and important information. First, Word2vec is used to generate the character-level vectors with semantic features on the basis of the unlabeled corpus in the medical domain and open… More >

  • Open Access

    ARTICLE

    Development of a Multi-feature Web-based Physiotherapy Service System

    Sadman Ahmed1, Mohammad Monirujjaman Khan1,*, Roobaea Alroobaea2, Mehedi Masud2

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 43-54, 2021, DOI:10.32604/iasc.2021.015914

    Abstract Physiotherapy is important to people with arthritis, and physiotherapists help them to resume or continue active, independent lives at home and work. Physiotherapy addresses many pain categories; however, this important treatment is still overlooked in Bangladesh, where many people suffer from physical pain. This study presents a multi-feature web-based physiotherapy application. A user can register as a doctor or patient via email or phone using the web application. A therapist’s information is verified manually by a system administrator. Using the application, patients can select a variety of features for treatment. Patients can watch physiotherapy video tutorials, find a physiotherapy clinic… More >

  • Open Access

    ARTICLE

    Superposition of Functional Contours Based Prosodic Feature Extraction for Speech Processing

    Shahid Ali Mahar1, Mumtaz Hussain Mahar1, Javed Ahmed Mahar1, Mehedi Masud2, Muneer Ahmad3, NZ Jhanjhi4,*, Mirza Abdur Razzaq1

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 183-197, 2021, DOI:10.32604/iasc.2021.015755

    Abstract Speech signal analysis for the extraction of speech elements is viable in natural language applications. Rhythm, intonation, stress, and tone are the elements of prosody. These features are essential in emotional speech, speech to speech, speech recognition, and other applications. The current study attempts to extract the pitch and duration from historical Sindhi sound clips using the functional contours model’s superposition. The sampled sound clips contained the speech of 273 undergraduates living in 5 districts of the Sindhi province. Several Python libraries are available for the application of this model. We used these libraries for the extraction of prosodic data… More >

  • Open Access

    ARTICLE

    Arabic Feature-Based Text Watermarking Technique for Sensitive Detecting Tampering Attack

    Fahd N. Al-Wesabi1,2,*, Huda G. Iskandar2,3, Saleh Alzahrani4, Abdelzahir Abdelmaboud4, Mohammed Abdul4, Nadhem Nemri4, Mohammad Medani4, Mohammed Y. Alghamdi5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3789-3806, 2021, DOI:10.32604/cmc.2021.017674

    Abstract In this article, a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet (HFDATAI) is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing. The HFDATAI solution technically integrates and senses the watermark without modifying the original text. The alphanumeric mechanism order in the first stage focused on the Markov model key secret is incorporated into an automated, null-watermarking approach to enhance the proposed approach’s efficiency, accuracy, and intensity. The first-level order and alphanumeric Markov model technique have been used as a strategy for soft computing to analyze the text of… More >

  • Open Access

    ARTICLE

    Enhanced Deep Autoencoder Based Feature Representation Learning for Intelligent Intrusion Detection System

    Thavavel Vaiyapuri*, Adel Binbusayyis

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3271-3288, 2021, DOI:10.32604/cmc.2021.017665

    Abstract In the era of Big data, learning discriminant feature representation from network traffic is identified has as an invariably essential task for improving the detection ability of an intrusion detection system (IDS). Owing to the lack of accurately labeled network traffic data, many unsupervised feature representation learning models have been proposed with state-of-the-art performance. Yet, these models fail to consider the classification error while learning the feature representation. Intuitively, the learnt feature representation may degrade the performance of the classification task. For the first time in the field of intrusion detection, this paper proposes an unsupervised IDS model leveraging the… More >

  • Open Access

    ARTICLE

    A Secure Rotation Invariant LBP Feature Computation in Cloud Environment

    Shiqi Wang1, Mingfang Jiang2,*, Jiaohua Qin1, Hengfu Yang2, Zhichen Gao3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2979-2993, 2021, DOI:10.32604/cmc.2021.017094

    Abstract In the era of big data, outsourcing massive data to a remote cloud server is a promising approach. Outsourcing storage and computation services can reduce storage costs and computational burdens. However, public cloud storage brings about new privacy and security concerns since the cloud servers can be shared by multiple users. Privacy-preserving feature extraction techniques are an effective solution to this issue. Because the Rotation Invariant Local Binary Pattern (RILBP) has been widely used in various image processing fields, we propose a new privacy-preserving outsourcing computation of RILBP over encrypted images in this paper (called PPRILBP). To protect image content,… More >

  • Open Access

    ARTICLE

    Video Analytics Framework for Human Action Recognition

    Muhammad Attique Khan1, Majed Alhaisoni2, Ammar Armghan3, Fayadh Alenezi3, Usman Tariq4, Yunyoung Nam5,*, Tallha Akram6

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3841-3859, 2021, DOI:10.32604/cmc.2021.016864

    Abstract Human action recognition (HAR) is an essential but challenging task for observing human movements. This problem encompasses the observations of variations in human movement and activity identification by machine learning algorithms. This article addresses the challenges in activity recognition by implementing and experimenting an intelligent segmentation, features reduction and selection framework. A novel approach has been introduced for the fusion of segmented frames and multi-level features of interests are extracted. An entropy-skewness based features reduction technique has been implemented and the reduced features are converted into a codebook by serial based fusion. A custom made genetic algorithm is implemented on… More >

  • Open Access

    ARTICLE

    Race Classification Using Deep Learning

    Khalil Khan1, Rehan Ullah Khan2, Jehad Ali3, Irfan Uddin4, Sahib Khan5, Byeong-hee Roh3,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3483-3498, 2021, DOI:10.32604/cmc.2021.016535

    Abstract Race classification is a long-standing challenge in the field of face image analysis. The investigation of salient facial features is an important task to avoid processing all face parts. Face segmentation strongly benefits several face analysis tasks, including ethnicity and race classification. We propose a race-classification algorithm using a prior face segmentation framework. A deep convolutional neural network (DCNN) was used to construct a face segmentation model. For training the DCNN, we label face images according to seven different classes, that is, nose, skin, hair, eyes, brows, back, and mouth. The DCNN model developed in the first phase was used… More >

  • Open Access

    ARTICLE

    Hybrid Trainable System for Writer Identification of Arabic Handwriting

    Saleem Ibraheem Saleem*, Adnan Mohsin Abdulazeez

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3353-3372, 2021, DOI:10.32604/cmc.2021.016342

    Abstract Writer identification (WI) based on handwritten text structures is typically focused on digital characteristics, with letters/strokes representing the information acquired from the current research in the integration of individual writing habits/styles. Previous studies have indicated that a word’s attributes contribute to greater recognition than the attributes of a character or stroke. As a result of the complexity of Arabic handwriting, segmenting and separating letters and strokes from a script poses a challenge in addition to WI schemes. In this work, we propose new texture features for WI based on text. The histogram of oriented gradient (HOG) features are modified to… More >

  • Open Access

    ARTICLE

    A Novel Deep Neural Network for Intracranial Haemorrhage Detection and Classification

    D. Venugopal1, T. Jayasankar2, Mohamed Yacin Sikkandar3, Mohamed Ibrahim Waly3, Irina V. Pustokhina4, Denis A. Pustokhin5, K. Shankar6,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2877-2893, 2021, DOI:10.32604/cmc.2021.015480

    Abstract Data fusion is one of the challenging issues, the healthcare sector is facing in the recent years. Proper diagnosis from digital imagery and treatment are deemed to be the right solution. Intracerebral Haemorrhage (ICH), a condition characterized by injury of blood vessels in brain tissues, is one of the important reasons for stroke. Images generated by X-rays and Computed Tomography (CT) are widely used for estimating the size and location of hemorrhages. Radiologists use manual planimetry, a time-consuming process for segmenting CT scan images. Deep Learning (DL) is the most preferred method to increase the efficiency of diagnosing ICH. In… More >

Displaying 721-730 on page 73 of 945. Per Page