Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (100)
  • Open Access

    ARTICLE

    Braille Character Segmentation Algorithm Based on Gaussian Diffusion

    Zezheng Meng, Zefeng Cai, Jie Feng*, Hanjie Ma, Haixiang Zhang, Shaohua Li

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1481-1496, 2024, DOI:10.32604/cmc.2024.048002

    Abstract Optical braille recognition methods typically employ existing target detection models or segmentation models for the direct detection and recognition of braille characters in original braille images. However, these methods need improvement in accuracy and generalizability, especially in densely dotted braille image environments. This paper presents a two-stage braille recognition framework. The first stage is a braille dot detection algorithm based on Gaussian diffusion, targeting Gaussian heatmaps generated by the convex dots in braille images. This is applied to the detection of convex dots in double-sided braille, achieving high accuracy in determining the central coordinates of the braille convex dots. The… More >

  • Open Access

    ARTICLE

    Detection of Student Engagement in E-Learning Environments Using EfficientnetV2-L Together with RNN-Based Models

    Farhad Mortezapour Shiri1,*, Ehsan Ahmadi2, Mohammadreza Rezaee1, Thinagaran Perumal1

    Journal on Artificial Intelligence, Vol.6, pp. 85-103, 2024, DOI:10.32604/jai.2024.048911

    Abstract Automatic detection of student engagement levels from videos, which is a spatio-temporal classification problem is crucial for enhancing the quality of online education. This paper addresses this challenge by proposing four novel hybrid end-to-end deep learning models designed for the automatic detection of student engagement levels in e-learning videos. The evaluation of these models utilizes the DAiSEE dataset, a public repository capturing student affective states in e-learning scenarios. The initial model integrates EfficientNetV2-L with Gated Recurrent Unit (GRU) and attains an accuracy of 61.45%. Subsequently, the second model combines EfficientNetV2-L with bidirectional GRU (Bi-GRU), yielding an accuracy of 61.56%. The… More >

  • Open Access

    ARTICLE

    Multi-Branch High-Dimensional Guided Transformer-Based 3D Human Posture Estimation

    Xianhua Li1,2,*, Haohao Yu1, Shuoyu Tian1, Fengtao Lin3, Usama Masood1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3551-3564, 2024, DOI:10.32604/cmc.2024.047336

    Abstract The human pose paradigm is estimated using a transformer-based multi-branch multidimensional directed the three-dimensional (3D) method that takes into account self-occlusion, badly posedness, and a lack of depth data in the per-frame 3D posture estimation from two-dimensional (2D) mapping to 3D mapping. Firstly, by examining the relationship between the movements of different bones in the human body, four virtual skeletons are proposed to enhance the cyclic constraints of limb joints. Then, multiple parameters describing the skeleton are fused and projected into a high-dimensional space. Utilizing a multi-branch network, motion features between bones and overall motion features are extracted to mitigate… More >

  • Open Access

    ARTICLE

    A Novel 6G Scalable Blockchain Clustering-Based Computer Vision Character Detection for Mobile Images

    Yuejie Li1,2,*, Shijun Li3

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3041-3070, 2024, DOI:10.32604/cmc.2023.045741

    Abstract 6G is envisioned as the next generation of wireless communication technology, promising unprecedented data speeds, ultra-low Latency, and ubiquitous Connectivity. In tandem with these advancements, blockchain technology is leveraged to enhance computer vision applications’ security, trustworthiness, and transparency. With the widespread use of mobile devices equipped with cameras, the ability to capture and recognize Chinese characters in natural scenes has become increasingly important. Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount, such as facial recognition or personal healthcare monitoring. Users can control their visual data and grant or revoke access as needed. Recognizing Chinese characters from images… More >

  • Open Access

    REVIEW

    Recent Advances on Deep Learning for Sign Language Recognition

    Yanqiong Zhang, Xianwei Jiang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2399-2450, 2024, DOI:10.32604/cmes.2023.045731

    Abstract Sign language, a visual-gestural language used by the deaf and hard-of-hearing community, plays a crucial role in facilitating communication and promoting inclusivity. Sign language recognition (SLR), the process of automatically recognizing and interpreting sign language gestures, has gained significant attention in recent years due to its potential to bridge the communication gap between the hearing impaired and the hearing world. The emergence and continuous development of deep learning techniques have provided inspiration and momentum for advancing SLR. This paper presents a comprehensive and up-to-date analysis of the advancements, challenges, and opportunities in deep learning-based sign language recognition, focusing on the… More >

  • Open Access

    ARTICLE

    Efficient Object Segmentation and Recognition Using Multi-Layer Perceptron Networks

    Aysha Naseer1, Nouf Abdullah Almujally2, Saud S. Alotaibi3, Abdulwahab Alazeb4, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1381-1398, 2024, DOI:10.32604/cmc.2023.042963

    Abstract Object segmentation and recognition is an imperative area of computer vision and machine learning that identifies and separates individual objects within an image or video and determines classes or categories based on their features. The proposed system presents a distinctive approach to object segmentation and recognition using Artificial Neural Networks (ANNs). The system takes RGB images as input and uses a k-means clustering-based segmentation technique to fragment the intended parts of the images into different regions and label them based on their characteristics. Then, two distinct kinds of features are obtained from the segmented images to help identify the objects… More >

  • Open Access

    ARTICLE

    Deep Learning Approach for Hand Gesture Recognition: Applications in Deaf Communication and Healthcare

    Khursheed Aurangzeb1, Khalid Javeed2, Musaed Alhussein1, Imad Rida3, Syed Irtaza Haider1, Anubha Parashar4,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 127-144, 2024, DOI:10.32604/cmc.2023.042886

    Abstract Hand gestures have been used as a significant mode of communication since the advent of human civilization. By facilitating human-computer interaction (HCI), hand gesture recognition (HGRoc) technology is crucial for seamless and error-free HCI. HGRoc technology is pivotal in healthcare and communication for the deaf community. Despite significant advancements in computer vision-based gesture recognition for language understanding, two considerable challenges persist in this field: (a) limited and common gestures are considered, (b) processing multiple channels of information across a network takes huge computational time during discriminative feature extraction. Therefore, a novel hand vision-based convolutional neural network (CNN) model named (HVCNNM)… More >

  • Open Access

    ARTICLE

    Early Detection of Colletotrichum Kahawae Disease in Coffee Cherry Based on Computer Vision Techniques

    Raveena Selvanarayanan1, Surendran Rajendran1,*, Youseef Alotaibi2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 759-782, 2024, DOI:10.32604/cmes.2023.044084

    Abstract Colletotrichum kahawae (Coffee Berry Disease) spreads through spores that can be carried by wind, rain, and insects affecting coffee plantations, and causes 80% yield losses and poor-quality coffee beans. The deadly disease is hard to control because wind, rain, and insects carry spores. Colombian researchers utilized a deep learning system to identify CBD in coffee cherries at three growth stages and classify photographs of infected and uninfected cherries with 93% accuracy using a random forest method. If the dataset is too small and noisy, the algorithm may not learn data patterns and generate accurate predictions. To overcome the existing challenge,… More >

  • Open Access

    REVIEW

    Exploring Deep Learning Methods for Computer Vision Applications across Multiple Sectors: Challenges and Future Trends

    Narayanan Ganesh1, Rajendran Shankar2, Miroslav Mahdal3, Janakiraman Senthil Murugan4, Jasgurpreet Singh Chohan5, Kanak Kalita6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 103-141, 2024, DOI:10.32604/cmes.2023.028018

    Abstract Computer vision (CV) was developed for computers and other systems to act or make recommendations based on visual inputs, such as digital photos, movies, and other media. Deep learning (DL) methods are more successful than other traditional machine learning (ML) methods in CV. DL techniques can produce state-of-the-art results for difficult CV problems like picture categorization, object detection, and face recognition. In this review, a structured discussion on the history, methods, and applications of DL methods to CV problems is presented. The sector-wise presentation of applications in this paper may be particularly useful for researchers in niche fields who have… More >

  • Open Access

    ARTICLE

    Fast and Accurate Detection of Masked Faces Using CNNs and LBPs

    Sarah M. Alhammad1, Doaa Sami Khafaga1,*, Aya Y. Hamed2, Osama El-Koumy3, Ehab R. Mohamed3, Khalid M. Hosny3

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2939-2952, 2023, DOI:10.32604/csse.2023.041011

    Abstract Face mask detection has several applications, including real-time surveillance, biometrics, etc. Identifying face masks is also helpful for crowd control and ensuring people wear them publicly. With monitoring personnel, it is impossible to ensure that people wear face masks; automated systems are a much superior option for face mask detection and monitoring. This paper introduces a simple and efficient approach for masked face detection. The architecture of the proposed approach is very straightforward; it combines deep learning and local binary patterns to extract features and classify them as masked or unmasked. The proposed system requires hardware with minimal power consumption… More >

Displaying 1-10 on page 1 of 100. Per Page