Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (221)
  • Open Access

    ARTICLE

    Deep Learning Approach for Hand Gesture Recognition: Applications in Deaf Communication and Healthcare

    Khursheed Aurangzeb1, Khalid Javeed2, Musaed Alhussein1, Imad Rida3, Syed Irtaza Haider1, Anubha Parashar4,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 127-144, 2024, DOI:10.32604/cmc.2023.042886

    Abstract Hand gestures have been used as a significant mode of communication since the advent of human civilization. By facilitating human-computer interaction (HCI), hand gesture recognition (HGRoc) technology is crucial for seamless and error-free HCI. HGRoc technology is pivotal in healthcare and communication for the deaf community. Despite significant advancements in computer vision-based gesture recognition for language understanding, two considerable challenges persist in this field: (a) limited and common gestures are considered, (b) processing multiple channels of information across a network takes huge computational time during discriminative feature extraction. Therefore, a novel hand vision-based convolutional neural network (CNN) model named (HVCNNM)… More >

  • Open Access

    ARTICLE

    Weber Law Based Approach for Multi-Class Image Forgery Detection

    Arslan Akram1,3, Javed Rashid2,3,4, Arfan Jaffar1, Fahima Hajjej5, Waseem Iqbal6, Nadeem Sarwar7,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 145-166, 2024, DOI:10.32604/cmc.2023.041074

    Abstract Today’s forensic science introduces a new research area for digital image analysis for multimedia security. So, Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegitimate benefit or create misleading publicity by using tempered images. Exiting forgery detection methods can classify only one of the most widely used Copy-Move and splicing forgeries. However, an image can contain one or more types of forgeries. This study has proposed a hybrid method for classifying Copy-Move and splicing images using texture information of images in the spatial domain. Firstly, images are divided into equal… More >

  • Open Access

    ARTICLE

    A Subdivision-Based Combined Shape and Topology Optimization in Acoustics

    Chuang Lu1, Leilei Chen2,3, Jinling Luo4, Haibo Chen1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 847-872, 2024, DOI:10.32604/cmes.2023.044446

    Abstract We propose a combined shape and topology optimization approach in this research for 3D acoustics by using the isogeometric boundary element method with subdivision surfaces. The existing structural optimization methods mainly contain shape and topology schemes, with the former changing the surface geometric profile of the structure and the latter changing the material distribution topology or hole topology of the structure. In the present acoustic performance optimization, the coordinates of the control points in the subdivision surfaces fine mesh are selected as the shape design parameters of the structure, the artificial density of the sound absorbing material covered on the… More >

  • Open Access

    ARTICLE

    Early Detection of Colletotrichum Kahawae Disease in Coffee Cherry Based on Computer Vision Techniques

    Raveena Selvanarayanan1, Surendran Rajendran1,*, Youseef Alotaibi2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 759-782, 2024, DOI:10.32604/cmes.2023.044084

    Abstract Colletotrichum kahawae (Coffee Berry Disease) spreads through spores that can be carried by wind, rain, and insects affecting coffee plantations, and causes 80% yield losses and poor-quality coffee beans. The deadly disease is hard to control because wind, rain, and insects carry spores. Colombian researchers utilized a deep learning system to identify CBD in coffee cherries at three growth stages and classify photographs of infected and uninfected cherries with 93% accuracy using a random forest method. If the dataset is too small and noisy, the algorithm may not learn data patterns and generate accurate predictions. To overcome the existing challenge,… More >

  • Open Access

    REVIEW

    Exploring Deep Learning Methods for Computer Vision Applications across Multiple Sectors: Challenges and Future Trends

    Narayanan Ganesh1, Rajendran Shankar2, Miroslav Mahdal3, Janakiraman Senthil Murugan4, Jasgurpreet Singh Chohan5, Kanak Kalita6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 103-141, 2024, DOI:10.32604/cmes.2023.028018

    Abstract Computer vision (CV) was developed for computers and other systems to act or make recommendations based on visual inputs, such as digital photos, movies, and other media. Deep learning (DL) methods are more successful than other traditional machine learning (ML) methods in CV. DL techniques can produce state-of-the-art results for difficult CV problems like picture categorization, object detection, and face recognition. In this review, a structured discussion on the history, methods, and applications of DL methods to CV problems is presented. The sector-wise presentation of applications in this paper may be particularly useful for researchers in niche fields who have… More >

  • Open Access

    ARTICLE

    Fast and Accurate Detection of Masked Faces Using CNNs and LBPs

    Sarah M. Alhammad1, Doaa Sami Khafaga1,*, Aya Y. Hamed2, Osama El-Koumy3, Ehab R. Mohamed3, Khalid M. Hosny3

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2939-2952, 2023, DOI:10.32604/csse.2023.041011

    Abstract Face mask detection has several applications, including real-time surveillance, biometrics, etc. Identifying face masks is also helpful for crowd control and ensuring people wear them publicly. With monitoring personnel, it is impossible to ensure that people wear face masks; automated systems are a much superior option for face mask detection and monitoring. This paper introduces a simple and efficient approach for masked face detection. The architecture of the proposed approach is very straightforward; it combines deep learning and local binary patterns to extract features and classify them as masked or unmasked. The proposed system requires hardware with minimal power consumption… More >

  • Open Access

    ARTICLE

    Liver Tumor Segmentation Based on Multi-Scale and Self-Attention Mechanism

    Fufang Li, Manlin Luo*, Ming Hu, Guobin Wang, Yan Chen

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2835-2850, 2023, DOI:10.32604/csse.2023.039765

    Abstract Liver cancer has the second highest incidence rate among all types of malignant tumors, and currently, its diagnosis heavily depends on doctors’ manual labeling of CT scan images, a process that is time-consuming and susceptible to subjective errors. To address the aforementioned issues, we propose an automatic segmentation model for liver and tumors called Res2Swin Unet, which is based on the Unet architecture. The model combines Attention-Res2 and Swin Transformer modules for liver and tumor segmentation, respectively. Attention-Res2 merges multiple feature map parts with an Attention gate via skip connections, while Swin Transformer captures long-range dependencies and models the input… More >

  • Open Access

    ARTICLE

    AnimeNet: A Deep Learning Approach for Detecting Violence and Eroticism in Animated Content

    Yixin Tang*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 867-891, 2023, DOI:10.32604/cmc.2023.041550

    Abstract Cartoons serve as significant sources of entertainment for children and adolescents. However, numerous animated videos contain unsuitable content, such as violence, eroticism, abuse, and vehicular accidents. Current content detection methods rely on manual inspection, which is resource-intensive, time-consuming, and not always reliable. Therefore, more efficient detection methods are necessary to safeguard young viewers. This paper addresses this significant problem by proposing a novel deep learning-based system, AnimeNet, designed to detect varying degrees of violent and erotic content in videos. AnimeNet utilizes a novel Convolutional Neural Network (CNN) model to extract image features effectively, classifying violent and erotic scenes in videos… More >

  • Open Access

    ARTICLE

    SmokerViT: A Transformer-Based Method for Smoker Recognition

    Ali Khan1,4, Somaiya Khan2, Bilal Hassan3, Rizwan Khan1,4, Zhonglong Zheng1,4,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 403-424, 2023, DOI:10.32604/cmc.2023.040251

    Abstract Smoking has an economic and environmental impact on society due to the toxic substances it emits. Convolutional Neural Networks (CNNs) need help describing low-level features and can miss important information. Moreover, accurate smoker detection is vital with minimum false alarms. To answer the issue, the researchers of this paper have turned to a self-attention mechanism inspired by the ViT, which has displayed state-of-the-art performance in the classification task. To effectively enforce the smoking prohibition in non-smoking locations, this work presents a Vision Transformer-inspired model called SmokerViT for detecting smokers. Moreover, this research utilizes a locally curated dataset of 1120 images… More >

  • Open Access

    ARTICLE

    Intelligent Traffic Surveillance through Multi-Label Semantic Segmentation and Filter-Based Tracking

    Asifa Mehmood Qureshi1, Nouf Abdullah Almujally2, Saud S. Alotaibi3, Mohammed Hamad Alatiyyah4, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3707-3725, 2023, DOI:10.32604/cmc.2023.040738

    Abstract Road congestion, air pollution, and accident rates have all increased as a result of rising traffic density and worldwide population growth. Over the past ten years, the total number of automobiles has increased significantly over the world. In this paper, a novel method for intelligent traffic surveillance is presented. The proposed model is based on multilabel semantic segmentation using a random forest classifier which classifies the images into five classes. To improve the results, mean-shift clustering was applied to the segmented images. Afterward, the pixels given the label for the vehicle were extracted and blob detection was applied to mark… More >

Displaying 21-30 on page 3 of 221. Per Page