Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    ARTICLE

    Video Summarization Approach Based on Binary Robust Invariant Scalable Keypoints and Bisecting K-Means

    Sameh Zarif1,2,*, Eman Morad1, Khalid Amin1, Abdullah Alharbi3, Wail S. Elkilani4, Shouze Tang5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3565-3583, 2024, DOI:10.32604/cmc.2024.046185

    Abstract Due to the exponential growth of video data, aided by rapid advancements in multimedia technologies. It became difficult for the user to obtain information from a large video series. The process of providing an abstract of the entire video that includes the most representative frames is known as static video summarization. This method resulted in rapid exploration, indexing, and retrieval of massive video libraries. We propose a framework for static video summary based on a Binary Robust Invariant Scalable Keypoint (BRISK) and bisecting K-means clustering algorithm. The current method effectively recognizes relevant frames using BRISK by extracting keypoints and the… More >

  • Open Access

    ARTICLE

    Lightweight Multi-Resolution Network for Human Pose Estimation

    Pengxin Li1, Rong Wang1,2,*, Wenjing Zhang1, Yinuo Liu1, Chenyue Xu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2239-2255, 2024, DOI:10.32604/cmes.2023.030677

    Abstract Human pose estimation aims to localize the body joints from image or video data. With the development of deep learning, pose estimation has become a hot research topic in the field of computer vision. In recent years, human pose estimation has achieved great success in multiple fields such as animation and sports. However, to obtain accurate positioning results, existing methods may suffer from large model sizes, a high number of parameters, and increased complexity, leading to high computing costs. In this paper, we propose a new lightweight feature encoder to construct a high-resolution network that reduces the number of parameters… More >

  • Open Access

    ARTICLE

    Copy Move Forgery Detection Using Novel Quadsort Moth Flame Light Gradient Boosting Machine

    R. Dhanya1,*, R. Kalaiselvi2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1577-1593, 2023, DOI:10.32604/csse.2023.031319

    Abstract A severe problem in modern information systems is Digital media tampering along with fake information. Even though there is an enhancement in image development, image forgery, either by the photographer or via image manipulations, is also done in parallel. Numerous researches have been concentrated on how to identify such manipulated media or information manually along with automatically; thus conquering the complicated forgery methodologies with effortlessly obtainable technologically enhanced instruments. However, high complexity affects the developed methods. Presently, it is complicated to resolve the issue of the speed-accuracy trade-off. For tackling these challenges, this article put forward a quick and effective… More >

  • Open Access

    ARTICLE

    Two-Fold and Symmetric Repeatability Rates for Comparing Keypoint Detectors

    Ibrahim El rube'*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6495-6511, 2022, DOI:10.32604/cmc.2022.031602

    Abstract The repeatability rate is an important measure for evaluating and comparing the performance of keypoint detectors. Several repeatability rate measurements were used in the literature to assess the effectiveness of keypoint detectors. While these repeatability rates are calculated for pairs of images, the general assumption is that the reference image is often known and unchanging compared to other images in the same dataset. So, these rates are asymmetrical as they require calculations in only one direction. In addition, the image domain in which these computations take place substantially affects their values. The presented scatter diagram plots illustrate how these directional… More >

  • Open Access

    ARTICLE

    Cluster Representation of the Structural Description of Images for Effective Classification

    Yousef Ibrahim Daradkeh1,*, Volodymyr Gorokhovatskyi2, Iryna Tvoroshenko2, Medien Zeghid3,4

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6069-6084, 2022, DOI:10.32604/cmc.2022.030254

    Abstract The problem of image recognition in the computer vision systems is being studied. The results of the development of efficient classification methods, given the figure of processing speed, based on the analysis of the segment representation of the structural description in the form of a set of descriptors are provided. We propose three versions of the classifier according to the following principles: “object–etalon”, “object descriptor–etalon” and “vector description of the object–etalon”, which are not similar in level of integration of researched data analysis. The options for constructing clusters over the whole set of descriptions of the etalon database, separately for… More >

  • Open Access

    ARTICLE

    Multi-Level Feature Aggregation-Based Joint Keypoint Detection and Description

    Jun Li1, Xiang Li1, Yifei Wei1,*, Mei Song1, Xiaojun Wang2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2529-2540, 2022, DOI:10.32604/cmc.2022.029542

    Abstract Image keypoint detection and description is a popular method to find pixel-level connections between images, which is a basic and critical step in many computer vision tasks. The existing methods are far from optimal in terms of keypoint positioning accuracy and generation of robust and discriminative descriptors. This paper proposes a new end-to-end self-supervised training deep learning network. The network uses a backbone feature encoder to extract multi-level feature maps, then performs joint image keypoint detection and description in a forward pass. On the one hand, in order to enhance the localization accuracy of keypoints and restore the local shape… More >

  • Open Access

    ARTICLE

    Skeleton Keypoints Extraction Method Combined with Object Detection

    Jiabao Shi1, Zhao Qiu1,*, Tao Chen1, Jiale Lin1, Hancheng Huang2, Yunlong He3, Yu Yang3

    Journal of New Media, Vol.4, No.2, pp. 97-106, 2022, DOI:10.32604/jnm.2022.027176

    Abstract Big data is a comprehensive result of the development of the Internet of Things and information systems. Computer vision requires a lot of data as the basis for research. Because skeleton data can adapt well to dynamic environment and complex background, it is used in action recognition tasks. In recent years, skeleton-based action recognition has received more and more attention in the field of computer vision. Therefore, the keypoints of human skeletons are essential for describing the pose estimation of human and predicting the action recognition of the human. This paper proposes a skeleton point extraction method combined with object… More >

  • Open Access

    ARTICLE

    Classification of Images Based on a System of Hierarchical Features

    Yousef Ibrahim Daradkeh1, Volodymyr Gorokhovatskyi2, Iryna Tvoroshenko2,*, Mujahed Al-Dhaifallah3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1785-1797, 2022, DOI:10.32604/cmc.2022.025499

    Abstract The results of the development of the new fast-speed method of classification images using a structural approach are presented. The method is based on the system of hierarchical features, based on the bitwise data distribution for the set of descriptors of image description. The article also proposes the use of the spatial data processing apparatus, which simplifies and accelerates the classification process. Experiments have shown that the time of calculation of the relevance for two descriptions according to their distributions is about 1000 times less than for the traditional voting procedure, for which the sets of descriptors are compared. The… More >

  • Open Access

    ARTICLE

    Keypoint Description Using Statistical Descriptor with Similarity-Invariant Regions

    Ibrahim El rube'*, Sameer Alsharif

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 407-421, 2022, DOI:10.32604/csse.2022.022400

    Abstract This article presents a method for the description of key points using simple statistics for regions controlled by neighboring key points to remedy the gap in existing descriptors. Usually, the existent descriptors such as speeded up robust features (SURF), Kaze, binary robust invariant scalable keypoints (BRISK), features from accelerated segment test (FAST), and oriented FAST and rotated BRIEF (ORB) can competently detect, describe, and match images in the presence of some artifacts such as blur, compression, and illumination. However, the performance and reliability of these descriptors decrease for some imaging variations such as point of view, zoom (scale), and rotation.… More >

Displaying 1-10 on page 1 of 9. Per Page