-
1
Flu-CNN: identifying host specificity of Influenza A virus using convolutional networks
Published 2025-08-01“…To address this, we proposed Flu-level Convolutional Neural Networks (Flu-CNN), a model designed to analyze genomic segments and identify IAV host specificity, with a particular focus on avian influenza viruses that could potentially infect humans. …”
Get full text
Article -
2
Convolution Smooth: A Post-Training Quantization Method for Convolutional Neural Networks
Published 2025-01-01“…Convolutional neural network (CNN) quantization is an efficient model compression technique primarily used for accelerating inference and optimizing resources. …”
Get full text
Article -
3
-
4
A Cascade of Encoder–Decoder with Atrous Convolution and Ensemble Deep Convolutional Neural Networks for Tuberculosis Detection
Published 2025-06-01“…Tuberculosis (TB) is the most serious worldwide infectious disease and the leading cause of death among people with HIV. …”
Get full text
Article -
5
Fine-art recognition using convolutional transformers
Published 2024-10-01“…Our study also highlighted the effectiveness of using convolutional transformers for learning image features.…”
Get full text
Article -
6
Computing nasalance with MFCCs and Convolutional Neural Networks.
Published 2024-01-01“…A new approach is proposed to compute nasalance using Convolutional Neural Networks (CNNs) trained with Mel-Frequency Cepstrum Coefficients (mfccNasalance). mfccNasalance is evaluated by examining its accuracy: 1) when the train and test data are from the same or from different dialects; 2) with test data that differs in dynamicity (e.g. rapidly produced diadochokinetic syllables versus short words); and 3) using multiple CNN configurations (i.e. kernel shape and use of 1 × 1 pointwise convolution). …”
Get full text
Article -
7
A Hybrid Model for Soybean Yield Prediction Integrating Convolutional Neural Networks, Recurrent Neural Networks, and Graph Convolutional Networks
Published 2024-12-01“…Soybean yield prediction is one of the most critical activities for increasing agricultural productivity and ensuring food security. …”
Get full text
Article -
8
Convolution Representation of Traveling Pulses in Reaction-Diffusion Systems
Published 2023-01-01“…The stability of the spatially homogeneous state and most unstable wave number are examined. The practical utilities of the convolution representation of reaction-diffusion systems are discussed.…”
Get full text
Article -
9
CNNFET: Convolutional neural network feature Extraction Tools
Published 2025-05-01“…Therefore, feature extraction is one of the most important topics in machine learning. Deep convolutional neural networks are able to catch distinguishing features that can represent images or other digital signals. …”
Get full text
Article -
10
Exploring Attributions in Convolutional Neural Networks for Cow Identification
Published 2025-03-01Get full text
Article -
11
Tailoring convolutional neural networks for custom botanical data
Published 2025-01-01“…Methods We address this gap with informed data collection and the development of a new convolutional neural network architecture, PhytNet. Utilising a novel dataset of infrared cocoa tree images, we demonstrate PhytNet's development and compare its performance with existing architectures. …”
Get full text
Article -
12
Quantized convolutional neural networks: a hardware perspective
Published 2025-07-01“…In this work, we focus on Convolutional Neural Network (CNN) as an example of DNNs and conduct a comprehensive survey on various quantization and quantized training methods. …”
Get full text
Article -
13
Automated Cough Analysis with Convolutional Recurrent Neural Network
Published 2024-11-01Get full text
Article -
14
Real-Time Super Resolution Utilizing Dilation and Depthwise Separable Convolution
Published 2025-04-01“…Therefore, we designed a new dilation depthwise super-resolution (DDSR) model that is composed of dilation convolution, depthwise separable convolution, and residual connection, to overcome the predicaments. …”
Get full text
Article -
15
Activation function cyclically switchable convolutional neural network model
Published 2025-03-01“…Therefore, selecting the most optimal AF for processing input data in neural networks is important. …”
Get full text
Article -
16
Predicting species distributions in the open ocean with convolutional neural networks
Published 2024-09-01“…In this study, we propose a new method that leverages deep learning, specifically convolutional neural networks (CNNs), to capture spatial features of environmental variables. …”
Get full text
Article -
17
Epileptic Seizure Prediction With Multi-View Convolutional Neural Networks
Published 2019-01-01“…To develop a model for seizure prediction, most studies relied on Electroencephalograms (EEGs) to capture physiological measurements of epilepsy. …”
Get full text
Article -
18
Detection of Southern Hemisphere Constellations Using Convolutional Neural Networks
Published 2025-01-01“…Constellations allow the identification of most stars and celestial objects visible in the night sky at a glance, without the use of a telescope. …”
Get full text
Article -
19
Accelerating Brain MR Imaging With Multisequence and Convolutional Neural Networks
Published 2024-11-01Get full text
Article -
20
Mining behavior pattern of mobile malware with convolutional neural network
Published 2020-12-01“…The features extracted by existing malicious Android application detection methods are redundant and too abstract to reflect the behavior patterns of malicious applications in high-level semantics.In order to solve this problem,an interpretable detection method was proposed.Suspicious system call combinations clustering by social network analysis was converted to a single channel image.Convolution neural network was applied to classify Android application.The model trained was used to find the most suspicious system call combinations by convolution layer gradient weight classification activation mapping algorithm,thus mining and understanding malicious application behavior.The experimental results show that the method can correctly discover the behavior patterns of malicious applications on the basis of efficient detection.…”
Get full text
Article