Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    Enhanced Deep Learning for Detecting Suspicious Fall Event in Video Data

    Madhuri Agrawal*, Shikha Agrawal

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2653-2667, 2023, DOI:10.32604/iasc.2023.033493 - 15 March 2023

    Abstract

    Suspicious fall events are particularly significant hazards for the safety of patients and elders. Recently, suspicious fall event detection has become a robust research case in real-time monitoring. This paper aims to detect suspicious fall events during video monitoring of multiple people in different moving backgrounds in an indoor environment; it is further proposed to use a deep learning method known as Long Short Term Memory (LSTM) by introducing visual attention-guided mechanism along with a bi-directional LSTM model. This method contributes essential information on the temporal and spatial locations of ‘suspicious fall’ events in learning the

    More >

  • Open Access

    ARTICLE

    Face Mask and Social Distance Monitoring via Computer Vision and Deployable System Architecture

    Meherab Mamun Ratul, Kazi Ayesha Rahman, Javeria Fazal, Naimur Rahman Abanto, Riasat Khan*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3641-3658, 2023, DOI:10.32604/iasc.2023.030638 - 17 August 2022

    Abstract The coronavirus (COVID-19) is a lethal virus causing a rapidly infectious disease throughout the globe. Spreading awareness, taking preventive measures, imposing strict restrictions on public gatherings, wearing facial masks, and maintaining safe social distancing have become crucial factors in keeping the virus at bay. Even though the world has spent a whole year preventing and curing the disease caused by the COVID-19 virus, the statistics show that the virus can cause an outbreak at any time on a large scale if thorough preventive measures are not maintained accordingly. To fight the spread of this virus,… More >

  • Open Access

    ARTICLE

    A Multi-Mode Public Transportation System Using Vehicular to Network Architecture

    Settawit Poochaya1,*, Peerapong Uthansakul1, Monthippa Uthansakul1, Patikorn Anchuen2, Kontorn Thammakul3, Arfat Ahmad Khan4, Niwat Punanwarakorn5, Pech Sirivoratum5, Aranya Kaewkrad5, Panrawee Kanpan5, Apichart Wantamee5

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5845-5862, 2022, DOI:10.32604/cmc.2022.031162 - 28 July 2022

    Abstract The number of accidents in the campus of Suranaree University of Technology (SUT) has increased due to increasing number of personal vehicles. In this paper, we focus on the development of public transportation system using Intelligent Transportation System (ITS) along with the limitation of personal vehicles using sharing economy model. The SUT Smart Transit is utilized as a major public transportation system, while MoreSai@SUT (electric motorcycle services) is a minor public transportation system in this work. They are called Multi-Mode Transportation system as a combination. Moreover, a Vehicle to Network (V2N) is used for developing… More >

  • Open Access

    ARTICLE

    Development of Mobile App to Support the Mobility of Visually Impaired People

    R. Meenakshi1, R. Ponnusamy1,*, Saleh Alghamdi2, Osama Ibrahim Khalaf3, Youseef Alotaibi4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3473-3495, 2022, DOI:10.32604/cmc.2022.028540 - 16 June 2022

    Abstract In 2017, it was estimated that the number of persons of all ages visually affected would be two hundred and eighty-five million, of which thirty-nine million are blind. There are several innovative technical solutions available to facilitate the movement of these people. The next big challenge for technical people is to give cost-effective solutions. One of the challenges for people with visual impairments is navigating safely, recognizing obstacles, and moving freely between locations in unfamiliar environments. A new mobile application solution is developed, and the application can be installed in android mobile. The application will More >

  • Open Access

    ARTICLE

    Identification and Classification of Crowd Activities

    Manar Elshahawy1, Ahmed O. Aseeri2,*, Shaker El-Sappagh3,4, Hassan Soliman1, Mohammed Elmogy1, Mervat Abu-Elkheir5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 815-832, 2022, DOI:10.32604/cmc.2022.023852 - 24 February 2022

    Abstract The identification and classification of collective people's activities are gaining momentum as significant themes in machine learning, with many potential applications emerging. The need for representation of collective human behavior is especially crucial in applications such as assessing security conditions and preventing crowd congestion. This paper investigates the capability of deep neural network (DNN) algorithms to achieve our carefully engineered pipeline for crowd analysis. It includes three principal stages that cover crowd analysis challenges. First, individual's detection is represented using the You Only Look Once (YOLO) model for human detection and Kalman filter for multiple… More >

  • Open Access

    ARTICLE

    Weapons Detection for Security and Video Surveillance Using CNN and YOLO-V5s

    Abdul Hanan Ashraf1, Muhammad Imran1, Abdulrahman M. Qahtani2,*, Abdulmajeed Alsufyani2, Omar Almutiry3, Awais Mahmood3, Muhammad Attique4, Mohamed Habib5,6

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2761-2775, 2022, DOI:10.32604/cmc.2022.018785 - 27 September 2021

    Abstract In recent years, the number of Gun-related incidents has crossed over 250,000 per year and over 85% of the existing 1 billion firearms are in civilian hands, manual monitoring has not proven effective in detecting firearms. which is why an automated weapon detection system is needed. Various automated convolutional neural networks (CNN) weapon detection systems have been proposed in the past to generate good results. However, These techniques have high computation overhead and are slow to provide real-time detection which is essential for the weapon detection system. These models have a high rate of false… More >

Displaying 1-10 on page 1 of 6. Per Page