Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (192)
  • Open Access

    ARTICLE

    Flow Direction Level Traffic Flow Prediction Based on a GCN-LSTM Combined Model

    Fulu Wei1, Xin Li1, Yongqing Guo1,*, Zhenyu Wang2, Qingyin Li1, Xueshi Ma3

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2001-2018, 2023, DOI:10.32604/iasc.2023.035799

    Abstract Traffic flow prediction plays an important role in intelligent transportation systems and is of great significance in the applications of traffic control and urban planning. Due to the complexity of road traffic flow data, traffic flow prediction has been one of the challenging tasks to fully exploit the spatiotemporal characteristics of roads to improve prediction accuracy. In this study, a combined flow direction level traffic flow prediction graph convolutional network (GCN) and long short-term memory (LSTM) model based on spatiotemporal characteristics is proposed. First, a GCN model is employed to capture the topological structure of the data graph and extract… More >

  • Open Access

    ARTICLE

    MEM-TET: Improved Triplet Network for Intrusion Detection System

    Weifei Wang1, Jinguo Li1,*, Na Zhao2, Min Liu1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 471-487, 2023, DOI:10.32604/cmc.2023.039733

    Abstract With the advancement of network communication technology, network traffic shows explosive growth. Consequently, network attacks occur frequently. Network intrusion detection systems are still the primary means of detecting attacks. However, two challenges continue to stymie the development of a viable network intrusion detection system: imbalanced training data and new undiscovered attacks. Therefore, this study proposes a unique deep learning-based intrusion detection method. We use two independent in-memory autoencoders trained on regular network traffic and attacks to capture the dynamic relationship between traffic features in the presence of unbalanced training data. Then the original data is fed into the triplet network… More >

  • Open Access

    ARTICLE

    Characterization of Memory Access in Deep Learning and Its Implications in Memory Management

    Jeongha Lee1, Hyokyung Bahn2,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 607-629, 2023, DOI:10.32604/cmc.2023.039236

    Abstract Due to the recent trend of software intelligence in the Fourth Industrial Revolution, deep learning has become a mainstream workload for modern computer systems. Since the data size of deep learning increasingly grows, managing the limited memory capacity efficiently for deep learning workloads becomes important. In this paper, we analyze memory accesses in deep learning workloads and find out some unique characteristics differentiated from traditional workloads. First, when comparing instruction and data accesses, data access accounts for 96%–99% of total memory accesses in deep learning workloads, which is quite different from traditional workloads. Second, when comparing read and write accesses,… More >

  • Open Access

    ARTICLE

    Unsupervised Anomaly Detection Approach Based on Adversarial Memory Autoencoders for Multivariate Time Series

    Tianzi Zhao1,2,3,4, Liang Jin1,2,3,*, Xiaofeng Zhou1,2,3, Shuai Li1,2,3, Shurui Liu1,2,3,4, Jiang Zhu1,2,3

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 329-346, 2023, DOI:10.32604/cmc.2023.038595

    Abstract The widespread usage of Cyber Physical Systems (CPSs) generates a vast volume of time series data, and precisely determining anomalies in the data is critical for practical production. Autoencoder is the mainstream method for time series anomaly detection, and the anomaly is judged by reconstruction error. However, due to the strong generalization ability of neural networks, some abnormal samples close to normal samples may be judged as normal, which fails to detect the abnormality. In addition, the dataset rarely provides sufficient anomaly labels. This research proposes an unsupervised anomaly detection approach based on adversarial memory autoencoders for multivariate time series… More >

  • Open Access

    ARTICLE

    Analyzing Arabic Twitter-Based Patient Experience Sentiments Using Multi-Dialect Arabic Bidirectional Encoder Representations from Transformers

    Sarab AlMuhaideb*, Yasmeen AlNegheimish, Taif AlOmar, Reem AlSabti, Maha AlKathery, Ghala AlOlyyan

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 195-220, 2023, DOI:10.32604/cmc.2023.038368

    Abstract Healthcare organizations rely on patients’ feedback and experiences to evaluate their performance and services, thereby allowing such organizations to improve inadequate services and address any shortcomings. According to the literature, social networks and particularly Twitter are effective platforms for gathering public opinions. Moreover, recent studies have used natural language processing to measure sentiments in text segments collected from Twitter to capture public opinions about various sectors, including healthcare. The present study aimed to analyze Arabic Twitter-based patient experience sentiments and to introduce an Arabic patient experience corpus. The authors collected 12,400 tweets from Arabic patients discussing patient experiences related to… More >

  • Open Access

    ARTICLE

    An Efficient Memory Management for Mobile Operating Systems Based on Prediction of Relaunch Distance

    Jaehwan Lee1, Sangoh Park2,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 171-186, 2023, DOI:10.32604/csse.2023.038139

    Abstract Recently, various mobile apps have included more features to improve user convenience. Mobile operating systems load as many apps into memory for faster app launching and execution. The least recently used (LRU)-based termination of cached apps is a widely adopted approach when free space of the main memory is running low. However, the LRU-based cached app termination does not distinguish between frequently or infrequently used apps. The app launch performance degrades if LRU terminates frequently used apps. Recent studies have suggested the potential of using users’ app usage patterns to predict the next app launch and address the limitations of… More >

  • Open Access

    ARTICLE

    Clinical implication of naive and memory T cells in locally advanced cervical cancer: A proxy for tumor biology and short-term response prediction

    YUTING WANG1,2,3, PEIWEN FAN1,2,3, YANING FENG1,2,3, XUAN YAO4, YANCHUN PENG4, RUOZHENG WANG1,2,3,*

    BIOCELL, Vol.47, No.6, pp. 1365-1375, 2023, DOI:10.32604/biocell.2023.027201

    Abstract Background: This study was designed to investigate the feasibility of tumor-infiltrating immune cells with different phenotypic characteristics for predicting short-term clinical responses in patients with locally advanced cervical cancer (LACC). Methods: Thirty-four patients who received concurrent chemoradiotherapy and twenty-one patients who merely underwent radiotherapy were enrolled in this study. We retrospectively analyzed the T cell markers (i.e., CD3, CD4, CD8), memory markers (i.e., CD45, CCR7), and differentiation markers (i.e., CD27) in the peripheral blood and tumor tissues of patients with LACC before treatment based on flow cytometry. We also analyzed the relationship of T cell subsets between peripheral blood and… More >

  • Open Access

    ARTICLE

    Real-Time Memory Data Optimization Mechanism of Edge IoT Agent

    Shen Guo*, Wanxing Sheng, Shuaitao Bai, Jichuan Zhang, Peng Wang

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 799-814, 2023, DOI:10.32604/iasc.2023.038330

    Abstract With the full development of disk-resident databases (DRDB) in recent years, it is widely used in business and transactional applications. In long-term use, some problems of disk databases are gradually exposed. For applications with high real-time requirements, the performance of using disk database is not satisfactory. In the context of the booming development of the Internet of things, domestic real-time databases have also gradually developed. Still, most of them only support the storage, processing, and analysis of data values with fewer data types, which can not fully meet the current industrial process control system data types, complex sources, fast update… More >

  • Open Access

    ARTICLE

    Bi-LSTM-Based Deep Stacked Sequence-to-Sequence Autoencoder for Forecasting Solar Irradiation and Wind Speed

    Neelam Mughees1,2, Mujtaba Hussain Jaffery1, Abdullah Mughees3, Anam Mughees4, Krzysztof Ejsmont5,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6375-6393, 2023, DOI:10.32604/cmc.2023.038564

    Abstract Wind and solar energy are two popular forms of renewable energy used in microgrids and facilitating the transition towards net-zero carbon emissions by 2050. However, they are exceedingly unpredictable since they rely highly on weather and atmospheric conditions. In microgrids, smart energy management systems, such as integrated demand response programs, are permanently established on a step-ahead basis, which means that accurate forecasting of wind speed and solar irradiance intervals is becoming increasingly crucial to the optimal operation and planning of microgrids. With this in mind, a novel “bidirectional long short-term memory network” (Bi-LSTM)-based, deep stacked, sequence-to-sequence autoencoder (S2SAE) forecasting model… More >

  • Open Access

    ARTICLE

    Memory-Occupied Routing Algorithms for Quantum Relay Networks

    Jiangyuan Yao1, Kaiwen Zou2, Zheng Jiang2, Shuhua Weng1, Deshun Li1,*, Yahui Li3, Xingcan Cao4

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5929-5946, 2023, DOI:10.32604/cmc.2023.031284

    Abstract Quantum transmission experiments have shown that the successful transmission rate of entangled quanta in optical fibers decreases exponentially. Although current quantum networks deploy quantum relays to establish long-distance connections, the increase in transmission distance and entanglement switching costs still need to be considered when selecting the next hop. However, most of the existing quantum network models prefer to consider the parameters of the physical layer, which ignore the influence factors of the network layer. In this paper, we propose a meshy quantum network model based on quantum teleportation, which considers both network layer and physical layer parameters. The proposed model… More >

Displaying 31-40 on page 4 of 192. Per Page