Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (528)
  • Open Access

    ARTICLE

    Urdu Ligature Recognition System: An Evolutionary Approach

    Naila Habib Khan1,*, Awais Adnan1, Abdul Waheed2,3, Mahdi Zareei4, Abdallah Aldosary5, Ehab Mahmoud Mohamed6,7

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1347-1367, 2021, DOI:10.32604/cmc.2020.013715

    Abstract Cursive text recognition of Arabic script-based languages like Urdu is extremely complicated due to its diverse and complex characteristics. Evolutionary approaches like genetic algorithms have been used in the past for various optimization as well as pattern recognition tasks, reporting exceptional results. The proposed Urdu ligature recognition system uses a genetic algorithm for optimization and recognition. Overall the proposed recognition system observes the processes of pre-processing, segmentation, feature extraction, hierarchical clustering, classification rules and genetic algorithm optimization and recognition. The pre-processing stage removes noise from the sentence images, whereas, in segmentation, the sentences are segmented into ligature components. Fifteen features… More >

  • Open Access

    ARTICLE

    Intelligent Prediction Approach for Diabetic Retinopathy Using Deep Learning Based Convolutional Neural Networks Algorithm by Means of Retina Photographs

    G. Arun Sampaul Thomas1, Y. Harold Robinson2, E. Golden Julie3, Vimal Shanmuganathan4, Seungmin Rho5, Yunyoung Nam6,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1613-1629, 2021, DOI:10.32604/cmc.2020.013443

    Abstract Retinopathy is a human eye disease that causes changes in retinal blood vessels that leads to bleed, leak fluid and vision impairment. Symptoms of retinopathy are blurred vision, changes in color perception, red spots, and eye pain and it cannot be detected with a naked eye. In this paper, a new methodology based on Convolutional Neural Networks (CNN) is developed and proposed to intelligent retinopathy prediction and give a decision about the presence of retinopathy with automatic diabetic retinopathy screening with accurate diagnoses. The CNN model is trained by different images of eyes that have retinopathy and those which do… More >

  • Open Access

    ARTICLE

    Severity Recognition of Aloe vera Diseases Using AI in Tensor Flow Domain

    Nazeer Muhammad1, Rubab2, Nargis Bibi3, Oh-Young Song4, Muhammad Attique Khan5,*, Sajid Ali Khan6

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 2199-2216, 2021, DOI:10.32604/cmc.2020.012257

    Abstract Agriculture plays an important role in the economy of all countries. However, plant diseases may badly affect the quality of food, production, and ultimately the economy. For plant disease detection and management, agriculturalists spend a huge amount of money. However, the manual detection method of plant diseases is complicated and time-consuming. Consequently, automated systems for plant disease detection using machine learning (ML) approaches are proposed. However, most of the existing ML techniques of plants diseases recognition are based on handcrafted features and they rarely deal with huge amount of input data. To address the issue, this article proposes a fully… More >

  • Open Access

    ARTICLE

    Event Trigger Recognition Based on Positive and Negative Weight Computing and its Application

    Tao Liao1,‡, Weicheng Fu1,†, Shunxiang Zhang1,*, Zongtian Liu2,§

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 311-319, 2020, DOI:10.32604/csse.2020.35.311

    Abstract Event trigger recognition is a sub-task of event extraction, which is important for text classification, topic tracking and so on. In order to improve the effectiveness of using word features as a benchmark, a new event trigger recognition method based on positive and negative weight computing is proposed. Firstly, the associated word feature, the part-of-speech feature and the dependency feature are combined. Then, the combination of these three features with positive and negative weight computing is used to identify triggers. Finally, the text classification is carried out based on the event triggers. Findings from our experiments show that the application… More >

  • Open Access

    ARTICLE

    Image Recognition of Citrus Diseases Based on Deep Learning

    Zongshuai Liu1, Xuyu Xiang1,2,*, Jiaohua Qin1, Yun Tan1, Qin Zhang1, Neal N. Xiong3

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 457-466, 2021, DOI:10.32604/cmc.2020.012165

    Abstract In recent years, with the development of machine learning and deep learning, it is possible to identify and even control crop diseases by using electronic devices instead of manual observation. In this paper, an image recognition method of citrus diseases based on deep learning is proposed. We built a citrus image dataset including six common citrus diseases. The deep learning network is used to train and learn these images, which can effectively identify and classify crop diseases. In the experiment, we use MobileNetV2 model as the primary network and compare it with other network models in the aspect of speed,… More >

  • Open Access

    ARTICLE

    Adversarial Active Learning for Named Entity Recognition in Cybersecurity

    Tao Li1, Yongjin Hu1,*, Ankang Ju1, Zhuoran Hu2

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 407-420, 2021, DOI:10.32604/cmc.2020.012023

    Abstract Owing to the continuous barrage of cyber threats, there is a massive amount of cyber threat intelligence. However, a great deal of cyber threat intelligence come from textual sources. For analysis of cyber threat intelligence, many security analysts rely on cumbersome and time-consuming manual efforts. Cybersecurity knowledge graph plays a significant role in automatics analysis of cyber threat intelligence. As the foundation for constructing cybersecurity knowledge graph, named entity recognition (NER) is required for identifying critical threat-related elements from textual cyber threat intelligence. Recently, deep neural network-based models have attained very good results in NER. However, the performance of these… More >

  • Open Access

    ARTICLE

    Multi-Modality Video Representation for Action Recognition

    Chao Zhu1, Yike Wang1, Dongbing Pu1,Miao Qi1,*, Hui Sun2,*, Lei Tan3,*

    Journal on Big Data, Vol.2, No.3, pp. 95-104, 2020, DOI:10.32604/jbd.2020.010431

    Abstract Nowadays, action recognition is widely applied in many fields. However, action is hard to define by single modality information. The difference between image recognition and action recognition is that action recognition needs more modality information to depict one action, such as the appearance, the motion and the dynamic information. Due to the state of action evolves with the change of time, motion information must be considered when representing an action. Most of current methods define an action by spatial information and motion information. There are two key elements of current action recognition methods: spatial information achieved by sampling sparsely on… More >

  • Open Access

    ARTICLE

    Reducing Operational Time Complexity of k-NN Algorithms Using Clustering in Wrist-Activity Recognition

    Sun-Taag Choe, We-Duke Cho*, Jai-Hoon Kim, and Ki-Hyung Kim

    Intelligent Automation & Soft Computing, Vol.26, No.4, pp. 679-691, 2020, DOI:10.32604/iasc.2020.010102

    Abstract Recent research on activity recognition in wearable devices has identified a key challenge: k-nearest neighbors (k-NN) algorithms have a high operational time complexity. Thus, these algorithms are difficult to utilize in embedded wearable devices. Herein, we propose a method for reducing this complexity. We apply a clustering algorithm for learning data and assign labels to each cluster according to the maximum likelihood. Experimental results show that the proposed method achieves effective operational levels for implementation in embedded devices; however, the accuracy is slightly lower than that of a traditional k-NN algorithm. Additionally, our method provides the advantage of controlling the… More >

  • Open Access

    ARTICLE

    A Multi-View Gait Recognition Method Using Deep Convolutional Neural Network and Channel Attention Mechanism

    Jiabin Wang*, Kai Peng

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 345-363, 2020, DOI:10.32604/cmes.2020.011046

    Abstract In many existing multi-view gait recognition methods based on images or video sequences, gait sequences are usually used to superimpose and synthesize images and construct energy-like template. However, information may be lost during the process of compositing image and capture EMG signals. Errors and the recognition accuracy may be introduced and affected respectively by some factors such as period detection. To better solve the problems, a multi-view gait recognition method using deep convolutional neural network and channel attention mechanism is proposed. Firstly, the sliding time window method is used to capture EMG signals. Then, the back-propagation learning algorithm is used… More >

  • Open Access

    ARTICLE

    A Novel System for Recognizing Recording Devices from Recorded Speech Signals

    Yongqiang Bao1, *, Qi Shao1, Xuxu Zhang1, Jiahui Jiang1, Yue Xie1, Tingting Liu1, Weiye Xu2

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2557-2570, 2020, DOI:10.32604/cmc.2020.011241

    Abstract The field of digital audio forensics aims to detect threats and fraud in audio signals. Contemporary audio forensic techniques use digital signal processing to detect the authenticity of recorded speech, recognize speakers, and recognize recording devices. User-generated audio recordings from mobile phones are very helpful in a number of forensic applications. This article proposed a novel method for recognizing recording devices based on recorded audio signals. First, a database of the features of various recording devices was constructed using 32 recording devices (20 mobile phones of different brands and 12 kinds of recording pens) in various environments. Second, the audio… More >

Displaying 451-460 on page 46 of 528. Per Page