Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (139)
  • Open Access

    ARTICLE

    Iris Recognition Based on Multilevel Thresholding Technique and Modified Fuzzy c-Means Algorithm

    Slim Ben Chaabane1,2,*, Rafika Harrabi1,2, Anas Bushnag1, Hassene Seddik2

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 201-214, 2022, DOI:10.32604/jai.2022.032850

    Abstract Biometrics represents the technology for measuring the characteristics of the human body. Biometric authentication currently allows for secure, easy, and fast access by recognizing a person based on facial, voice, and fingerprint traits. Iris authentication is one of the essential biometric methods for identifying a person. This authentication type has become popular in research and practical applications. Unlike the face and hands, the iris is an internal organ, protected and therefore less likely to be damaged. However, the number of helpful information collected from the iris is much greater than the other biometric human organs. This work proposes a new… More >

  • Open Access

    ARTICLE

    A Fault Feature Extraction Model in Synchronous Generator under Stator Inter-Turn Short Circuit Based on ACMD and DEO3S

    Yuling He, Shuai Li, Chao Zhang*, Xiaolong Wang

    Structural Durability & Health Monitoring, Vol.17, No.2, pp. 115-130, 2023, DOI:10.32604/sdhm.2023.022317

    Abstract This paper proposed a new diagnosis model for the stator inter-turn short circuit fault in synchronous generators. Different from the past methods focused on the current or voltage signals to diagnose the electrical fault, the stator vibration signal analysis based on ACMD (adaptive chirp mode decomposition) and DEO3S (demodulation energy operator of symmetrical differencing) was adopted to extract the fault feature. Firstly, FT (Fourier transform) is applied to the vibration signal to obtain the instantaneous frequency, and PE (permutation entropy) is calculated to select the proper weighting coefficients. Then, the signal is decomposed by ACMD, with the instantaneous frequency and… More >

  • Open Access

    ARTICLE

    Strategy for Rapid Diabetic Retinopathy Exposure Based on Enhanced Feature Extraction Processing

    V. Banupriya1,*, S. Anusuya2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5597-5613, 2023, DOI:10.32604/cmc.2023.038696

    Abstract In the modern world, one of the most severe eye infections brought on by diabetes is known as diabetic retinopathy (DR), which will result in retinal damage, and, thus, lead to blindness. Diabetic retinopathy (DR) can be well treated with early diagnosis. Retinal fundus images of humans are used to screen for lesions in the retina. However, detecting DR in the early stages is challenging due to the minimal symptoms. Furthermore, the occurrence of diseases linked to vascular anomalies brought on by DR aids in diagnosing the condition. Nevertheless, the resources required for manually identifying the lesions are high. Similarly,… More >

  • Open Access

    ARTICLE

    Residual Feature Attentional Fusion Network for Lightweight Chest CT Image Super-Resolution

    Kun Yang1,2, Lei Zhao1, Xianghui Wang1, Mingyang Zhang1, Linyan Xue1,2, Shuang Liu1,2, Kun Liu1,2,3,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5159-5176, 2023, DOI:10.32604/cmc.2023.036401

    Abstract The diagnosis of COVID-19 requires chest computed tomography (CT). High-resolution CT images can provide more diagnostic information to help doctors better diagnose the disease, so it is of clinical importance to study super-resolution (SR) algorithms applied to CT images to improve the resolution of CT images. However, most of the existing SR algorithms are studied based on natural images, which are not suitable for medical images; and most of these algorithms improve the reconstruction quality by increasing the network depth, which is not suitable for machines with limited resources. To alleviate these issues, we propose a residual feature attentional fusion… More >

  • Open Access

    REVIEW

    A Survey on Artificial Intelligence in Posture Recognition

    Xiaoyan Jiang1,2, Zuojin Hu1, Shuihua Wang2, Yudong Zhang2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 35-82, 2023, DOI:10.32604/cmes.2023.027676

    Abstract Over the years, the continuous development of new technology has promoted research in the field of posture recognition and also made the application field of posture recognition have been greatly expanded. The purpose of this paper is to introduce the latest methods of posture recognition and review the various techniques and algorithms of posture recognition in recent years, such as scale-invariant feature transform, histogram of oriented gradients, support vector machine (SVM), Gaussian mixture model, dynamic time warping, hidden Markov model (HMM), lightweight network, convolutional neural network (CNN). We also investigate improved methods of CNN, such as stacked hourglass networks, multi-stage… More >

  • Open Access

    ARTICLE

    Automatic Sentimental Analysis by Firefly with Levy and Multilayer Perceptron

    D. Elangovan1,*, V. Subedha2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2797-2808, 2023, DOI:10.32604/csse.2023.031988

    Abstract The field of sentiment analysis (SA) has grown in tandem with the aid of social networking platforms to exchange opinions and ideas. Many people share their views and ideas around the world through social media like Facebook and Twitter. The goal of opinion mining, commonly referred to as sentiment analysis, is to categorise and forecast a target’s opinion. Depending on if they provide a positive or negative perspective on a given topic, text documents or sentences can be classified. When compared to sentiment analysis, text categorization may appear to be a simple process, but number of challenges have prompted numerous… More >

  • Open Access

    ARTICLE

    Automatic Extraction Method of Weld Weak Defect Features for Ultra-High Voltage Equipment

    Guanghua Zheng1,2, Chaolin Luo1,3, Mengen Shen1,*, Wanzhong Lv4, Wenbo Jiang4, Weibo Yang2

    Energy Engineering, Vol.120, No.4, pp. 985-1000, 2023, DOI:10.32604/ee.2023.024372

    Abstract To solve the problems of low precision of weak feature extraction, heavy reliance on labor and low efficiency of weak feature extraction in X-ray weld detection image of ultra-high voltage (UHV) equipment key parts, an automatic feature extraction algorithm is proposed. Firstly, the original weld image is denoised while retaining the characteristic information of weak defects by the proposed monostable stochastic resonance method. Then, binarization is achieved by combining Laplacian edge detection and Otsu threshold segmentation. Finally, the automatic identification of weld defect area is realized based on the sequential traversal of binary tree. Several characteristic analysis dimensions are established… More >

  • Open Access

    ARTICLE

    A General Linguistic Steganalysis Framework Using Multi-Task Learning

    Lingyun Xiang1,*, Rong Wang1, Yuhang Liu1, Yangfan Liu1, Lina Tan2,3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2383-2399, 2023, DOI:10.32604/csse.2023.037067

    Abstract Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts, by performing binary classification. While it remains an unsolved problem and poses a significant threat to the security of cyberspace when various categories of non-steganographic or steganographic texts coexist. In this paper, we propose a general linguistic steganalysis framework named LS-MTL, which introduces the idea of multi-task learning to deal with the classification of various categories of steganographic and non-steganographic texts. LS-MTL captures sensitive linguistic features from multiple related linguistic steganalysis tasks and can concurrently handle diverse tasks with a… More >

  • Open Access

    ARTICLE

    Improved Siamese Palmprint Authentication Using Pre-Trained VGG16-Palmprint and Element-Wise Absolute Difference

    Mohamed Ezz, Waad Alanazi, Ayman Mohamed Mostafa*, Eslam Hamouda, Murtada K. Elbashir, Meshrif Alruily

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2299-2317, 2023, DOI:10.32604/csse.2023.036567

    Abstract Palmprint identification has been conducted over the last two decades in many biometric systems. High-dimensional data with many uncorrelated and duplicated features remains difficult due to several computational complexity issues. This paper presents an interactive authentication approach based on deep learning and feature selection that supports Palmprint authentication. The proposed model has two stages of learning; the first stage is to transfer pre-trained VGG-16 of ImageNet to specific features based on the extraction model. The second stage involves the VGG-16 Palmprint feature extraction in the Siamese network to learn Palmprint similarity. The proposed model achieves robust and reliable end-to-end Palmprint… More >

  • Open Access

    ARTICLE

    Biometric Verification System Using Hyperparameter Tuned Deep Learning Model

    Mohammad Yamin1, Saleh Bajaba2, Sarah B. Basahel3, E. Laxmi Lydia4,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 321-336, 2023, DOI:10.32604/csse.2023.034849

    Abstract Deep learning (DL) models have been useful in many computer vision, speech recognition, and natural language processing tasks in recent years. These models seem a natural fit to handle the rising number of biometric recognition problems, from cellphone authentication to airport security systems. DL approaches have recently been utilized to improve the efficiency of various biometric recognition systems. Iris recognition was considered the more reliable and accurate biometric detection method accessible. Iris recognition has been an active research region in the last few decades due to its extensive applications, from security in airports to homeland security border control. This article… More >

Displaying 1-10 on page 1 of 139. Per Page  

Share Link