Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    A Combined Method of Temporal Convolutional Mechanism and Wavelet Decomposition for State Estimation of Photovoltaic Power Plants

    Shaoxiong Wu1, Ruoxin Li1, Xiaofeng Tao1, Hailong Wu1,*, Ping Miao1, Yang Lu1, Yanyan Lu1, Qi Liu2, Li Pan2

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3063-3077, 2024, DOI:10.32604/cmc.2024.055381 - 18 November 2024

    Abstract Time series prediction has always been an important problem in the field of machine learning. Among them, power load forecasting plays a crucial role in identifying the behavior of photovoltaic power plants and regulating their control strategies. Traditional power load forecasting often has poor feature extraction performance for long time series. In this paper, a new deep learning framework Residual Stacked Temporal Long Short-Term Memory (RST-LSTM) is proposed, which combines wavelet decomposition and time convolutional memory network to solve the problem of feature extraction for long sequences. The network framework of RST-LSTM consists of two More >

  • Open Access

    ARTICLE

    Building Indoor Dangerous Behavior Recognition Based on LSTM-GCN with Attention Mechanism

    Qingyue Zhao1, Qiaoyu Gu2, Zhijun Gao3,*, Shipian Shao1, Xinyuan Zhang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1773-1788, 2023, DOI:10.32604/cmes.2023.027500 - 26 June 2023

    Abstract Building indoor dangerous behavior recognition is a specific application in the field of abnormal human recognition. A human dangerous behavior recognition method based on LSTM-GCN with attention mechanism (GLA) model was proposed aiming at the problem that the existing human skeleton-based action recognition methods cannot fully extract the temporal and spatial features. The network connects GCN and LSTM network in series, and inputs the skeleton sequence extracted by GCN that contains spatial information into the LSTM layer for time sequence feature extraction, which fully excavates the temporal and spatial features of the skeleton sequence. Finally, More >

  • Open Access

    ARTICLE

    An LSTM-Based Malware Detection Using Transfer Learning

    Zhangjie Fu1,2,3,*, Yongjie Ding1, Musaazi Godfrey1

    Journal of Cyber Security, Vol.3, No.1, pp. 11-28, 2021, DOI:10.32604/jcs.2021.016632 - 30 April 2021

    Abstract Mobile malware occupies a considerable proportion of cyberattacks. With the update of mobile device operating systems and the development of software technology, more and more new malware keep appearing. The emergence of new malware makes the identification accuracy of existing methods lower and lower. There is an urgent need for more effective malware detection models. In this paper, we propose a new approach to mobile malware detection that is able to detect newly-emerged malware instances. Firstly, we build and train the LSTM-based model on original benign and malware samples investigated by both static and dynamic More >

  • Open Access

    ARTICLE

    Long Short Term Memory Networks Based Anomaly Detection for KPIs

    Haiqi Zhu1, Fanzhi Meng2,*, Seungmin Rho3, Mohan Li4,*, Jianyu Wang1, Shaohui Liu1, Feng Jiang1

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 829-847, 2019, DOI:10.32604/cmc.2019.06115

    Abstract In real-world many internet-based service companies need to closely monitor large amounts of data in order to ensure stable operation of their business. However, anomaly detection for these data with various patterns and data quality has been a great challenge, especially without labels. In this paper, we adopt an anomaly detection algorithm based on Long Short-Term Memory (LSTM) Network in terms of reconstructing KPIs and predicting KPIs. They use the reconstruction error and prediction error respectively as the criteria for judging anomalies, and we test our method with real data from a company in the More >

Displaying 1-10 on page 1 of 4. Per Page