Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (18)
  • Open Access

    ARTICLE

    TEAM: Transformer Encoder Attention Module for Video Classification

    Hae Sung Park1, Yong Suk Choi2,*

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 451-477, 2024, DOI:10.32604/csse.2023.043245

    Abstract Much like humans focus solely on object movement to understand actions, directing a deep learning model’s attention to the core contexts within videos is crucial for improving video comprehension. In the recent study, Video Masked Auto-Encoder (VideoMAE) employs a pre-training approach with a high ratio of tube masking and reconstruction, effectively mitigating spatial bias due to temporal redundancy in full video frames. This steers the model’s focus toward detailed temporal contexts. However, as the VideoMAE still relies on full video frames during the action recognition stage, it may exhibit a progressive shift in attention towards spatial contexts, deteriorating its ability… More >

  • Open Access

    ARTICLE

    A Novel Unsupervised MRI Synthetic CT Image Generation Framework with Registration Network

    Liwei Deng1, Henan Sun1, Jing Wang2, Sijuan Huang3, Xin Yang3,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2271-2287, 2023, DOI:10.32604/cmc.2023.039062

    Abstract In recent years, radiotherapy based only on Magnetic Resonance (MR) images has become a hot spot for radiotherapy planning research in the current medical field. However, functional computed tomography (CT) is still needed for dose calculation in the clinic. Recent deep-learning approaches to synthesized CT images from MR images have raised much research interest, making radiotherapy based only on MR images possible. In this paper, we proposed a novel unsupervised image synthesis framework with registration networks. This paper aims to enforce the constraints between the reconstructed image and the input image by registering the reconstructed image with the input image… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Stacked Auto-Encoder with Dynamic Differential Annealed Optimization for Skin Lesion Diagnosis

    Ahmad Alassaf*

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2773-2789, 2023, DOI:10.32604/csse.2023.035899

    Abstract Intelligent diagnosis approaches with shallow architectural models play an essential role in healthcare. Deep Learning (DL) models with unsupervised learning concepts have been proposed because high-quality feature extraction and adequate labelled details significantly influence shallow models. On the other hand, skin lesion-based segregation and disintegration procedures play an essential role in earlier skin cancer detection. However, artefacts, an unclear boundary, poor contrast, and different lesion sizes make detection difficult. To address the issues in skin lesion diagnosis, this study creates the UDLS-DDOA model, an intelligent Unsupervised Deep Learning-based Stacked Auto-encoder (UDLS) optimized by Dynamic Differential Annealed Optimization (DDOA). Pre-processing, segregation,… More >

  • Open Access

    ARTICLE

    A Feature Learning-Based Model for Analyzing Students’ Performance in Supportive Learning

    P. Prabhu1, P. Valarmathie2,*, K. Dinakaran3

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2989-3005, 2023, DOI:10.32604/iasc.2023.028659

    Abstract Supportive learning plays a substantial role in providing a quality education system. The evaluation of students’ performance impacts their deeper insight into the subject knowledge. Specifically, it is essential to maintain the baseline foundation for building a broader understanding of their careers. This research concentrates on establishing the students’ knowledge relationship even in reduced samples. Here, Synthetic Minority Oversampling TEchnique (SMOTE) technique is used for pre-processing the missing value in the provided input dataset to enhance the prediction accuracy. When the initial processing is not done substantially, it leads to misleading prediction accuracy. This research concentrates on modelling an efficient… More >

  • Open Access

    ARTICLE

    Deep Learning Based Face Detection and Identification of Criminal Suspects

    S. Sandhya1, A. Balasundaram2,*, Ayesha Shaik1

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2331-2343, 2023, DOI:10.32604/cmc.2023.032715

    Abstract Occurrence of crimes has been on the constant rise despite the emerging discoveries and advancements in the technological field in the past decade. One of the most tedious tasks is to track a suspect once a crime is committed. As most of the crimes are committed by individuals who have a history of felonies, it is essential for a monitoring system that does not just detect the person’s face who has committed the crime, but also their identity. Hence, a smart criminal detection and identification system that makes use of the OpenCV Deep Neural Network (DNN) model which employs a… More >

  • Open Access

    ARTICLE

    An Efficient Encryption and Compression of Sensed IoT Medical Images Using Auto-Encoder

    Passent El-kafrawy1,2, Maie Aboghazalah2,*, Abdelmoty M. Ahmed3, Hanaa Torkey4, Ayman El-Sayed4

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 909-926, 2023, DOI:10.32604/cmes.2022.021713

    Abstract Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common practice. Encryption of medical images is very important to secure patient information. Encrypting these images consumes a lot of time on edge computing; therefore, the use of an auto-encoder for compression before encoding will solve such a problem. In this paper, we use an auto-encoder to compress a medical image before encryption, and an encryption output (vector) is sent out over the network. On the other hand, a decoder was used to reproduce the original image back after the vector was received and decrypted.… More >

  • Open Access

    ARTICLE

    Spoofing Face Detection Using Novel Edge-Net Autoencoder for Security

    Amal H. Alharbi1, S. Karthick2, K. Venkatachalam3, Mohamed Abouhawwash4,5, Doaa Sami Khafaga1,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2773-2787, 2023, DOI:10.32604/iasc.2023.030763

    Abstract Recent security applications in mobile technologies and computer systems use face recognition for high-end security. Despite numerous security techniques, face recognition is considered a high-security control. Developers fuse and carry out face identification as an access authority into these applications. Still, face identification authentication is sensitive to attacks with a 2-D photo image or captured video to access the system as an authorized user. In the existing spoofing detection algorithm, there was some loss in the recreation of images. This research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame of the sequenced set of… More >

  • Open Access

    ARTICLE

    Early Detection of Heartbeat from Multimodal Data Using RPA Learning with KDNN-SAE

    A. K. S. Saranya1,*, T. Jaya2

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 545-562, 2023, DOI:10.32604/csse.2023.029975

    Abstract Heartbeat detection stays central to cardiovascular an electrocardiogram (ECG) is used to help with disease diagnosis and management. Existing Convolutional Neural Network (CNN)-based methods suffer from the less generalization problem thus; the effectiveness and robustness of the traditional heartbeat detector methods cannot be guaranteed. In contrast, this work proposes a heartbeat detector Krill based Deep Neural Network Stacked Auto Encoders (KDNN-SAE) that computes the disease before the exact heart rate by combining features from multiple ECG Signals. Heartbeats are classified independently and multiple signals are fused to estimate life threatening conditions earlier without any error in classification of heart beat.… More >

  • Open Access

    ARTICLE

    An Efficient Unsupervised Learning Approach for Detecting Anomaly in Cloud

    P. Sherubha1,*, S. P. Sasirekha2, A. Dinesh Kumar Anguraj3, J. Vakula Rani4, Raju Anitha3, S. Phani Praveen5,6, R. Hariharan Krishnan5,6

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 149-166, 2023, DOI:10.32604/csse.2023.024424

    Abstract The Cloud system shows its growing functionalities in various industrial applications. The safety towards data transfer seems to be a threat where Network Intrusion Detection System (NIDS) is measured as an essential element to fulfill security. Recently, Machine Learning (ML) approaches have been used for the construction of intellectual IDS. Most IDS are based on ML techniques either as unsupervised or supervised. In supervised learning, NIDS is based on labeled data where it reduces the efficiency of the reduced model to identify attack patterns. Similarly, the unsupervised model fails to provide a satisfactory outcome. Hence, to boost the functionality of… More >

  • Open Access

    ARTICLE

    Swarm Optimization and Machine Learning for Android Malware Detection

    K. Santosh Jhansi1,2,*, P. Ravi Kiran Varma2, Sujata Chakravarty3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6327-6345, 2022, DOI:10.32604/cmc.2022.030878

    Abstract Malware Security Intelligence constitutes the analysis of applications and their associated metadata for possible security threats. Application Programming Interfaces (API) calls contain valuable information that can help with malware identification. The malware analysis with reduced feature space helps for the efficient identification of malware. The goal of this research is to find the most informative features of API calls to improve the android malware detection accuracy. Three swarm optimization methods, viz., Ant Lion Optimization (ALO), Cuckoo Search Optimization (CSO), and Firefly Optimization (FO) are applied to API calls using auto-encoders for identification of most influential features. The nature-inspired wrapper-based algorithms… More >

Displaying 1-10 on page 1 of 18. Per Page