Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (62)
  • Open Access

    ARTICLE

    Optimized Predictive Framework for Healthcare Through Deep Learning

    Yasir Shahzad1,*, Huma Javed1, Haleem Farman2, Jamil Ahmad2, Bilal Jan3, Abdelmohsen A. Nassani4

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2463-2480, 2021, DOI:10.32604/cmc.2021.014904

    Abstract Smart healthcare integrates an advanced wave of information technology using smart devices to collect health-related medical science data. Such data usually exist in unstructured, noisy, incomplete, and heterogeneous forms. Annotating these limitations remains an open challenge in deep learning to classify health conditions. In this paper, a long short-term memory (LSTM) based health condition prediction framework is proposed to rectify imbalanced and noisy data and transform it into a useful form to predict accurate health conditions. The imbalanced and scarce data is normalized through coding to gain consistency for accurate results using synthetic minority oversampling technique. The proposed model is… More >

  • Open Access

    ARTICLE

    Combining Trend-Based Loss with Neural Network for Air Quality Forecasting in Internet of Things

    Weiwen Kong1, Baowei Wang1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.2, pp. 849-863, 2020, DOI:10.32604/cmes.2020.012818

    Abstract Internet of Things (IoT) is a network that connects things in a special union. It embeds a physical entity through an intelligent perception system to obtain information about the component at any time. It connects various objects. IoT has the ability of information transmission, information perception,andinformationprocessing.Theairqualityforecastinghasalways been an urgent problem, which affects people’s quality of life seriously. So far, many air quality prediction algorithms have been proposed, which can be mainly classifed into two categories. One is regression-based prediction, the other is deep learning-based prediction. Regression-based prediction is aimed to make use of the classical regression algorithm and the various… More >

  • Open Access

    ARTICLE

    Roman Urdu News Headline Classification Empowered with Machine Learning

    Rizwan Ali Naqvi1, Muhammad Adnan Khan2, *, Nauman Malik2, Shazia Saqib2, Tahir Alyas2, Dildar Hussain3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1221-1236, 2020, DOI:10.32604/cmc.2020.011686

    Abstract Roman Urdu has been used for text messaging over the Internet for years especially in Indo-Pak Subcontinent. Persons from the subcontinent may speak the same Urdu language but they might be using different scripts for writing. The communication using the Roman characters, which are used in the script of Urdu language on social media, is now considered the most typical standard of communication in an Indian landmass that makes it an expensive information supply. English Text classification is a solved problem but there have been only a few efforts to examine the rich information supply of Roman Urdu in the… More >

  • Open Access

    ARTICLE

    Delay-dependent Stability of Recurrent Neural Networks with Time-varying Delay

    Guobao Zhanga,b, Jing-Jing Xionga,b, Yongming Huanga,b, Yong Lua,b,c, Ling Wanga,b

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 541-551, 2018, DOI:10.31209/2018.100000021

    Abstract This paper investigates the delay-dependent stability problem of recurrent neural networks with time-varying delay. A new and less conservative stability criterion is derived through constructing a new augmented Lyapunov-Krasovskii functional (LKF) and employing the linear matrix inequality method. A new augmented LKF that considers more information of the slope of neuron activation functions is developed for further reducing the conservatism of stability results. To deal with the derivative of the LKF, several commonly used techniques, including the integral inequality, reciprocally convex combination, and free-weighting matrix method, are applied. Moreover, it is found that the obtained stability criterion has a lower… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Fei Li1, *, Jiayan Zhang1, Edward Szczerbicki2, Jiaqi Song1, Ruxiang Li 1, Renhong Diao1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 653-681, 2020, DOI:10.32604/cmc.2020.011264

    Abstract The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated the intrusion detection system based on the in-vehicle system. We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior. In order to verify the accuracy and efficiency… More >

  • Open Access

    ARTICLE

    Applying Stack Bidirectional LSTM Model to Intrusion Detection

    Ziyong Ran1, Desheng Zheng1, *, Yanling Lai1, Lulu Tian2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 309-320, 2020, DOI:10.32604/cmc.2020.010102

    Abstract Nowadays, Internet has become an indispensable part of daily life and is used in many fields. Due to the large amount of Internet traffic, computers are subject to various security threats, which may cause serious economic losses and even endanger national security. It is hoped that an effective security method can systematically classify intrusion data in order to avoid leakage of important data or misuse of data. As machine learning technology matures, deep learning is widely used in various industries. Combining deep learning with network security and intrusion detection is the current trend. In this paper, the problem of data… More >

  • Open Access

    ARTICLE

    Performance Anomaly Detection in Web Services: An RNN- Based Approach Using Dynamic Quality of Service Features

    Muhammad Hasnain1, Seung Ryul Jeong2, *, Muhammad Fermi Pasha3, Imran Ghani4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 729-752, 2020, DOI:10.32604/cmc.2020.010394

    Abstract Performance anomaly detection is the process of identifying occurrences that do not conform to expected behavior or correlate with other incidents or events in time series data. Anomaly detection has been applied to areas such as fraud detection, intrusion detection systems, and network systems. In this paper, we propose an anomaly detection framework that uses dynamic features of quality of service that are collected in a simulated setup. Three variants of recurrent neural networks-SimpleRNN, long short term memory, and gated recurrent unit are evaluated. The results reveal that the proposed method effectively detects anomalies in web services with high accuracy.… More >

  • Open Access

    ARTICLE

    3-Dimensional Bag of Visual Words Framework on Action Recognition

    Shiqi Wang1, Yimin Yang1, *, Ruizhong Wei1, Qingming Jonathan Wu2

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1081-1091, 2020, DOI:10.32604/cmc.2020.09648

    Abstract Human motion recognition plays a crucial role in the video analysis framework. However, a given video may contain a variety of noises, such as an unstable background and redundant actions, that are completely different from the key actions. These noises pose a great challenge to human motion recognition. To solve this problem, we propose a new method based on the 3-Dimensional (3D) Bag of Visual Words (BoVW) framework. Our method includes two parts: The first part is the video action feature extractor, which can identify key actions by analyzing action features. In the video action encoder, by analyzing the action… More >

  • Open Access

    ARTICLE

    OTT Messages Modeling and Classification Based on Recurrent Neural Networks

    Guangyong Yang1, Jianqiu Zeng1, Mengke Yang2, *, Yifei Wei3, Xiangqing Wang3, Zulfiqar Hussain Pathan4

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 769-785, 2020, DOI:10.32604/cmc.2020.07528

    Abstract A vast amount of information has been produced in recent years, which brings a huge challenge to information management. The better usage of big data is of important theoretical and practical significance for effectively addressing and managing messages. In this paper, we propose a nine-rectangle-grid information model according to the information value and privacy, and then present information use policies based on the rough set theory. Recurrent neural networks were employed to classify OTT messages. The content of user interest is effectively incorporated into the classification process during the annotation of OTT messages, ending with a reliable trained classification model.… More >

  • Open Access

    ARTICLE

    Smartphone User Authentication Based on Holding Position and Touch-Typing Biometrics

    Yu Sun1,2,*, Qiyuan Gao3, Xiaofan Du3, Zhao Gu3

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1365-1375, 2019, DOI:10.32604/cmc.2019.06294

    Abstract In this advanced age, when smart phones are the norm, people utilize social networking, online shopping, and even private information storage through smart phones. As a result, identity authentication has become the most critical security activity in this period of the intelligent craze. By analyzing the shortcomings of the existing authentication methods, this paper proposes an identity authentication method based on the behavior of smartphone users. Firstly, the sensor data and touch-screen data of the smart phone users are collected through android programming. Secondly, the eigenvalues of this data are extracted and sent to the server. Thirdly, the Support Vector… More >

Displaying 51-60 on page 6 of 62. Per Page