Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (57)
  • Open Access

    ARTICLE

    Using Recurrent Neural Network Structure and Multi-Head Attention with Convolution for Fraudulent Phone Text Recognition

    Junjie Zhou, Hongkui Xu*, Zifeng Zhang, Jiangkun Lu, Wentao Guo, Zhenye Li

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2277-2297, 2023, DOI:10.32604/csse.2023.036419

    Abstract Fraud cases have been a risk in society and people’s property security has been greatly threatened. In recent studies, many promising algorithms have been developed for social media offensive text recognition as well as sentiment analysis. These algorithms are also suitable for fraudulent phone text recognition. Compared to these tasks, the semantics of fraudulent words are more complex and more difficult to distinguish. Recurrent Neural Networks (RNN), the variants of RNN, Convolutional Neural Networks (CNN), and hybrid neural networks to extract text features are used by most text classification research. However, a single network or a simple network combination cannot… More >

  • Open Access

    ARTICLE

    Continuous Mobile User Authentication Using a Hybrid CNN-Bi-LSTM Approach

    Sarah Alzahrani1, Joud Alderaan1, Dalya Alatawi1, Bandar Alotaibi1,2,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 651-667, 2023, DOI:10.32604/cmc.2023.035173

    Abstract Internet of Things (IoT) devices incorporate a large amount of data in several fields, including those of medicine, business, and engineering. User authentication is paramount in the IoT era to assure connected devices’ security. However, traditional authentication methods and conventional biometrics-based authentication approaches such as face recognition, fingerprints, and password are vulnerable to various attacks, including smudge attacks, heat attacks, and shoulder surfing attacks. Behavioral biometrics is introduced by the powerful sensing capabilities of IoT devices such as smart wearables and smartphones, enabling continuous authentication. Artificial Intelligence (AI)-based approaches introduce a bright future in refining large amounts of homogeneous biometric… More >

  • Open Access

    ARTICLE

    DERNNet: Dual Encoding Recurrent Neural Network Based Secure Optimal Routing in WSN

    A. Venkatesh1, S. Asha2,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1375-1392, 2023, DOI:10.32604/csse.2023.030944

    Abstract A Wireless Sensor Network (WSN) is constructed with numerous sensors over geographical regions. The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy. As sensor nodes are resource constrained in nature, novel techniques are essential to improve lifetime of nodes in WSN. Nodes energy is considered as an important resource for sensor node which are battery powered based. In WSN, energy is consumed mainly while data is being transferred among nodes in the network. Several research works are carried out focusing on preserving energy of nodes in the network and made network… More >

  • Open Access

    ARTICLE

    An End-to-End Transformer-Based Automatic Speech Recognition for Qur’an Reciters

    Mohammed Hadwan1,2,*, Hamzah A. Alsayadi3,4, Salah AL-Hagree5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3471-3487, 2023, DOI:10.32604/cmc.2023.033457

    Abstract The attention-based encoder-decoder technique, known as the trans-former, is used to enhance the performance of end-to-end automatic speech recognition (ASR). This research focuses on applying ASR end-to-end transformer-based models for the Arabic language, as the researchers’ community pays little attention to it. The Muslims Holy Qur’an book is written using Arabic diacritized text. In this paper, an end-to-end transformer model to building a robust Qur’an vs. recognition is proposed. The acoustic model was built using the transformer-based model as deep learning by the PyTorch framework. A multi-head attention mechanism is utilized to represent the encoder and decoder in the acoustic… More >

  • Open Access

    ARTICLE

    Stacking Ensemble Learning-Based Convolutional Gated Recurrent Neural Network for Diabetes Miletus

    G. Geetha1,2,*, K. Mohana Prasad1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 703-718, 2023, DOI:10.32604/iasc.2023.032530

    Abstract Diabetes mellitus is a metabolic disease in which blood glucose levels rise as a result of pancreatic insulin production failure. It causes hyperglycemia and chronic multiorgan dysfunction, including blindness, renal failure, and cardiovascular disease, if left untreated. One of the essential checks that are needed to be performed frequently in Type 1 Diabetes Mellitus is a blood test, this procedure involves extracting blood quite frequently, which leads to subject discomfort increasing the possibility of infection when the procedure is often recurring. Existing methods used for diabetes classification have less classification accuracy and suffer from vanishing gradient problems, to overcome these… More >

  • Open Access

    ARTICLE

    Optimal Energy Forecasting Using Hybrid Recurrent Neural Networks

    Elumalaivasan Poongavanam1,*, Padmanathan Kasinathan2, Kulothungan Kanagasabai3

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 249-265, 2023, DOI:10.32604/iasc.2023.030101

    Abstract The nation deserves to learn what India’s future energy demand will be in order to plan and implement an energy policy. This energy demand will have to be fulfilled by an adequate mix of existing energy sources, considering the constraints imposed by future economic and social changes in the direction of a more sustainable world. Forecasting energy demand, on the other hand, is a tricky task because it is influenced by numerous micro-variables. As a result, an macro model with only a few factors that may be predicted globally, rather than a detailed analysis for each of these variables, is… More >

  • Open Access

    ARTICLE

    Q-Learning-Based Pesticide Contamination Prediction in Vegetables and Fruits

    Kandasamy Sellamuthu*, Vishnu Kumar Kaliappan

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 715-736, 2023, DOI:10.32604/csse.2023.029017

    Abstract Pesticides have become more necessary in modern agricultural production. However, these pesticides have an unforeseeable long-term impact on people's wellbeing as well as the ecosystem. Due to a shortage of basic pesticide exposure awareness, farmers typically utilize pesticides extremely close to harvesting. Pesticide residues within foods, particularly fruits as well as veggies, are a significant issue among farmers, merchants, and particularly consumers. The residual concentrations were far lower than these maximal allowable limits, with only a few surpassing the restrictions for such pesticides in food. There is an obligation to provide a warning about this amount of pesticide use in… More >

  • Open Access

    ARTICLE

    Web Page Recommendation Using Distributional Recurrent Neural Network

    Chaithra1,*, G. M. Lingaraju2, S. Jagannatha3

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 803-817, 2023, DOI:10.32604/csse.2023.028770

    Abstract In the data retrieval process of the Data recommendation system, the matching prediction and similarity identification take place a major role in the ontology. In that, there are several methods to improve the retrieving process with improved accuracy and to reduce the searching time. Since, in the data recommendation system, this type of data searching becomes complex to search for the best matching for given query data and fails in the accuracy of the query recommendation process. To improve the performance of data validation, this paper proposed a novel model of data similarity estimation and clustering method to retrieve the… More >

  • Open Access

    ARTICLE

    Prediction of Photosynthetic Carbon Assimilation Rate of Individual Rice Leaves under Changes in Light Environment Using BLSTM-Augmented LSTM

    Masayuki Honda1, Kenichi Tatsumi2,*, Masaki Nakagawa3

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 557-577, 2022, DOI:10.32604/cmes.2022.020623

    Abstract A model to predict photosynthetic carbon assimilation rate (A) with high accuracy is important for forecasting crop yield and productivity. Long short-term memory (LSTM), a neural network suitable for time-series data, enables prediction with high accuracy but requires mesophyll variables. In addition, for practical use, it is desirable to have a technique that can predict A from easily available information. In this study, we propose a BLSTMaugmented LSTM (BALSTM) model, which utilizes bi-directional LSTM (BLSTM) to indirectly reproduce the mesophyll variables required for LSTM. The most significant feature of the proposed model is that its hybrid architecture uses only three… More >

  • Open Access

    ARTICLE

    Real-Time Speech Enhancement Based on Convolutional Recurrent Neural Network

    S. Girirajan, A. Pandian*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1987-2001, 2023, DOI:10.32604/iasc.2023.028090

    Abstract Speech enhancement is the task of taking a noisy speech input and producing an enhanced speech output. In recent years, the need for speech enhancement has been increased due to challenges that occurred in various applications such as hearing aids, Automatic Speech Recognition (ASR), and mobile speech communication systems. Most of the Speech Enhancement research work has been carried out for English, Chinese, and other European languages. Only a few research works involve speech enhancement in Indian regional Languages. In this paper, we propose a two-fold architecture to perform speech enhancement for Tamil speech signal based on convolutional recurrent neural… More >

Displaying 11-20 on page 2 of 57. Per Page