Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (42)
  • Open Access

    ARTICLE

    Visual News Ticker Surveillance Approach from Arabic Broadcast Streams

    Moeen Tayyab1, Ayyaz Hussain2,*, Usama Mir3, M. Aqeel Iqbal4, Muhammad Haneef5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6177-6193, 2023, DOI:10.32604/cmc.2023.034669

    Abstract The news ticker is a common feature of many different news networks that display headlines and other information. News ticker recognition applications are highly valuable in e-business and news surveillance for media regulatory authorities. In this paper, we focus on the automatic Arabic Ticker Recognition system for the Al-Ekhbariya news channel. The primary emphasis of this research is on ticker recognition methods and storage schemes. To that end, the research is aimed at character-wise explicit segmentation using a semantic segmentation technique and words identification method. The proposed learning architecture considers the grouping of homogeneous-shaped classes. This incorporates linguistic taxonomy in… More >

  • Open Access

    ARTICLE

    Using BlazePose on Spatial Temporal Graph Convolutional Networks for Action Recognition

    Motasem S. Alsawadi1,*, El-Sayed M. El-kenawy2,3, Miguel Rio1

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 19-36, 2023, DOI:10.32604/cmc.2023.032499

    Abstract The ever-growing available visual data (i.e., uploaded videos and pictures by internet users) has attracted the research community's attention in the computer vision field. Therefore, finding efficient solutions to extract knowledge from these sources is imperative. Recently, the BlazePose system has been released for skeleton extraction from images oriented to mobile devices. With this skeleton graph representation in place, a Spatial-Temporal Graph Convolutional Network can be implemented to predict the action. We hypothesize that just by changing the skeleton input data for a different set of joints that offers more information about the action of interest, it is possible to… More >

  • Open Access

    ARTICLE

    Combing Type-Aware Attention and Graph Convolutional Networks for Event Detection

    Kun Ding1, Lu Xu2, Ming Liu1, Xiaoxiong Zhang1, Liu Liu1, Daojian Zeng2,*, Yuting Liu1,3, Chen Jin4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 641-654, 2023, DOI:10.32604/cmc.2023.031052

    Abstract Event detection (ED) is aimed at detecting event occurrences and categorizing them. This task has been previously solved via recognition and classification of event triggers (ETs), which are defined as the phrase or word most clearly expressing event occurrence. Thus, current approaches require both annotated triggers as well as event types in training data. Nevertheless, triggers are non-essential in ED, and it is time-wasting for annotators to identify the “most clearly” word from a sentence, particularly in longer sentences. To decrease manual effort, we evaluate event detection without triggers. We propose a novel framework that combines Type-aware Attention and Graph… More >

  • Open Access

    ARTICLE

    Attack Behavior Extraction Based on Heterogeneous Cyberthreat Intelligence and Graph Convolutional Networks

    Binhui Tang1,3, Junfeng Wang2,*, Huanran Qiu3, Jian Yu2, Zhongkun Yu2, Shijia Liu2,4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 235-252, 2023, DOI:10.32604/cmc.2023.029135

    Abstract The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats (APT). Extracting attack behaviors, i.e., Tactics, Techniques, Procedures (TTP) from Cyber Threat Intelligence (CTI) can facilitate APT actors’ profiling for an immediate response. However, it is difficult for traditional manual methods to analyze attack behaviors from cyber threat intelligence due to its heterogeneous nature. Based on the Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) of threat behavior description, this paper proposes a threat behavioral knowledge extraction framework that integrates Heterogeneous Text Network (HTN) and Graph Convolutional Network (GCN) to solve this… More >

  • Open Access

    ARTICLE

    Image Inpainting Detection Based on High-Pass Filter Attention Network

    Can Xiao1,2, Feng Li1,2,*, Dengyong Zhang1,2, Pu Huang1,2, Xiangling Ding3, Victor S. Sheng4

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1145-1154, 2022, DOI:10.32604/csse.2022.027249

    Abstract Image inpainting based on deep learning has been greatly improved. The original purpose of image inpainting was to repair some broken photos, such as inpainting artifacts. However, it may also be used for malicious operations, such as destroying evidence. Therefore, detection and localization of image inpainting operations are essential. Recent research shows that high-pass filtering full convolutional network (HPFCN) is applied to image inpainting detection and achieves good results. However, those methods did not consider the spatial location and channel information of the feature map. To solve these shortcomings, we introduce the squeezed excitation blocks (SE) and propose a high-pass… More >

  • Open Access

    ARTICLE

    Research on Facial Expression Capture Based on Two-Stage Neural Network

    Zhenzhou Wang1, Shao Cui1, Xiang Wang1,*, JiaFeng Tian2

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4709-4725, 2022, DOI:10.32604/cmc.2022.027767

    Abstract To generate realistic three-dimensional animation of virtual character, capturing real facial expression is the primary task. Due to diverse facial expressions and complex background, facial landmarks recognized by existing strategies have the problem of deviations and low accuracy. Therefore, a method for facial expression capture based on two-stage neural network is proposed in this paper which takes advantage of improved multi-task cascaded convolutional networks (MTCNN) and high-resolution network. Firstly, the convolution operation of traditional MTCNN is improved. The face information in the input image is quickly filtered by feature fusion in the first stage and Octave Convolution instead of the… More >

  • Open Access

    ARTICLE

    Automated Crack Detection via Semantic Segmentation Approaches Using Advanced U-Net Architecture

    Honggeun Ji1,2, Jina Kim3, Syjung Hwang4, Eunil Park1,4,*

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 593-607, 2022, DOI:10.32604/iasc.2022.024405

    Abstract Cracks affect the robustness and adaptability of various infrastructures, including buildings, bridge piers, pavement, and pipelines. Therefore, the robustness and the reliability of automated crack detection are essential. In this study, we conducted image segmentation using various crack datasets by applying the advanced architecture of U-Net. First, we collected and integrated crack datasets from prior studies, including the cracks in buildings and pavements. For effective localization and detection of cracks, we used U-Net-based neural networks, ResU-Net, VGGU-Net, and EfficientU-Net. The models were evaluated by the five-fold cross-validation using several evaluation metrics including mean pixel accuracy (MPA), mean intersection over union… More >

  • Open Access

    ARTICLE

    Transferable Features from 1D-Convolutional Network for Industrial Malware Classification

    Liwei Wang1,2,3, Jiankun Sun1,2,3, Xiong Luo1,2,3,*, Xi Yang4

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.2, pp. 1003-1016, 2022, DOI:10.32604/cmes.2022.018492

    Abstract With the development of information technology, malware threats to the industrial system have become an emergent issue, since various industrial infrastructures have been deeply integrated into our modern works and lives. To identify and classify new malware variants, different types of deep learning models have been widely explored recently. Generally, sufficient data is usually required to achieve a well-trained deep learning classifier with satisfactory generalization ability. However, in current practical applications, an ample supply of data is absent in most specific industrial malware detection scenarios. Transfer learning as an effective approach can be used to alleviate the influence of the… More >

  • Open Access

    ARTICLE

    Fusion of Infrared and Visible Images Using Fuzzy Based Siamese Convolutional Network

    Kanika Bhalla1, Deepika Koundal2,*, Surbhi Bhatia3, Mohammad Khalid Imam Rahmani4, Muhammad Tahir4

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5503-5518, 2022, DOI:10.32604/cmc.2022.021125

    Abstract Traditional techniques based on image fusion are arduous in integrating complementary or heterogeneous infrared (IR)/visible (VS) images. Dissimilarities in various kind of features in these images are vital to preserve in the single fused image. Hence, simultaneous preservation of both the aspects at the same time is a challenging task. However, most of the existing methods utilize the manual extraction of features; and manual complicated designing of fusion rules resulted in a blurry artifact in the fused image. Therefore, this study has proposed a hybrid algorithm for the integration of multi-features among two heterogeneous images. Firstly, fuzzification of two IR/VS… More >

  • Open Access

    ARTICLE

    Malaria Parasite Detection Using a Quantum-Convolutional Network

    Javaria Amin1 , Muhammad Almas Anjum2 , Abida Sharif3 , Mudassar Raza4 , Seifedine Kadry5, Yunyoung Nam6,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6023-6039, 2022, DOI:10.32604/cmc.2022.019115

    Abstract

    Malaria is a severe illness triggered by parasites that spreads via mosquito bites. In underdeveloped nations, malaria is one of the top causes of mortality, and it is mainly diagnosed through microscopy. Computer-assisted malaria diagnosis is difficult owing to the fine-grained differences throughout the presentation of some uninfected and infected groups. Therefore, in this study, we present a new idea based on the ensemble quantum-classical framework for malaria classification. The methods comprise three core steps: localization, segmentation, and classification. In the first core step, an improved FRCNN model is proposed for the localization of the infected malaria cells. Then, the… More >

Displaying 21-30 on page 3 of 42. Per Page