Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (87)
  • Open Access

    ARTICLE

    A High-Efficiency Inversion Method for the Material Parameters of an Alberich-Type Sound Absorption Coating Based on a Deep Learning Model

    Yiping Sun1,2, Jiadui Chen1, Qiang Bai1, Xuefeng Zhao1, Meng Tao1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1693-1716, 2022, DOI:10.32604/cmes.2022.019336

    Abstract Research on the acoustic performance of an anechoic coating composed of cavities in a viscoelastic material has recently become an area of great interest. Traditional forward research methods are unable to manipulate sound waves accurately and effectively, are difficult to analyse, have time-consuming solution processes, and have large optimization search spaces. To address these issues, this paper proposes a deep learning-based inverse research method to efficiently invert the material parameters of Alberich-type sound absorption coatings and rapidly predict their acoustic performance. First, an autoencoder (AE) model is pretrained to reconstruct the viscoelastic material parameters of an Alberich-type sound absorption coating,… More >

  • Open Access

    REVIEW

    The Hidden-Layers Topology Analysis of Deep Learning Models in Survey for Forecasting and Generation of the Wind Power and Photovoltaic Energy

    Dandan Xu1, Haijian Shao1,*, Xing Deng1,2, Xia Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.2, pp. 567-597, 2022, DOI:10.32604/cmes.2022.019245

    Abstract As wind and photovoltaic energy become more prevalent, the optimization of power systems is becoming increasingly crucial. The current state of research in renewable generation and power forecasting technology, such as wind and photovoltaic power (PV), is described in this paper, with a focus on the ensemble sequential LSTMs approach with optimized hidden-layers topology for short-term multivariable wind power forecasting. The methods for forecasting wind power and PV production. The physical model, statistical learning method, and machine learning approaches based on historical data are all evaluated for the forecasting of wind power and PV production. Moreover, the experiments demonstrated that… More >

  • Open Access

    ARTICLE

    Historical Arabic Images Classification and Retrieval Using Siamese Deep Learning Model

    Manal M. Khayyat1,2, Lamiaa A. Elrefaei2,3, Mashael M. Khayyat4,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2109-2125, 2022, DOI:10.32604/cmc.2022.024975

    Abstract Classifying the visual features in images to retrieve a specific image is a significant problem within the computer vision field especially when dealing with historical faded colored images. Thus, there were lots of efforts trying to automate the classification operation and retrieve similar images accurately. To reach this goal, we developed a VGG19 deep convolutional neural network to extract the visual features from the images automatically. Then, the distances among the extracted features vectors are measured and a similarity score is generated using a Siamese deep neural network. The Siamese model built and trained at first from scratch but, it… More >

  • Open Access

    ARTICLE

    Intelligent Deep Learning Model for Privacy Preserving IIoT on 6G Environment

    Anwer Mustafa Hilal1,*, Jaber S. Alzahrani2, Ibrahim Abunadi3, Nadhem Nemri4, Fahd N. Al-Wesabi5,6, Abdelwahed Motwakel1, Ishfaq Yaseen1, Abu Sarwar Zamani1

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 333-348, 2022, DOI:10.32604/cmc.2022.024794

    Abstract In recent times, Industrial Internet of Things (IIoT) experiences a high risk of cyber attacks which needs to be resolved. Blockchain technology can be incorporated into IIoT system to help the entrepreneurs realize Industry 4.0 by overcoming such cyber attacks. Although blockchain-based IIoT network renders a significant support and meet the service requirements of next generation network, the performance arrived at, in existing studies still needs improvement. In this scenario, the current research paper develops a new Privacy-Preserving Blockchain with Deep Learning model for Industrial IoT (PPBDL-IIoT) on 6G environment. The proposed PPBDL-IIoT technique aims at identifying the existence of… More >

  • Open Access

    ARTICLE

    Fusion-Based Deep Learning Model for Hyperspectral Images Classification

    Kriti1, Mohd Anul Haq2, Urvashi Garg1, Mohd Abdul Rahim Khan2,*, V. Rajinikanth3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 939-957, 2022, DOI:10.32604/cmc.2022.023169

    Abstract A crucial task in hyperspectral image (HSI) taxonomy is exploring effective methodologies to effusively practice the 3-D and spectral data delivered by the statistics cube. For classification of images, 3-D data is adjudged in the phases of pre-cataloging, an assortment of a sample, classifiers, post-cataloging, and accurateness estimation. Lastly, a viewpoint on imminent examination directions for proceeding 3-D and spectral approaches is untaken. In topical years, sparse representation is acknowledged as a dominant classification tool to effectually labels deviating difficulties and extensively exploited in several imagery dispensation errands. Encouraged by those efficacious solicitations, sparse representation (SR) has likewise been presented… More >

  • Open Access

    ARTICLE

    Ensemble Deep Learning Models for Mitigating DDoS Attack in Software-Defined Network

    Fatmah Alanazi*, Kamal Jambi, Fathy Eassa, Maher Khemakhem, Abdullah Basuhail, Khalid Alsubhi

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 923-938, 2022, DOI:10.32604/iasc.2022.024668

    Abstract Software-defined network (SDN) is an enabling technology that meets the demand of dynamic, adaptable, and manageable networking architecture for the future. In contrast to the traditional networks that are based on a distributed control plane, the control plane of SDN is based on a centralized architecture. As a result, SDNs are susceptible to critical cyber attacks that exploit the single point of failure. A distributed denial of service (DDoS) attack is one of the most crucial and risky attacks, targeting the SDN controller and disrupting its services. Several researchers have proposed signature-based DDoS mitigation and detection techniques that rely on… More >

  • Open Access

    ARTICLE

    Optimized Deep Learning Model for Colorectal Cancer Detection and Classification Model

    Mahmoud Ragab1,2,3,*, Khalid Eljaaly4, Maha Farouk S. Sabir5, Ehab Bahaudien Ashary6, S. M. Abo-Dahab7,8, E. M. Khalil3,9

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5751-5764, 2022, DOI:10.32604/cmc.2022.024658

    Abstract The recent developments in biological and information technologies have resulted in the generation of massive quantities of data it speeds up the process of knowledge discovery from biological systems. Due to the advancements of medical imaging in healthcare decision making, significant attention has been paid by the computer vision and deep learning (DL) models. At the same time, the detection and classification of colorectal cancer (CC) become essential to reduce the severity of the disease at an earlier stage. The existing methods are commonly based on the combination of textual features to examine the classifier results or machine learning (ML)… More >

  • Open Access

    ARTICLE

    Automated Multi-Document Biomedical Text Summarization Using Deep Learning Model

    Ahmed S. Almasoud1, Siwar Ben Haj Hassine2, Fahd N. Al-Wesabi2,3, Mohamed K. Nour4, Anwer Mustafa Hilal5, Mesfer Al Duhayyim6, Manar Ahmed Hamza5,*, Abdelwahed Motwakel5

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5799-5815, 2022, DOI:10.32604/cmc.2022.024556

    Abstract Due to the advanced developments of the Internet and information technologies, a massive quantity of electronic data in the biomedical sector has been exponentially increased. To handle the huge amount of biomedical data, automated multi-document biomedical text summarization becomes an effective and robust approach of accessing the increased amount of technical and medical literature in the biomedical sector through the summarization of multiple source documents by retaining the significantly informative data. So, multi-document biomedical text summarization acts as a vital role to alleviate the issue of accessing precise and updated information. This paper presents a Deep Learning based Attention Long… More >

  • Open Access

    ARTICLE

    Attention-Based Deep Learning Model for Early Detection of Parkinson's Disease

    Mohd Sadiq1, Mohd Tauheed Khan2,*, Sarfaraz Masood3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5183-5200, 2022, DOI:10.32604/cmc.2022.020531

    Abstract Parkinson's disease (PD), classified under the category of a neurological syndrome, affects the brain of a person which leads to the motor and non-motor symptoms. Among motor symptoms, one of the major disabling symptom is Freezing of Gait (FoG) that affects the daily standard of living of PD patients. Available treatments target to improve the symptoms of PD. Detection of PD at the early stages is an arduous task due to being indistinguishable from a healthy individual. This work proposed a novel attention-based model for the detection of FoG events and PD, and measuring the intensity of PD on the… More >

  • Open Access

    ARTICLE

    Evaluation of Deep Learning Models for Person Authentication Based on Touch Gesture

    Asrar Bajaber1,*, Mai Fadel1, Lamiaa Elrefaei2

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 465-481, 2022, DOI:10.32604/csse.2022.022003

    Abstract Touch gesture biometrics authentication system is the study of user's touching behavior on his touch device to identify him. The features traditionally used in touch gesture authentication systems are extracted using hand-crafted feature extraction approach. In this work, we investigate the ability of Deep Learning (DL) to automatically discover useful features of touch gesture and use them to authenticate the user. Four different models are investigated Long-Short Term Memory (LSTM), Gated Recurrent Unit (GRU), Convolutional Neural Network (CNN) combined with LSTM (CNN-LSTM), and CNN combined with GRU(CNN-GRU). In addition, different regularization techniques are investigated such as Activity Regularizer, Batch Normalization… More >

Displaying 61-70 on page 7 of 87. Per Page