Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (221)
  • Open Access

    ARTICLE

    LSTM Based Neural Network Model for Anomaly Event Detection in Care-Independent Smart Homes

    Brij B. Gupta1,2,3,*, Akshat Gaurav4, Razaz Waheeb Attar5, Varsha Arya6,7, Ahmed Alhomoud8, Kwok Tai Chui9

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2689-2706, 2024, DOI:10.32604/cmes.2024.050825

    Abstract This study introduces a long-short-term memory (LSTM)-based neural network model developed for detecting anomaly events in care-independent smart homes, focusing on the critical application of elderly fall detection. It balances the dataset using the Synthetic Minority Over-sampling Technique (SMOTE), effectively neutralizing bias to address the challenge of unbalanced datasets prevalent in time-series classification tasks. The proposed LSTM model is trained on the enriched dataset, capturing the temporal dependencies essential for anomaly recognition. The model demonstrated a significant improvement in anomaly detection, with an accuracy of 84%. The results, detailed in the comprehensive classification and confusion More >

  • Open Access

    ARTICLE

    DeBERTa-GRU: Sentiment Analysis for Large Language Model

    Adel Assiri1, Abdu Gumaei2,*, Faisal Mehmood3,*, Touqeer Abbas4, Sami Ullah5

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4219-4236, 2024, DOI:10.32604/cmc.2024.050781

    Abstract Modern technological advancements have made social media an essential component of daily life. Social media allow individuals to share thoughts, emotions, and ideas. Sentiment analysis plays the function of evaluating whether the sentiment of the text is positive, negative, neutral, or any other personal emotion to understand the sentiment context of the text. Sentiment analysis is essential in business and society because it impacts strategic decision-making. Sentiment analysis involves challenges due to lexical variation, an unlabeled dataset, and text distance correlations. The execution time increases due to the sequential processing of the sequence models. However,… More >

  • Open Access

    ARTICLE

    A New Industrial Intrusion Detection Method Based on CNN-BiLSTM

    Jun Wang, Changfu Si, Zhen Wang, Qiang Fu*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4297-4318, 2024, DOI:10.32604/cmc.2024.050223

    Abstract Nowadays, with the rapid development of industrial Internet technology, on the one hand, advanced industrial control systems (ICS) have improved industrial production efficiency. However, there are more and more cyber-attacks targeting industrial control systems. To ensure the security of industrial networks, intrusion detection systems have been widely used in industrial control systems, and deep neural networks have always been an effective method for identifying cyber attacks. Current intrusion detection methods still suffer from low accuracy and a high false alarm rate. Therefore, it is important to build a more efficient intrusion detection model. This paper… More >

  • Open Access

    ARTICLE

    Fault Diagnosis Method of Rolling Bearing Based on MSCNN-LSTM

    Chunming Wu1, Shupeng Zheng2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4395-4411, 2024, DOI:10.32604/cmc.2024.049665

    Abstract Deep neural networks have been widely applied to bearing fault diagnosis systems and achieved impressive success recently. To address the problem that the insufficient fault feature extraction ability of traditional fault diagnosis methods results in poor diagnosis effect under variable load and noise interference scenarios, a rolling bearing fault diagnosis model combining Multi-Scale Convolutional Neural Network (MSCNN) and Long Short-Term Memory (LSTM) fused with attention mechanism is proposed. To adaptively extract the essential spatial feature information of various sizes, the model creates a multi-scale feature extraction module using the convolutional neural network (CNN) learning process.… More >

  • Open Access

    ARTICLE

    Improving the Transmission Security of Vein Images Using a Bezier Curve and Long Short-Term Memory

    Ahmed H. Alhadethi1,*, Ikram Smaoui2, Ahmed Fakhfakh3, Saad M. Darwish4

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4825-4844, 2024, DOI:10.32604/cmc.2024.047852

    Abstract The act of transmitting photos via the Internet has become a routine and significant activity. Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that can still be further enhanced. This study presents a system that employs a range of approaches and algorithms to ensure the security of transmitted venous images. The main goal of this work is to create a very effective system for compressing individual biometrics in order to improve the overall accuracy and security of digital photographs by means of image compression. This paper introduces… More >

  • Open Access

    ARTICLE

    A Combination Prediction Model for Short Term Travel Demand of Urban Taxi

    Mingyuan Li1,*, Yuanli Gu1, Qingqiao Geng2, Hongru Yu1

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3877-3896, 2024, DOI:10.32604/cmc.2024.047765

    Abstract This study proposes a prediction model considering external weather and holiday factors to address the issue of accurately predicting urban taxi travel demand caused by complex data and numerous influencing factors. The model integrates the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDAN) and Convolutional Long Short Term Memory Neural Network (ConvLSTM) to predict short-term taxi travel demand. The CEEMDAN decomposition method effectively decomposes time series data into a set of modal components, capturing sequence characteristics at different time scales and frequencies. Based on the sample entropy value of components, secondary processing of more… More >

  • Open Access

    ARTICLE

    Short-Term Household Load Forecasting Based on Attention Mechanism and CNN-ICPSO-LSTM

    Lin Ma1, Liyong Wang1, Shuang Zeng1, Yutong Zhao1, Chang Liu1, Heng Zhang1, Qiong Wu2,*, Hongbo Ren2

    Energy Engineering, Vol.121, No.6, pp. 1473-1493, 2024, DOI:10.32604/ee.2024.047332

    Abstract Accurate load forecasting forms a crucial foundation for implementing household demand response plans and optimizing load scheduling. When dealing with short-term load data characterized by substantial fluctuations, a single prediction model is hard to capture temporal features effectively, resulting in diminished prediction accuracy. In this study, a hybrid deep learning framework that integrates attention mechanism, convolution neural network (CNN), improved chaotic particle swarm optimization (ICPSO), and long short-term memory (LSTM), is proposed for short-term household load forecasting. Firstly, the CNN model is employed to extract features from the original data, enhancing the quality of data… More >

  • Open Access

    ARTICLE

    Abnormal State Detection in Lithium-ion Battery Using Dynamic Frequency Memory and Correlation Attention LSTM Autoencoder

    Haoyi Zhong, Yongjiang Zhao, Chang Gyoon Lim*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1757-1781, 2024, DOI:10.32604/cmes.2024.049208

    Abstract This paper addresses the challenge of identifying abnormal states in Lithium-ion Battery (LiB) time series data. As the energy sector increasingly focuses on integrating distributed energy resources, Virtual Power Plants (VPP) have become a vital new framework for energy management. LiBs are key in this context, owing to their high-efficiency energy storage capabilities essential for VPP operations. However, LiBs are prone to various abnormal states like overcharging, over-discharging, and internal short circuits, which impede power transmission efficiency. Traditional methods for detecting such abnormalities in LiB are too broad and lack precision for the dynamic and… More >

  • Open Access

    ARTICLE

    Traffic Flow Prediction with Heterogeneous Spatiotemporal Data Based on a Hybrid Deep Learning Model Using Attention-Mechanism

    Jing-Doo Wang1, Chayadi Oktomy Noto Susanto1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1711-1728, 2024, DOI:10.32604/cmes.2024.048955

    Abstract A significant obstacle in intelligent transportation systems (ITS) is the capacity to predict traffic flow. Recent advancements in deep neural networks have enabled the development of models to represent traffic flow accurately. However, accurately predicting traffic flow at the individual road level is extremely difficult due to the complex interplay of spatial and temporal factors. This paper proposes a technique for predicting short-term traffic flow data using an architecture that utilizes convolutional bidirectional long short-term memory (Conv-BiLSTM) with attention mechanisms. Prior studies neglected to include data pertaining to factors such as holidays, weather conditions, and More >

  • Open Access

    ARTICLE

    An Enhanced Hybrid Model Based on CNN and BiLSTM for Identifying Individuals via Handwriting Analysis

    Md. Abdur Rahim1, Fahmid Al Farid2, Abu Saleh Musa Miah3, Arpa Kar Puza1, Md. Nur Alam4, Md. Najmul Hossain5, Sarina Mansor2, Hezerul Abdul Karim2,6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1689-1710, 2024, DOI:10.32604/cmes.2024.048714

    Abstract Handwriting is a unique and significant human feature that distinguishes them from one another. There are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for person identification through verification. However, such systems are susceptible to forgery, posing security risks. In response to these challenges, we propose an innovative hybrid technique for individual identification based on independent handwriting, eliminating the reliance on specific signatures or symbols. In response to these challenges, we propose an innovative hybrid technique for individual identification based on independent handwriting, eliminating the reliance on specific signatures… More >

Displaying 1-10 on page 1 of 221. Per Page