Results for 'LSTM'

25 found
Order:
  1. Deepfake Detection Using LSTM and RESNEXT50.Nikhil Cilivery - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (8):1-15.
    As the prevalence of deepfake videos continues to escalate, there is an urgent need for robust and efficient detection methods to mitigate the potential consequences of misinformation and manipulation. This abstract explores the application of Long Short-Term Memory (LSTM) networks in the realm of deepfake video detection. LSTM, a type of recurrent neural network (RNN), has proven to be adept at capturing temporal dependencies in sequential data, making it a promising candidate for analysing the dynamic nature of videos. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  66
    Comparing LSTM, GRU, and CNN Approaches in Air Quality Prediction Models.A. Manoj Prabharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):576-585.
    The results show that the hybrid CNN-LSTM model outperforms the individual models in terms of prediction accuracy and robustness, suggesting that combining convolutional layers with recurrent units is beneficial for capturing both spatial and temporal patterns in air quality data. This study demonstrates the potential of deep learning methods to offer real-time, accurate air quality forecasting systems, which can aid policymakers and urban planners in managing air pollution more effectively.
    Download  
     
    Export citation  
     
    Bookmark  
  3.  16
    Predictive Stock Analytics: Unveiling Future Trends with LSTM.Rahul Sharma Prof Amit Tiwari, Siddharth Mourya, , Sanjay Gupta, Avantika Jadhav - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (7):12800-12810.
    In This project focuses on employing machine learning techniques to forecast future events by retaining data over time intervals. Right now, the main tools for this job are things like Recurrent Neural Networks (RNN), including different types like LSTM & GRU. Employing machine learning methods has demonstrated effectiveness in analyzing stock prices, one can enhance decision-making accuracy. The adoption of ML techniques for stock value forecasting has surged in recent times. This research aims to construct an artificially intelligent model (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Development of Keyword Trend Prediction Models for Obesity Before and After the COVID-19 Pandemic Using RNN and LSTM: Analyzing the News Big Data of South Korea.Gayeong Eom & Haewon Byeon - 2022 - Frontiers in Public Health 10:894266.
    The Korea National Health and Nutrition Examination Survey (2020) reported that the prevalence of obesity (≥19 years old) was 31.4% in 2011, but it increased to 33.8% in 2019 and 38.3% in 2020, which confirmed that it increased rapidly after the outbreak of COVID-19. Obesity increases not only the risk of infection with COVID-19 but also severity and fatality rate after being infected with COVID-19 compared to people with normal weight or underweight. Therefore, identifying the difference in potential factors for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. A DEEP LEARNING APPROACH FOR LSTM BASED COVID-19 FORECASTING SYSTEM.K. Jothimani - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):28-38.
    : COVID-19 has proliferated over the earth, exposing mankind at risk. The assets of the world's most powerful economies are at stake due to the disease's high infectivity and contagiousness. The capacity of machine learning algorithms can estimate the amount of future COVID-19 cases, which is now considered a possible threat to civilization. Five conventional measuring models, notably LR, LASSO, SVM, ES, and LSTM, were utilised in this work to examine COVID-19's undermining variables. Each model contains three sorts of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Encoder-Decoder Based Long Short-Term Memory (LSTM) Model for Video Captioning.Adewale Sikiru, Tosin Ige & Bolanle Matti Hafiz - forthcoming - Proceedings of the IEEE:1-6.
    This work demonstrates the implementation and use of an encoder-decoder model to perform a many-to-many mapping of video data to text captions. The many-to-many mapping occurs via an input temporal sequence of video frames to an output sequence of words to form a caption sentence. Data preprocessing, model construction, and model training are discussed. Caption correctness is evaluated using 2-gram BLEU scores across the different splits of the dataset. Specific examples of output captions were shown to demonstrate model generality over (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. Captioning Deep Learning Based Encoder-Decoder through Long Short-Term Memory (LSTM).Grimsby Chelsea - forthcoming - International Journal of Scientific Innovation.
    This work demonstrates the implementation and use of an encoder-decoder model to perform a many-to-many mapping of video data to text captions. The many-to-many mapping occurs via an input temporal sequence of video frames to an output sequence of words to form a caption sentence. Data preprocessing, model construction, and model training are discussed. Caption correctness is evaluated using 2-gram BLEU scores across the different splits of the dataset. Specific examples of output captions were shown to demonstrate model generality over (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. (1 other version)Deep Learning Based Video Captioning through Encoder-Decoder Based Long Short-Term Memory (LSTM).Grimsby Chelsea - forthcoming - International Journal of Advanced Computer Science and Applications:1-6.
    This work demonstrates the implementation and use of an encoder-decoder model to perform a many-to-many mapping of video data to text captions. The many-to-many mapping occurs via an input temporal sequence of video frames to an output sequence of words to form a caption sentence. Data preprocessing, model construction, and model training are discussed. Caption correctness is evaluated using 2-gram BLEU scores across the different splits of the dataset. Specific examples of output captions were shown to demonstrate model generality over (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  70
    Speech Emotion Detection_ System using Machine Learning (12th edition).Asma Shaikh Neev Mhatre, - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (11):12789-12793. Translated by Neev Mhatre.
    Speech Emotion Detection (SED) refers to the identification of human emotions based on speech signals. The goal of this research is to design and implement a system that can accurately classify emotions from speech using machine learning techniques. The system can be applied in various fields such as healthcare, customer service, human-computer interaction, and mental health monitoring. The paper discusses the various stages of building such a system, from collecting and preprocessing audio data to selecting machine learning models and evaluating (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  55
    Personal Reflection on the Progress of Implementing Real Time Data Analysis with Freqtrade Reinforcement Learner - Pre Meta-Logic.Eunjun Jeong & Gpt-4O Artificial Intelligence - 2023 - Side Project 1.
    LSTM has the advantage of handling inconsistent gradients, which was a typical problem found in conventional RNN by its cyclic rescan of the sequence to minimize the gradient errors. This is especially significant, that cryptocurrency has a highly volatile fluctuation of its market trend.
    Download  
     
    Export citation  
     
    Bookmark  
  11. Enhanced Image Captioning Using CNN and Transformers with Attention Mechanism.Ch Vasavi - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-12.
    Image captioning has seen remarkable advancements with the integration of deep learning techniques, notably Convolutional Neural Networks (CNNs) and Long Short-Term Memory (LSTM) networks, for generating descriptive captions for images. Despite these improvements, capturing intricate details and context remains a challenge. This project introduces an enhanced image captioning model that integrates transformers with an attention mechanism to address these limitations. By leveraging CNNs for feature extraction and LSTMs for sequence generation, while utilizing transformers to apply sophisticated attention to significant (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  35
    Strengthening Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-663.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze network (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  13. Bitcoin Price Prediction.Desai Nms - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-13.
    Bitcoin, as a decentralized digital currency, has undergone extreme price fluctuations over the years. Predicting its future price presents a significant challenge due to its volatile nature and susceptibility to various external factors, including market sentiment, regulations, and technological developments. This research aims to build an advanced forecasting model to predict Bitcoin’s price movements accurately. We leverage historical price data and apply cutting-edge machine learning techniques, including Long Short-Term Memory (LSTM) networks and Gradient Boosting Machines (GBM). By comparing these (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  69
    Forecasting and Scheduling of Railway Rakes using Machine Learning.A. Pranay - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (7):1-15.
    Efficient rake scheduling and demand forecasting in railway operations are essential to address the complexities of passenger demand, minimize delays, and enhance utilization. This project uses advanced machine learning methods, specifically LSTM (Long Short-Term Memory) networks and GBM (Gradient Boosting Machine), to predict demand and optimize rake scheduling dynamically. Integrating a user-friendly web interface allows realtime data monitoring, enabling railway operators to make informed decisions. By leveraging real-time data sources, including rake movement, schedules, weather, and traffic conditions, this project (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  69
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term Memory (LSTM) and Convolutional Neural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Dự báo chỉ số chứng khoán bằng học máy: Bằng chứng thực nghiệm từ thị trường chứng khoán Việt Nam.Đào Lê Kiều Oanh & Nguyễn Thị Minh Châu - 2024 - Kinh Tế Và Dự Báo.
    Nghiên cứu đánh giá hiệu quả của các mô hình học máy trong việc dự đoán biến động của chỉ số VNIndex. Kết quả nghiên cứu cho thấy, phương pháp mạng tích chập thời gian (Temporal Convolutional Networks - TCN) và mạng bộ nhớ dài ngắn (Long Short - Term Memory - LSTM) có khả năng dự báo biến động chỉ số VNIndex với độ chính xác cao, trong đó LSTM thể hiện có hiệu quả dự báo tốt (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  20
    Empirical Study on Stock Market Prediction using Machine Learning.Siddhesh Gajare Prof Pradeep Patil, Darshan Siddhpure, Sainath Narode, Chetan Warke - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (10):17594-17598.
    A : In the rapidly evolving financial markets, accurately predicting stock prices is crucial for investors seeking to optimize their portfolios and mitigate risks. This project leverages machine learning techniques to develop a predictive model for stock price forecasting. We utilize historical stock price data, along with relevant economic indicators and market sentiment, to construct a robust dataset. Key methodologies include time series analysis, regression models, and advanced machine learning algorithms, such as Long Short-Term Memory (LSTM) networks, which excel (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Folk Psychology, Eliminativism, and the Present State of Connectionism.Vanja Subotić - 2021 - Theoria: Beograd 1 (64):173-196.
    Three decades ago, William Ramsey, Steven Stich & Joseph Garon put forward an argument in favor of the following conditional: if connectionist models that implement parallelly distributed processing represent faithfully human cognitive processing, eliminativism about propositional attitudes is true. The corollary of their argument (if it proves to be sound) is that there is no place for folk psychology in contemporary cognitive science. This understanding of connectionism as a hypothesis about cognitive architecture compatible with eliminativism is also endorsed by Paul (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (LSTM) and Convolutional Neural Networks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  20
    Testing Platform Algorithm Using Machine Learning.Priya Singh Shivam Mishra, Rohan Mathur, Rohan Choudhary, Varun Madhav - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (2):988-995.
    This paper introduces a novel platform designed to utilize advanced machine learning techniques for assessing individuals' aptitude in source analysis. In today's economic landscape, the ability to accurately analyze stocks and make well-informed predictions is crucial for successful investments. The study centers on the development of an interactive platform that assesses users' investment forecasts by leveraging historical financial data and balance sheets of companies. Employing sophisticated machine learning algorithms, including Long Short-Term Memory (LSTM) and linear regression, the platform encourages (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  88
    Enhancing Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-664.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  82
    AI-Driven Air Quality Forecasting Using Multi-Scale Feature Extraction and Recurrent Neural Networks.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):575-590.
    We investigate the application of Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM) networks, and a hybrid CNN-LSTM model for forecasting air pollution levels based on historical data. Our experimental setup uses real-world air quality datasets from multiple regions, containing measurements of pollutants like PM2.5, PM10, CO, NO2, and SO2, alongside meteorological data such as temperature, humidity, and wind speed. The models are trained, validated, and tested using a split dataset, and their accuracy is evaluated using performance metrics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  69
    Evaluating Advanced Deep Learning Methods for Regional Air Quality Index Forecasting.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):600-620.
    We investigate the application of Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM) networks, and a hybrid CNN-LSTM model for forecasting air pollution levels based on historical data. Our experimental setup uses real-world air quality datasets from multiple regions, containing measurements of pollutants like PM2.5, PM10, CO, NO2, and SO2, alongside meteorological data such as temperature, humidity, and wind speed. The models are trained, validated, and tested using a split dataset, and their accuracy is evaluated using performance metrics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  50
    Deep Learning-Based Speech Emotion Recognition.Sharma Karan - 2022 - International Journal of Multidisciplinary and Scientific Emerging Research 10 (2):715-718.
    Speech Emotion Recognition (SER) is an essential component in human-computer interaction, enabling systems to understand and respond to human emotions. Traditional emotion recognition methods often rely on handcrafted features, which can be limited in capturing the full complexity of emotional cues. In contrast, deep learning approaches, particularly convolutional neural networks (CNNs), recurrent neural networks (RNNs), and long short-term memory (LSTM) networks, offer more robust solutions by automatically learning hierarchical features from raw audio data. This paper reviews recent advancements in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  81
    An investigation into the performances of the Current state-of-the-art Naive Bayes, Non-Bayesian and Deep Learning Based Classifier for Phishing Detection: A Survey. [REVIEW]Tosin Ige - manuscript
    Phishing is one of the most effective ways in which cybercriminals get sensitive details such as credentials for online banking, digital wallets, state secrets, and many more from potential victims. They do this by spamming users with malicious URLs with the sole purpose of tricking them into divulging sensitive information which is later used for various cybercrimes. In this research, we did a comprehensive review of current state-of-the-art machine learning and deep learning phishing detection techniques to expose their vulnerabilities and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation