Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (608)
  • Open Access

    ARTICLE

    Lightweight Classroom Student Action Recognition Method Based on Spatiotemporal Multimodal Feature Fusion

    Shaodong Zou1, Di Wu1, Jianhou Gan1,2,*, Juxiang Zhou1,2, Jiatian Mei1,2

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1101-1116, 2025, DOI:10.32604/cmc.2025.061376 - 26 March 2025

    Abstract The task of student action recognition in the classroom is to precisely capture and analyze the actions of students in classroom videos, providing a foundation for realizing intelligent and accurate teaching. However, the complex nature of the classroom environment has added challenges and difficulties in the process of student action recognition. In this research article, with regard to the circumstances where students are prone to be occluded and classroom computing resources are restricted in real classroom scenarios, a lightweight multi-modal fusion action recognition approach is put forward. This proposed method is capable of enhancing the… More >

  • Open Access

    ARTICLE

    Skeleton-Based Action Recognition Using Graph Convolutional Network with Pose Correction and Channel Topology Refinement

    Yuxin Gao1, Xiaodong Duan2,3, Qiguo Dai2,3,*

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 701-718, 2025, DOI:10.32604/cmc.2025.060137 - 26 March 2025

    Abstract Graph convolutional network (GCN) as an essential tool in human action recognition tasks have achieved excellent performance in previous studies. However, most current skeleton-based action recognition using GCN methods use a shared topology, which cannot flexibly adapt to the diverse correlations between joints under different motion features. The video-shooting angle or the occlusion of the body parts may bring about errors when extracting the human pose coordinates with estimation algorithms. In this work, we propose a novel graph convolutional learning framework, called PCCTR-GCN, which integrates pose correction and channel topology refinement for skeleton-based human action… More >

  • Open Access

    ARTICLE

    xCViT: Improved Vision Transformer Network with Fusion of CNN and Xception for Skin Disease Recognition with Explainable AI

    Armughan Ali1,2, Hooria Shahbaz2, Robertas Damaševičius3,*

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1367-1398, 2025, DOI:10.32604/cmc.2025.059301 - 26 March 2025

    Abstract Skin cancer is the most prevalent cancer globally, primarily due to extensive exposure to Ultraviolet (UV) radiation. Early identification of skin cancer enhances the likelihood of effective treatment, as delays may lead to severe tumor advancement. This study proposes a novel hybrid deep learning strategy to address the complex issue of skin cancer diagnosis, with an architecture that integrates a Vision Transformer, a bespoke convolutional neural network (CNN), and an Xception module. They were evaluated using two benchmark datasets, HAM10000 and Skin Cancer ISIC. On the HAM10000, the model achieves a precision of 95.46%, an… More >

  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique

    Chin-Shiuh Shieh1, Thanh-Lam Nguyen1, Thanh-Tuan Nguyen2,*, Mong-Fong Horng1,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4881-4912, 2025, DOI:10.32604/cmc.2025.061001 - 06 March 2025

    Abstract DDoS attacks represent one of the most pervasive and evolving threats in cybersecurity, capable of crippling critical infrastructures and disrupting services globally. As networks continue to expand and threats become more sophisticated, there is an urgent need for Intrusion Detection Systems (IDS) capable of handling these challenges effectively. Traditional IDS models frequently have difficulties in detecting new or changing attack patterns since they heavily depend on existing characteristics. This paper presents a novel approach for detecting unknown Distributed Denial of Service (DDoS) attacks by integrating Sliced Iterative Normalizing Flows (SINF) into IDS. SINF utilizes the… More >

  • Open Access

    REVIEW

    A Comprehensive Review of Pill Image Recognition

    Linh Nguyen Thi My1,2,*, Viet-Tuan Le3, Tham Vo1, Vinh Truong Hoang3,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3693-3740, 2025, DOI:10.32604/cmc.2025.060793 - 06 March 2025

    Abstract Pill image recognition is an important field in computer vision. It has become a vital technology in healthcare and pharmaceuticals due to the necessity for precise medication identification to prevent errors and ensure patient safety. This survey examines the current state of pill image recognition, focusing on advancements, methodologies, and the challenges that remain unresolved. It provides a comprehensive overview of traditional image processing-based, machine learning-based, deep learning-based, and hybrid-based methods, and aims to explore the ongoing difficulties in the field. We summarize and classify the methods used in each article, compare the strengths and More >

  • Open Access

    REVIEW

    A Review of Joint Extraction Techniques for Relational Triples Based on NYT and WebNLG Datasets

    Chenglong Mi1, Huaibin Qin1,*, Quan Qi1, Pengxiang Zuo2

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3773-3796, 2025, DOI:10.32604/cmc.2024.059455 - 06 March 2025

    Abstract In recent years, with the rapid development of deep learning technology, relational triplet extraction techniques have also achieved groundbreaking progress. Traditional pipeline models have certain limitations due to error propagation. To overcome the limitations of traditional pipeline models, recent research has focused on jointly modeling the two key subtasks-named entity recognition and relation extraction-within a unified framework. To support future research, this paper provides a comprehensive review of recently published studies in the field of relational triplet extraction. The review examines commonly used public datasets for relational triplet extraction techniques and systematically reviews current mainstream… More >

  • Open Access

    ARTICLE

    Drone-Based Public Surveillance Using 3D Point Clouds and Neuro-Fuzzy Classifier

    Yawar Abbas1, Aisha Ahmed Alarfaj2, Ebtisam Abdullah Alabdulqader3, Asaad Algarni4, Ahmad Jalal1,5, Hui Liu6,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4759-4776, 2025, DOI:10.32604/cmc.2025.059224 - 06 March 2025

    Abstract Human Activity Recognition (HAR) in drone-captured videos has become popular because of the interest in various fields such as video surveillance, sports analysis, and human-robot interaction. However, recognizing actions from such videos poses the following challenges: variations of human motion, the complexity of backdrops, motion blurs, occlusions, and restricted camera angles. This research presents a human activity recognition system to address these challenges by working with drones’ red-green-blue (RGB) videos. The first step in the proposed system involves partitioning videos into frames and then using bilateral filtering to improve the quality of object foregrounds while… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Fingerprint Recognition via Federated Adaptive Domain Generalization

    Yonghang Yan1, Xin Xie1, Hengyi Ren2, Ying Cao1,*, Hongwei Chang3

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5035-5055, 2025, DOI:10.32604/cmc.2025.058276 - 06 March 2025

    Abstract Fingerprint features, as unique and stable biometric identifiers, are crucial for identity verification. However, traditional centralized methods of processing these sensitive data linked to personal identity pose significant privacy risks, potentially leading to user data leakage. Federated Learning allows multiple clients to collaboratively train and optimize models without sharing raw data, effectively addressing privacy and security concerns. However, variations in fingerprint data due to factors such as region, ethnicity, sensor quality, and environmental conditions result in significant heterogeneity across clients. This heterogeneity adversely impacts the generalization ability of the global model, limiting its performance across… More >

  • Open Access

    ARTICLE

    DIEONet: Domain-Invariant Information Extraction and Optimization Network for Visual Place Recognition

    Shaoqi Hou1,2,3,*, Zebang Qin2, Chenyu Wu2, Guangqiang Yin2, Xinzhong Wang1, Zhiguo Wang2,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5019-5033, 2025, DOI:10.32604/cmc.2025.058233 - 06 March 2025

    Abstract Visual Place Recognition (VPR) technology aims to use visual information to judge the location of agents, which plays an irreplaceable role in tasks such as loop closure detection and relocation. It is well known that previous VPR algorithms emphasize the extraction and integration of general image features, while ignoring the mining of salient features that play a key role in the discrimination of VPR tasks. To this end, this paper proposes a Domain-invariant Information Extraction and Optimization Network (DIEONet) for VPR. The core of the algorithm is a newly designed Domain-invariant Information Mining Module (DIMM)… More >

  • Open Access

    ARTICLE

    Practical Adversarial Attacks Imperceptible to Humans in Visual Recognition

    Donghyeok Park1, Sumin Yeon2, Hyeon Seo2, Seok-Jun Buu2, Suwon Lee2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2725-2737, 2025, DOI:10.32604/cmes.2025.061732 - 03 March 2025

    Abstract Recent research on adversarial attacks has primarily focused on white-box attack techniques, with limited exploration of black-box attack methods. Furthermore, in many black-box research scenarios, it is assumed that the output label and probability distribution can be observed without imposing any constraints on the number of attack attempts. Unfortunately, this disregard for the real-world practicality of attacks, particularly their potential for human detectability, has left a gap in the research landscape. Considering these limitations, our study focuses on using a similar color attack method, assuming access only to the output label, limiting the number of More >

Displaying 11-20 on page 2 of 608. Per Page