Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    YOLO-Based Damage Detection with StyleGAN3 Data Augmentation for Parcel Information-Recognition System

    Seolhee Kim1, Sang-Duck Lee2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 195-215, 2024, DOI:10.32604/cmc.2024.052070 - 18 July 2024

    Abstract Damage to parcels reduces customer satisfaction with delivery services and increases return-logistics costs. This can be prevented by detecting and addressing the damage before the parcels reach the customer. Consequently, various studies have been conducted on deep learning techniques related to the detection of parcel damage. This study proposes a deep learning-based damage detection method for various types of parcels. The method is intended to be part of a parcel information-recognition system that identifies the volume and shipping information of parcels, and determines whether they are damaged; this method is intended for use in the… More >

  • Open Access

    ARTICLE

    Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies

    Muhammad Ahmad Nawaz Ul Ghani1, Kun She1,*, Muhammad Arslan Rauf1, Shumaila Khan2, Javed Ali Khan3, Eman Abdullah Aldakheel4, Doaa Sami Khafaga4

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2609-2623, 2024, DOI:10.32604/cmc.2024.049611 - 15 May 2024

    Abstract The use of privacy-enhanced facial recognition has increased in response to growing concerns about data security and privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a variety of industries, including access control, law enforcement, surveillance, and internet communication. However, the growing usage of face recognition technology has created serious concerns about data monitoring and user privacy preferences, especially in context-aware systems. In response to these problems, this study provides a novel framework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain, and distributed computing… More >

  • Open Access

    ARTICLE

    Recognition System for Diagnosing Pneumonia and Bronchitis Using Children’s Breathing Sounds Based on Transfer Learning

    Jianying Shi1, Shengchao Chen1, Benguo Yu2, Yi Ren3,*, Guanjun Wang1,4,*, Chenyang Xue5

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3235-3258, 2023, DOI:10.32604/iasc.2023.041392 - 11 September 2023

    Abstract Respiratory infections in children increase the risk of fatal lung disease, making effective identification and analysis of breath sounds essential. However, most studies have focused on adults ignoring pediatric patients whose lungs are more vulnerable due to an imperfect immune system, and the scarcity of medical data has limited the development of deep learning methods toward reliability and high classification accuracy. In this work, we collected three types of breath sounds from children with normal (120 recordings), bronchitis (120 recordings), and pneumonia (120 recordings) at the posterior chest position using an off-the-shelf 3M electronic stethoscope.… More >

  • Open Access

    ARTICLE

    TC-Net: A Modest & Lightweight Emotion Recognition System Using Temporal Convolution Network

    Muhammad Ishaq1, Mustaqeem Khan1,2, Soonil Kwon1,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3355-3369, 2023, DOI:10.32604/csse.2023.037373 - 03 April 2023

    Abstract Speech signals play an essential role in communication and provide an efficient way to exchange information between humans and machines. Speech Emotion Recognition (SER) is one of the critical sources for human evaluation, which is applicable in many real-world applications such as healthcare, call centers, robotics, safety, and virtual reality. This work developed a novel TCN-based emotion recognition system using speech signals through a spatial-temporal convolution network to recognize the speaker’s emotional state. The authors designed a Temporal Convolutional Network (TCN) core block to recognize long-term dependencies in speech signals and then feed these temporal More >

  • Open Access

    ARTICLE

    An Efficient and Robust Hand Gesture Recognition System of Sign Language Employing Finetuned Inception-V3 and Efficientnet-B0 Network

    Adnan Hussain1, Sareer Ul Amin2, Muhammad Fayaz3, Sanghyun Seo4,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3509-3525, 2023, DOI:10.32604/csse.2023.037258 - 03 April 2023

    Abstract Hand Gesture Recognition (HGR) is a promising research area with an extensive range of applications, such as surgery, video game techniques, and sign language translation, where sign language is a complicated structured form of hand gestures. The fundamental building blocks of structured expressions in sign language are the arrangement of the fingers, the orientation of the hand, and the hand’s position concerning the body. The importance of HGR has increased due to the increasing number of touchless applications and the rapid growth of the hearing-impaired population. Therefore, real-time HGR is one of the most effective… More >

  • Open Access

    ARTICLE

    An Efficient Text Recognition System from Complex Color Image for Helping the Visually Impaired Persons

    Ahmed Ben Atitallah1,*, Mohamed Amin Ben Atitallah2,3, Yahia Said4,5, Mohammed Albekairi1, Anis Boudabous6, Turki M. Alanazi1, Khaled Kaaniche1, Mohamed Atri7

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 701-717, 2023, DOI:10.32604/csse.2023.035871 - 20 January 2023

    Abstract The challenge faced by the visually impaired persons in their day-to-day lives is to interpret text from documents. In this context, to help these people, the objective of this work is to develop an efficient text recognition system that allows the isolation, the extraction, and the recognition of text in the case of documents having a textured background, a degraded aspect of colors, and of poor quality, and to synthesize it into speech. This system basically consists of three algorithms: a text localization and detection algorithm based on mathematical morphology method (MMM); a text extraction… More >

  • Open Access

    ARTICLE

    Human-Computer Interaction Using Deep Fusion Model-Based Facial Expression Recognition System

    Saiyed Umer1,*, Ranjeet Kumar Rout2, Shailendra Tiwari3, Ahmad Ali AlZubi4, Jazem Mutared Alanazi4, Kulakov Yurii5

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1165-1185, 2023, DOI:10.32604/cmes.2022.023312 - 27 October 2022

    Abstract A deep fusion model is proposed for facial expression-based human-computer Interaction system. Initially, image preprocessing, i.e., the extraction of the facial region from the input image is utilized. Thereafter, the extraction of more discriminative and distinctive deep learning features is achieved using extracted facial regions. To prevent overfitting, in-depth features of facial images are extracted and assigned to the proposed convolutional neural network (CNN) models. Various CNN models are then trained. Finally, the performance of each CNN model is fused to obtain the final decision for the seven basic classes of facial expressions, i.e., fear, More >

  • Open Access

    ARTICLE

    Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem

    Lamiaa A. Abou Elazm1,2, Walid El-Shafai3,4, Sameh Ibrahim2, Mohamed G. Egila1, H. Shawkey1, Mohamed K. H. Elsaid2, Naglaa F. Soliman5, Hussah Nasser AlEisa6,*, Fathi E. Abd El-Samie3

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 929-955, 2023, DOI:10.32604/iasc.2023.031386 - 29 September 2022

    Abstract Biometric security is a growing trend, as it supports the authentication of persons using confidential biometric data. Most of the transmitted data in multimedia systems are susceptible to attacks, which affect the security of these systems. Biometric systems provide sufficient protection and privacy for users. The recently-introduced cancellable biometric recognition systems have not been investigated in the presence of different types of attacks. In addition, they have not been studied on different and large biometric datasets. Another point that deserves consideration is the hardware implementation of cancellable biometric recognition systems. This paper presents a suggested… More >

  • Open Access

    ARTICLE

    Deep Learning and SVM-Based Approach for Indian Licence Plate Character Recognition

    Nitin Sharma1, Mohd Anul Haq2, Pawan Kumar Dahiya3, B. R. Marwah4, Reema Lalit5, Nitin Mittal6, Ismail Keshta7,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 881-895, 2023, DOI:10.32604/cmc.2023.027899 - 22 September 2022

    Abstract Every developing country relies on transportation, and there has been an exponential expansion in the development of various sorts of vehicles with various configurations, which is a major component strengthening the automobile sector. India is a developing country with increasing road traffic, which has resulted in challenges such as increased road accidents and traffic oversight issues. In the lack of a parametric technique for accurate vehicle recognition, which is a major worry in terms of reliability, high traffic density also leads to mayhem at checkpoints and toll plazas. A system that combines an intelligent domain… More >

  • Open Access

    ARTICLE

    Masked Face Recognition Using MobileNet V2 with Transfer Learning

    Ratnesh Kumar Shukla1,*, Arvind Kumar Tiwari2

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 293-309, 2023, DOI:10.32604/csse.2023.027986 - 16 August 2022

    Abstract Corona virus (COVID-19) is once in a life time calamity that has resulted in thousands of deaths and security concerns. People are using face masks on a regular basis to protect themselves and to help reduce corona virus transmission. During the on-going coronavirus outbreak, one of the major priorities for researchers is to discover effective solution. As important parts of the face are obscured, face identification and verification becomes exceedingly difficult. The suggested method is a transfer learning using MobileNet V2 based technology that uses deep feature such as feature extraction and deep learning model,… More >

Displaying 1-10 on page 1 of 31. Per Page