Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (30)
  • Open Access

    ARTICLE

    ResCD-FCN: Semantic Scene Change Detection Using Deep Neural Networks

    S. Eliza Femi Sherley1,*, J. M. Karthikeyan1, N. Bharath Raj1, R. Prabakaran2, A. Abinaya1, S. V. V. Lakshmi3

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 215-227, 2022, DOI:10.32604/jai.2022.034931

    Abstract Semantic change detection is extension of change detection task in which it is not only used to identify the changed regions but also to analyze the land area semantic (labels/categories) details before and after the timelines are analyzed. Periodical land change analysis is used for many real time applications for valuation purposes. Majority of the research works are focused on Convolutional Neural Networks (CNN) which tries to analyze changes alone. Semantic information of changes appears to be missing, there by absence of communication between the different semantic timelines and changes detected over the region happens. To overcome this limitation, a… More >

  • Open Access

    ARTICLE

    Hyperparameter Tuning for Deep Neural Networks Based Optimization Algorithm

    D. Vidyabharathi1,*, V. Mohanraj2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2559-2573, 2023, DOI:10.32604/iasc.2023.032255

    Abstract For training the present Neural Network (NN) models, the standard technique is to utilize decaying Learning Rates (LR). While the majority of these techniques commence with a large LR, they will decay multiple times over time. Decaying has been proved to enhance generalization as well as optimization. Other parameters, such as the network’s size, the number of hidden layers, dropouts to avoid overfitting, batch size, and so on, are solely based on heuristics. This work has proposed Adaptive Teaching Learning Based (ATLB) Heuristic to identify the optimal hyperparameters for diverse networks. Here we consider three architectures Recurrent Neural Networks (RNN),… More >

  • Open Access

    ARTICLE

    Adaptive Backdoor Attack against Deep Neural Networks

    Honglu He, Zhiying Zhu, Xinpeng Zhang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2617-2633, 2023, DOI:10.32604/cmes.2023.025923

    Abstract In recent years, the number of parameters of deep neural networks (DNNs) has been increasing rapidly. The training of DNNs is typically computation-intensive. As a result, many users leverage cloud computing and outsource their training procedures. Outsourcing computation results in a potential risk called backdoor attack, in which a welltrained DNN would perform abnormally on inputs with a certain trigger. Backdoor attacks can also be classified as attacks that exploit fake images. However, most backdoor attacks design a uniform trigger for all images, which can be easily detected and removed. In this paper, we propose a novel adaptive backdoor attack.… More >

  • Open Access

    ARTICLE

    A Novel Light Weight CNN Framework Integrated with Marine Predator Optimization for the Assessment of Tear Film-Lipid Layer Patterns

    Bejoy Abraham1, Jesna Mohan2, Linu Shine3, Sivakumar Ramachandran3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 87-106, 2023, DOI:10.32604/cmes.2023.023384

    Abstract Tear film, the outermost layer of the eye, is a complex and dynamic structure responsible for tear production. The tear film lipid layer is a vital component of the tear film that provides a smooth optical surface for the cornea and wetting the ocular surface. Dry eye syndrome (DES) is a symptomatic disease caused by reduced tear production, poor tear quality, or excessive evaporation. Its diagnosis is a difficult task due to its multifactorial etiology. Out of several clinical tests available, the evaluation of the interference patterns of the tear film lipid layer forms a potential tool for DES diagnosis.… More >

  • Open Access

    ARTICLE

    Inner Cascaded U2-Net: An Improvement to Plain Cascaded U-Net

    Wenbin Wu1, Guanjun Liu1,*, Kaiyi Liang2, Hui Zhou2

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 1323-1335, 2023, DOI:10.32604/cmes.2022.020428

    Abstract Deep neural networks are now widely used in the medical image segmentation field for their performance superiority and no need of manual feature extraction. U-Net has been the baseline model since the very beginning due to a symmetrical U-structure for better feature extraction and fusing and suitable for small datasets. To enhance the segmentation performance of U-Net, cascaded U-Net proposes to put two U-Nets successively to segment targets from coarse to fine. However, the plain cascaded U-Net faces the problem of too less between connections so the contextual information learned by the former U-Net cannot be fully used by the… More >

  • Open Access

    ARTICLE

    Route Planning for Autonomous Transmission of Large Sport Utility Vehicle

    V. A. Vijayakumar*, J. Shanthini, S. Karthik, K. Srihari

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 659-669, 2023, DOI:10.32604/csse.2023.028400

    Abstract The autonomous driving aims at ensuring the vehicle to effectively sense the environment and use proper strategies to navigate the vehicle without the interventions of humans. Hence, there exist a prediction of the background scenes and that leads to discontinuity between the predicted and planned outputs. An optimal prediction engine is required that suitably reads the background objects and make optimal decisions. In this paper, the author(s) develop an autonomous model for vehicle driving using ensemble model for large Sport Utility Vehicles (SUVs) that uses three different modules involving (a) recognition model, (b) planning model and (c) prediction model. The… More >

  • Open Access

    ARTICLE

    Image Steganography Using Deep Neural Networks

    Kavitha Chinniyan*, Thamil Vani Samiyappan, Aishvarya Gopu, Narmatha Ramasamy

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1877-1891, 2022, DOI:10.32604/iasc.2022.027274

    Abstract Steganography is the technique of hiding secret data within ordinary data by modifying pixel values which appear normal to a casual observer. Steganography which is similar to cryptography helps in secret communication. The cryptography method focuses on the authenticity and integrity of the messages by hiding the contents of the messages. Sometimes, it is not only just enough to encrypt the message but also essential to hide the existence of the message itself. As this avoids misuse of data, this kind of encryption is less suspicious and does not catch attention. To achieve this, Stacked Autoencoder model is developed which… More >

  • Open Access

    ARTICLE

    Week Ahead Electricity Power and Price Forecasting Using Improved DenseNet-121 Method

    Muhammad Irfan1, Ali Raza2,*, Faisal Althobiani3, Nasir Ayub4,5, Muhammad Idrees6, Zain Ali7, Kashif Rizwan4, Abdullah Saeed Alwadie1, Saleh Mohammed Ghonaim3, Hesham Abdushkour3, Saifur Rahman1, Omar Alshorman1, Samar Alqhtani8

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4249-4265, 2022, DOI:10.32604/cmc.2022.025863

    Abstract In the Smart Grid (SG) residential environment, consumers change their power consumption routine according to the price and incentives announced by the utility, which causes the prices to deviate from the initial pattern. Thereby, electricity demand and price forecasting play a significant role and can help in terms of reliability and sustainability. Due to the massive amount of data, big data analytics for forecasting becomes a hot topic in the SG domain. In this paper, the changing and non-linearity of consumer consumption pattern complex data is taken as input. To minimize the computational cost and complexity of the data, the… More >

  • Open Access

    ARTICLE

    Pattern Recognition of Modulation Signal Classification Using Deep Neural Networks

    D. Venugopal1, V. Mohan2, S. Ramesh3, S. Janupriya4, Sangsoon Lim5,*, Seifedine Kadry6

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 545-558, 2022, DOI:10.32604/csse.2022.024239

    Abstract In recent times, pattern recognition of communication modulation signals has gained significant attention in several application areas such as military, civilian field, etc. It becomes essential to design a safe and robust feature extraction (FE) approach to efficiently identify the various signal modulation types in a complex platform. Several works have derived new techniques to extract the feature parameters namely instant features, fractal features, and so on. In addition, machine learning (ML) and deep learning (DL) approaches can be commonly employed for modulation signal classification. In this view, this paper designs pattern recognition of communication signal modulation using fractal features… More >

  • Open Access

    ARTICLE

    Transfer Learning on Deep Neural Networks to Detect Pornography

    Saleh Albahli*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 701-717, 2022, DOI:10.32604/csse.2022.022723

    Abstract While the internet has a lot of positive impact on society, there are negative components. Accessible to everyone through online platforms, pornography is, inducing psychological and health related issues among people of all ages. While a difficult task, detecting pornography can be the important step in determining the porn and adult content in a video. In this paper, an architecture is proposed which yielded high scores for both training and testing. This dataset was produced from 190 videos, yielding more than 19 h of videos. The main sources for the content were from YouTube, movies, torrent, and websites that hosts… More >

Displaying 1-10 on page 1 of 30. Per Page  

Share Link