Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (34)
  • Open Access

    ARTICLE

    Robust Interactive Method for Hand Gestures Recognition Using Machine Learning

    Amal Abdullah Mohammed Alteaimi1,*, Mohamed Tahar Ben Othman1,2

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 577-595, 2022, DOI:10.32604/cmc.2022.023591

    Abstract The Hand Gestures Recognition (HGR) System can be employed to facilitate communication between humans and computers instead of using special input and output devices. These devices may complicate communication with computers especially for people with disabilities. Hand gestures can be defined as a natural human-to-human communication method, which also can be used in human-computer interaction. Many researchers developed various techniques and methods that aimed to understand and recognize specific hand gestures by employing one or two machine learning algorithms with a reasonable accuracy. This work aims to develop a powerful hand gesture recognition model with a 100% recognition rate. We… More >

  • Open Access

    ARTICLE

    Strategy for Creating AR Applications in Static and Dynamic Environments Using SLAM- and Marker Detector-Based Tracking

    Chanho Park1,2, Hyunwoo Cho1, Sangheon Park1, Sung-Uk Jung1, Suwon Lee3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 529-549, 2022, DOI:10.32604/cmes.2022.019214

    Abstract Recently, simultaneous localization and mapping (SLAM) has received considerable attention in augmented reality (AR) libraries and applications. Although the assumption of scene rigidity is common in most visual SLAMs, this assumption limits the possibilities of AR applications in various real-world environments. In this paper, we propose a new tracking system that integrates SLAM with a marker detection module for real-time AR applications in static and dynamic environments. Because the proposed system assumes that the marker is movable, SLAM performs tracking and mapping of the static scene except for the marker, and the marker detector estimates the 3-dimensional pose of the… More >

  • Open Access

    ARTICLE

    ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector

    Tengfei Tu1,2, Wei Yin3, Hua Zhang1,2,*, Xingyu Zeng1, Xiaoxiang Deng1, Yuchen Zhou1, Xu Liu4

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2315-2331, 2022, DOI:10.32604/cmc.2022.022540

    Abstract The Internet Control Message Protocol (ICMP) covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission. Its concealment is stronger and it is not easy to be discovered. Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions. In this paper, we propose an ICMP covert tunnel attack intent detection framework ICMPTend, which includes five steps: data collection, feature dictionary construction, data preprocessing, model construction, and attack intent prediction. ICMPTend can detect a variety of attack intentions, such as shell attacks, sensitive directory access,… More >

  • Open Access

    ARTICLE

    GPS Vector Tracking Receivers with Rate Detector for Integrity Monitoring

    Dah-Jing Jwo*, Ming-Hsuan Lee

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2387-2403, 2021, DOI:10.32604/cmc.2021.018670

    Abstract In this paper, the integrity monitoring algorithm based on a Kalman filter (KF) based rate detector is employed in the vector tracking loop (VTL) of the Global Positioning System (GPS) receiver. In the VTL approach, the extended Kalman filter (EKF) simultaneously tracks the received signals and estimates the receiver’s position, velocity, etc. In contrast to the scalar tracking loop (STL) that uses the independent parallel tracking loop approach, the VTL technique uses the correlation of each satellite signal and user dynamics and thus reduces the risk of loss lock of signals. Although the VTL scheme provides several important advantages, the… More >

  • Open Access

    ARTICLE

    Small Object Detection via Precise Region-Based Fully Convolutional Networks

    Dengyong Zhang1,2, Jiawei Hu1,2, Feng Li1,2,*, Xiangling Ding3, Arun Kumar Sangaiah4, Victor S. Sheng5

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1503-1517, 2021, DOI:10.32604/cmc.2021.017089

    Abstract In the past several years, remarkable achievements have been made in the field of object detection. Although performance is generally improving, the accuracy of small object detection remains low compared with that of large object detection. In addition, localization misalignment issues are common for small objects, as seen in GoogLeNets and residual networks (ResNets). To address this problem, we propose an improved region-based fully convolutional network (R-FCN). The presented technique improves detection accuracy and eliminates localization misalignment by replacing position-sensitive region of interest (PS-RoI) pooling with position-sensitive precise region of interest (PS-Pr-RoI) pooling, which avoids coordinate quantization and directly calculates… More >

  • Open Access

    ARTICLE

    A Cuckoo Search Detector Generation-based Negative Selection Algorithm

    Ayodele Lasisi1,*, Ali M. Aseere2

    Computer Systems Science and Engineering, Vol.38, No.2, pp. 183-195, 2021, DOI:10.32604/csse.2021.015275

    Abstract The negative selection algorithm (NSA) is an adaptive technique inspired by how the biological immune system discriminates the self from non-self. It asserts itself as one of the most important algorithms of the artificial immune system. A key element of the NSA is its great dependency on the random detectors in monitoring for any abnormalities. However, these detectors have limited performance. Redundant detectors are generated, leading to difficulties for detectors to effectively occupy the non-self space. To alleviate this problem, we propose the nature-inspired metaheuristic cuckoo search (CS), a stochastic global search algorithm, which improves the random generation of detectors… More >

  • Open Access

    ARTICLE

    A Real-Time Integrated Face Mask Detector to Curtail Spread of Coronavirus

    Shilpa Sethi1, Mamta Kathuria1,*, Trilok Kaushik2

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.2, pp. 389-409, 2021, DOI:10.32604/cmes.2021.014478

    Abstract Effective strategies to control COVID-19 pandemic need high attention to mitigate negatively impacted communal health and global economy, with the brim-full horizon yet to unfold. In the absence of effective antiviral and limited medical resources, many measures are recommended by WHO to control the infection rate and avoid exhausting the limited medical resources. Wearing mask is among the non-pharmaceutical intervention measures that can be used as barrier to primary route of SARS-CoV2 droplets expelled by presymptomatic or asymptomatic individuals. Regardless of discourse on medical resources and diversities in masks, all countries are mandating coverings over nose and mouth in public… More >

  • Open Access

    ARTICLE

    YOLOv3 Attention Face Detector with High Accuracy and Efficiency

    Qiyuan Liu, Shuhua Lu*, Lingqiang Lan

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 283-295, 2021, DOI:10.32604/csse.2021.014086

    Abstract In recent years, face detection has attracted much attention and achieved great progress due to its extensively practical applications in the field of face based computer vision. However, the tradeoff between accuracy and efficiency of the face detectors still needs to be further studied. In this paper, using Darknet-53 as backbone, we propose an improved YOLOv3-attention model by introducing attention mechanism and data augmentation to obtain the robust face detector with high accuracy and efficiency. The attention mechanism is introduced to enhance much higher discrimination of the deep features, and the trick of data augmentation is used in the training… More >

  • Open Access

    ARTICLE

    Automated Meter Reading Detection Using Inception with Single Shot Multi-Box Detector

    Arif Iqbal*, Abdul Basit, Imran Ali, Junaid Babar, Ihsan Ullah

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 299-309, 2021, DOI:10.32604/iasc.2021.014250

    Abstract Automated meter reading has recently been adopted by utility service providers for improving the reading and billing process. Images captured during meter reading are incorporated in consumer bills to prevent reporting false reading and ensure transparency. The availability of images captured during the meter reading process presents the potential of completely automating the meter reading process. This paper proposes a convolutional network-based multi-box model for the automatic meter reading. The proposed research leverages the inception model with a single shot detector to achieve high accuracy and efficiency compared to the existing state-of-the-art machine learning methods. We tested the multi-box detector… More >

  • Open Access

    ARTICLE

    Design and Research of Intelligent Alcohol Detector Based on Single Chip Microcomputer

    Xiaokan Wang*, Qiong Wang

    Journal on Internet of Things, Vol.2, No.3, pp. 121-127, 2020, DOI:10.32604/jiot.2020.010200

    Abstract In order to prevent drunk driving timely and protect personal safety, a kind of vehicle-loaded alcohol concentration detector based on single chip microcomputer control is designed. The detector usesAT89C51 microcontroller as the core, makes use of the gas sensor, A/D converter to detect the alcohol concentration of the breath of the driver, can set different thresholds according to the space of the car model, automatically cut off the ignition circuit for the exceeded threshold, and has the sound and light alarm function, which fundamentally solve the problem of drunk driving. The instrument is compact in size, stable in performance, convenient… More >

Displaying 21-30 on page 3 of 34. Per Page