Results 31 to 40 of about 212,585 (307)

Design and implementation of cloud enabled random neural network-based decentralized smart controller with intelligent sensor nodes for HVAC [PDF]

open access: yes, 2016
Building energy management systems (BEMSs) monitor and control the heating ventilation and air conditioning (HVAC) of buildings in addition to many other building systems and utilities.
Ahmadinia, Ali   +5 more
core   +3 more sources

Independently Recurrent Neural Network (IndRNN): Building A Longer and Deeper RNN [PDF]

open access: yes2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2018
Recurrent neural networks (RNNs) have been widely used for processing sequential data. However, RNNs are commonly difficult to train due to the well-known gradient vanishing and exploding problems and hard to learn long-term patterns.
Shuai Li   +4 more
semanticscholar   +1 more source

A Hybrid CNN and RNN Variant Model for Music Classification

open access: yesApplied Sciences, 2023
Music genre classification has a significant role in information retrieval for the organization of growing collections of music. It is challenging to classify music with reliable accuracy.
Mohsin Ashraf   +6 more
semanticscholar   +1 more source

Lung Cancer Prognosis Through Standardized Pre-Processing And Multifaceted Data Enhancement: A Deep Learning Approach [PDF]

open access: yesSHS Web of Conferences
With high rates of morbidity and mortality, lung cancer continues to be a major problem for world health. A precise prognosis is essential for clinical judgment and patient care.
Nathan Revathy, Rithani M.
doaj   +1 more source

CNN-RNN Based Intelligent Recommendation for Online Medical Pre-Diagnosis Support

open access: yesIEEE/ACM Transactions on Computational Biology & Bioinformatics, 2020
The rapidly developed Health 2.0 technology has provided people with more opportunities to conduct online medical consultation than ever before. Understanding contexts within different online medical communications and activities becomes a significant ...
Xiaokang Zhou, Y. Li, Wei Liang
semanticscholar   +1 more source

Combining Deep Learning Models for Enhancing the Detection of Botnet Attacks in Multiple Sensors Internet of Things Networks

open access: yesJOIV: International Journal on Informatics Visualization, 2021
Distributed-Denial-of-Service impacts are undeniably significant, and because of the development of IoT devices, they are expected to continue to rise in the future.
Abdulkareem A. Hezam   +4 more
doaj   +1 more source

An Hour-Ahead PV Power Forecasting Method Based on an RNN-LSTM Model for Three Different PV Plants

open access: yesEnergies, 2022
Incorporating solar energy into a grid necessitates an accurate power production forecast for photovoltaic (PV) facilities. In this research, output PV power was predicted at an hour ahead on yearly basis for three different PV plants based on ...
Muhammad Naveed Akhter   +7 more
semanticscholar   +1 more source

Machine learning approach for confirmation of COVID-19 cases: positive, negative, death and release

open access: yesIberoamerican Journal of Medicine, 2020
Introduction: Corona Virus Infectious Disease (COVID-19) is the infectious disease. The COVID-19 disease came to earth in early 2019. It is expanding exponentially throughout the world and affected an enormous number of human beings starting from the ...
Shawni Dutta, Samir Kumar Bandyopadhyay
doaj   +1 more source

Heartbeat Sound Signal Classification Using Deep Learning

open access: yesSensors, 2019
Presently, most deaths are caused by heart disease. To overcome this situation, heartbeat sound analysis is a convenient way to diagnose heart disease. Heartbeat sound classification is still a challenging problem in heart sound segmentation and feature ...
Ali Raza   +5 more
doaj   +1 more source

Design and Development of RNN-based Anomaly Detection Model for IoT Networks

open access: yesIEEE Access, 2022
Cybersecurity is important today because of the increasing growth of the Internet of Things (IoT), which has resulted in a variety of attacks on computer systems and networks.
I. Ullah, Q. Mahmoud
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy