Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (210)
  • Open Access

    ARTICLE

    MSCNN-LSTM Model for Predicting Return Loss of the UHF Antenna in HF-UHF RFID Tag Antenna

    Zhao Yang1, Yuan Zhang1, Lei Zhu2,*, Lei Huang1, Fangyu Hu3, Yanping Du1, Xiaowei Li1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2889-2904, 2023, DOI:10.32604/cmc.2023.037297

    Abstract High-frequency (HF) and ultrahigh-frequency (UHF) dual-band radio frequency identification (RFID) tags with both near-field and far-field communication can meet different application scenarios. However, it is time-consuming to calculate the return loss of a UHF antenna in a dual-band tag antenna using electromagnetic (EM) simulators. To overcome this, the present work proposes a model of a multi-scale convolutional neural network stacked with long and short-term memory (MSCNN-LSTM) for predicting the return loss of UHF antennas instead of EM simulators. In the proposed MSCNN-LSTM, the MSCNN has three branches, which include three convolution layers with different kernel sizes and numbers. Therefore, MSCNN… More >

  • Open Access

    ARTICLE

    A Network Traffic Prediction Algorithm Based on Prophet-EALSTM-GPR

    Guoqing Xu1, Changsen Xia1, Jun Qian1, Guo Ran3, Zilong Jin1,2,*

    Journal on Internet of Things, Vol.4, No.2, pp. 113-125, 2022, DOI:10.32604/jiot.2022.036066

    Abstract Huge networks and increasing network traffic will consume more and more resources. It is critical to predict network traffic accurately and timely for network planning, and resource allocation, etc. In this paper, a combined network traffic prediction model is proposed, which is based on Prophet, evolutionary attention-based LSTM (EALSTM) network, and Gaussian process regression (GPR). According to the non-smooth, sudden, periodic, and long correlation characteristics of network traffic, the prediction procedure is divided into three steps to predict network traffic accurately. In the first step, the Prophet model decomposes network traffic data into periodic and non-periodic parts. The periodic term… More >

  • Open Access

    ARTICLE

    A Hybrid Deep Learning Approach for PM2.5 Concentration Prediction in Smart Environmental Monitoring

    Minh Thanh Vo1, Anh H. Vo2, Huong Bui3, Tuong Le4,5,*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3029-3041, 2023, DOI:10.32604/iasc.2023.034636

    Abstract Nowadays, air pollution is a big environmental problem in developing countries. In this problem, particulate matter 2.5 (PM2.5) in the air is an air pollutant. When its concentration in the air is high in developing countries like Vietnam, it will harm everyone’s health. Accurate prediction of PM2.5 concentrations can help to make the correct decision in protecting the health of the citizen. This study develops a hybrid deep learning approach named PM25-CBL model for PM2.5 concentration prediction in Ho Chi Minh City, Vietnam. Firstly, this study analyzes the effects of variables on PM2.5 concentrations in Air Quality HCMC dataset. Only… More >

  • Open Access

    ARTICLE

    Enhanced Deep Learning for Detecting Suspicious Fall Event in Video Data

    Madhuri Agrawal*, Shikha Agrawal

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2653-2667, 2023, DOI:10.32604/iasc.2023.033493

    Abstract

    Suspicious fall events are particularly significant hazards for the safety of patients and elders. Recently, suspicious fall event detection has become a robust research case in real-time monitoring. This paper aims to detect suspicious fall events during video monitoring of multiple people in different moving backgrounds in an indoor environment; it is further proposed to use a deep learning method known as Long Short Term Memory (LSTM) by introducing visual attention-guided mechanism along with a bi-directional LSTM model. This method contributes essential information on the temporal and spatial locations of ‘suspicious fall’ events in learning the video frame in both… More >

  • Open Access

    ARTICLE

    A Feature Learning-Based Model for Analyzing Students’ Performance in Supportive Learning

    P. Prabhu1, P. Valarmathie2,*, K. Dinakaran3

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2989-3005, 2023, DOI:10.32604/iasc.2023.028659

    Abstract Supportive learning plays a substantial role in providing a quality education system. The evaluation of students’ performance impacts their deeper insight into the subject knowledge. Specifically, it is essential to maintain the baseline foundation for building a broader understanding of their careers. This research concentrates on establishing the students’ knowledge relationship even in reduced samples. Here, Synthetic Minority Oversampling TEchnique (SMOTE) technique is used for pre-processing the missing value in the provided input dataset to enhance the prediction accuracy. When the initial processing is not done substantially, it leads to misleading prediction accuracy. This research concentrates on modelling an efficient… More >

  • Open Access

    ARTICLE

    Using Recurrent Neural Network Structure and Multi-Head Attention with Convolution for Fraudulent Phone Text Recognition

    Junjie Zhou, Hongkui Xu*, Zifeng Zhang, Jiangkun Lu, Wentao Guo, Zhenye Li

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2277-2297, 2023, DOI:10.32604/csse.2023.036419

    Abstract Fraud cases have been a risk in society and people’s property security has been greatly threatened. In recent studies, many promising algorithms have been developed for social media offensive text recognition as well as sentiment analysis. These algorithms are also suitable for fraudulent phone text recognition. Compared to these tasks, the semantics of fraudulent words are more complex and more difficult to distinguish. Recurrent Neural Networks (RNN), the variants of RNN, Convolutional Neural Networks (CNN), and hybrid neural networks to extract text features are used by most text classification research. However, a single network or a simple network combination cannot… More >

  • Open Access

    ARTICLE

    Advance IoT Intelligent Healthcare System for Lung Disease Classification Using Ensemble Techniques

    J. Prabakaran1,*, P. Selvaraj2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2141-2157, 2023, DOI:10.32604/csse.2023.034210

    Abstract In healthcare systems, the Internet of Things (IoT) innovation and development approached new ways to evaluate patient data. A cloud-based platform tends to process data generated by IoT medical devices instead of high storage, and computational hardware. In this paper, an intelligent healthcare system has been proposed for the prediction and severity analysis of lung disease from chest computer tomography (CT) images of patients with pneumonia, Covid-19, tuberculosis (TB), and cancer. Firstly, the CT images are captured and transmitted to the fog node through IoT devices. In the fog node, the image gets modified into a convenient and efficient format… More >

  • Open Access

    ARTICLE

    An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection

    Deris Stiawan1, Ali Bardadi1, Nurul Afifah1, Lisa Melinda1, Ahmad Heryanto1, Tri Wanda Septian1, Mohd Yazid Idris2, Imam Much Ibnu Subroto3, Lukman4, Rahmat Budiarto5,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1759-1774, 2023, DOI:10.32604/csse.2023.034047

    Abstract The Repository Mahasiswa (RAMA) is a national repository of research reports in the form of final assignments, student projects, theses, dissertations, and research reports of lecturers or researchers that have not yet been published in journals, conferences, or integrated books from the scientific repository of universities and research institutes in Indonesia. The increasing popularity of the RAMA Repository leads to security issues, including the two most widespread, vulnerable attacks i.e., Structured Query Language (SQL) injection and cross-site scripting (XSS) attacks. An attacker gaining access to data and performing unauthorized data modifications is extremely dangerous. This paper aims to provide an… More >

  • Open Access

    ARTICLE

    Continuous Mobile User Authentication Using a Hybrid CNN-Bi-LSTM Approach

    Sarah Alzahrani1, Joud Alderaan1, Dalya Alatawi1, Bandar Alotaibi1,2,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 651-667, 2023, DOI:10.32604/cmc.2023.035173

    Abstract Internet of Things (IoT) devices incorporate a large amount of data in several fields, including those of medicine, business, and engineering. User authentication is paramount in the IoT era to assure connected devices’ security. However, traditional authentication methods and conventional biometrics-based authentication approaches such as face recognition, fingerprints, and password are vulnerable to various attacks, including smudge attacks, heat attacks, and shoulder surfing attacks. Behavioral biometrics is introduced by the powerful sensing capabilities of IoT devices such as smart wearables and smartphones, enabling continuous authentication. Artificial Intelligence (AI)-based approaches introduce a bright future in refining large amounts of homogeneous biometric… More >

  • Open Access

    ARTICLE

    Metaheuristic Optimization of Time Series Models for Predicting Networks Traffic

    Reem Alkanhel1, El-Sayed M. El-kenawy2,3, D. L. Elsheweikh4, Abdelaziz A. Abdelhamid5,6, Abdelhameed Ibrahim7, Doaa Sami Khafaga8,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 427-442, 2023, DOI:10.32604/cmc.2023.032885

    Abstract Traffic prediction of wireless networks attracted many researchers and practitioners during the past decades. However, wireless traffic frequently exhibits strong nonlinearities and complicated patterns, which makes it challenging to be predicted accurately. Many of the existing approaches for predicting wireless network traffic are unable to produce accurate predictions because they lack the ability to describe the dynamic spatial-temporal correlations of wireless network traffic data. In this paper, we proposed a novel meta-heuristic optimization approach based on fitness grey wolf and dipper throated optimization algorithms for boosting the prediction accuracy of traffic volume. The proposed algorithm is employed to optimize the… More >

Displaying 61-70 on page 7 of 210. Per Page