期刊文献+
共找到58篇文章
< 1 2 3 >
每页显示 20 50 100
Empirical Analysis of Software Success Rate Forecasting During Requirement Engineering Processes 被引量:1
1
作者 Muhammad Hasnain Imran Ghani +3 位作者 Seung Ryul Jeong Muhammad Fermi Pasha Sardar Usman Anjum Abbas 《Computers, Materials & Continua》 SCIE EI 2023年第1期783-799,共17页
Forecasting on success or failure of software has become an interesting and,in fact,an essential task in the software development industry.In order to explore the latest data on successes and failures,this research fo... Forecasting on success or failure of software has become an interesting and,in fact,an essential task in the software development industry.In order to explore the latest data on successes and failures,this research focused on certain questions such as is early phase of the software development life cycle better than later phases in predicting software success and avoiding high rework?What human factors contribute to success or failure of a software?What software practices are used by the industry practitioners to achieve high quality of software in their day-to-day work?In order to conduct this empirical analysis a total of 104 practitioners were recruited to determine how human factors,misinterpretation,and miscommunication of requirements and decision-making processes play their roles in software success forecasting.We discussed a potential relationship between forecasting of software success or failure and the development processes.We noticed that experienced participants had more confidence in their practices and responded to the questionnaire in this empirical study,and they were more likely to rate software success forecasting linking to the development processes.Our analysis also shows that cognitive bias is the central human factor that negatively affects forecasting of software success rate.The results of this empirical study also validated that requirements’misinterpretation and miscommunication were themain causes behind software systems’failure.It has been seen that reliable,relevant,and trustworthy sources of information help in decision-making to predict software systems’success in the software industry.This empirical study highlights a need for other software practitioners to avoid such bias while working on software projects.Future investigation can be performed to identify the other human factors that may impact software systems’success. 展开更多
关键词 Cognitive bias misinterpretation of requirements miscommunication software success and failure prediction decision making
下载PDF
Identification and Visualization of Spatial and Temporal Trends in Textile Industry
2
作者 Umair Yousaf Muhammad Asif +6 位作者 Shahbaz Ahmed Noman Tahir Azeem Irshad Akber Abid Gardezi Muhammad Shafiq Jin-Ghoo Choi Habib Hamam 《Computers, Materials & Continua》 SCIE EI 2023年第2期4165-4181,共17页
The research volume increases at the study rate,causing massive text corpora.Due to these enormous text corpora,we are drowning in data and starving for information.Therefore,recent research employed different text mi... The research volume increases at the study rate,causing massive text corpora.Due to these enormous text corpora,we are drowning in data and starving for information.Therefore,recent research employed different text mining approaches to extract information from this text corpus.These proposed approaches extract meaningful and precise phrases that effectively describe the text’s information.These extracted phrases are commonly termed keyphrases.Further,these key phrases are employed to determine the different fields of study trends.Moreover,these key phrases can also be used to determine the spatiotemporal trends in the various research fields.In this research,the progress of a research field can be better revealed through spatiotemporal bibliographic trend analysis.Therefore,an effective spatiotemporal trend extraction mechanism is required to disclose textile research trends of particular regions during a specific period.This study collected a diversified dataset of textile research from 2011–2019 and different countries to determine the research trend.This data was collected from various open access journals.Further,this research determined the spatiotemporal trends using quality phrasemining.This research also focused on finding the research collaboration of different countries in a particular research subject.The research collaborations of other countries’researchers show the impact on import and export of those countries.The visualization approach is also incorporated to understand the results better. 展开更多
关键词 Text mining spatiotemporal trend research collaboration
下载PDF
Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine
3
作者 Arslan Akram Imran Khan +4 位作者 Javed Rashid Mubbashar Saddique Muhammad Idrees Yazeed Yasin Ghadi Abdulmohsen Algarni 《Computers, Materials & Continua》 SCIE EI 2024年第1期1311-1328,共18页
Algorithms for steganography are methods of hiding data transfers in media files.Several machine learning architectures have been presented recently to improve stego image identification performance by using spatial i... Algorithms for steganography are methods of hiding data transfers in media files.Several machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image analysis.Images with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for classification.To address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of images.Support Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or cover.The Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the proposedmethod.Using WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods. 展开更多
关键词 CURVELETS fast fourier transformation support vector machine high pass filters STEGANOGRAPHY
下载PDF
A New Fuzzing Technique for Software Vulnerability Mining Using Multi-dimension Inputs 被引量:4
4
作者 Xueyong Zhu Zhiyong Wu J. William Atwood 《通讯和计算机(中英文版)》 2011年第2期88-95,共8页
关键词 输入输出 技术 模糊化 挖掘 维度 软件 测试用例 目标函数
下载PDF
Comprehensive Study on the Basis of Eye Blink, Suggesting Length of Text Line, Considering Typographical Variables the Way How to Improve Reading from Computer Screen
5
作者 Muzammil Khan Khushdil   《Advances in Internet of Things》 2013年第1期9-20,共12页
The advent and extensive use of computer and increasing development of different technologies it is important to increase the awareness of issues related to the electronic text or text presentation on computer screen.... The advent and extensive use of computer and increasing development of different technologies it is important to increase the awareness of issues related to the electronic text or text presentation on computer screen. The usage of web shows the importance of usability and readability of the web applications or sources provide by the web and web textual contents. Web application fails to encounter the user’s requirements in effective manner specially related to textual information, because the designers are unaware from some of the important factors effecting readability, reading from the screen. In this regard, this study is the continuation of the previous work that has been done for the improvement of readability, to handle the readability issues on the basis of Eye Blink for male participants and female participants. To achieve general recommendations for suitable or optimum length of text line for all type of users on the bases of eye blink. Basically during reading from the computer screen focus losses at two positions, when eye blink in the middle of text line and when text line ends. The study specifies suitable length of text line on the basis of Eye Blink, assuming three typographical variables i.e. font style, font color, font size, and with white background, which improve the overall readability or reading from computer screen. The study also shows two important things the degree of understandability and the degree of attractive appearance of different combination. 展开更多
关键词 Readability TEXT LINE LENGTH UNDERSTANDABILITY Appearance Eye Blink Typographical Variable READING from SCREEN
下载PDF
Improved Video Steganography with Dual Cover Medium,DNA and Complex Frames
6
作者 Asma Sajjad Humaira Ashraf +3 位作者 NZ Jhanjhi Mamoona Humayun Mehedi Masud Mohammed A.AlZain 《Computers, Materials & Continua》 SCIE EI 2023年第2期3881-3898,共18页
The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive... The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive information securely,researchers are combining robust cryptography and steganographic approaches.The objective of this research is to introduce a more secure method of video steganography by using Deoxyribonucleic acid(DNA)for embedding encrypted data and an intelligent frame selection algorithm to improve video imperceptibility.In the previous approach,DNA was used only for frame selection.If this DNA is compromised,then our frames with the hidden and unencrypted data will be exposed.Moreover the frame selected in this way were random frames,and no consideration was made to the contents of frames.Hiding data in this way introduces visible artifacts in video.In the proposed approach rather than using DNA for frame selection we have created a fakeDNA out of our data and then embedded it in a video file on intelligently selected frames called the complex frames.Using chaotic maps and linear congruential generators,a unique pixel set is selected each time only from the identified complex frames,and encrypted data is embedded in these random locations.Experimental results demonstrate that the proposed technique shows minimum degradation of the stenographic video hence reducing the very first chances of visual surveillance.Further,the selection of complex frames for embedding and creation of a fake DNA as proposed in this research have higher peak signal-to-noise ratio(PSNR)and reduced mean squared error(MSE)values that indicate improved results.The proposed methodology has been implemented in Matlab. 展开更多
关键词 Video steganography data encryption DNA embedding frame selection
下载PDF
Privacy Computing: Concept, Computing Framework, and Future Development Trends 被引量:21
7
作者 Fenghua Li Hui Li +1 位作者 Ben Niu Jinjun Chen 《Engineering》 SCIE EI 2019年第6期1179-1192,共14页
With the rapid development of information technology and the continuous evolution of personalized ser- vices, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover,... With the rapid development of information technology and the continuous evolution of personalized ser- vices, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover, dynamic data interactions increase the intentional/unintentional persistence of private infor- mation in different information systems. However, problems such as the cask principle of preserving pri- vate information among different information systems and the dif culty of tracing the source of privacy violations are becoming increasingly serious. Therefore, existing privacy-preserving schemes cannot pro- vide systematic privacy preservation. In this paper, we examine the links of the information life-cycle, such as information collection, storage, processing, distribution, and destruction. We then propose a the- ory of privacy computing and a key technology system that includes a privacy computing framework, a formal de nition of privacy computing, four principles that should be followed in privacy computing, ffect algorithm design criteria, evaluation of the privacy-preserving effect, and a privacy computing language. Finally, we employ four application scenarios to describe the universal application of privacy computing, and discuss the prospect of future research trends. This work is expected to guide theoretical research on user privacy preservation within open environments. 展开更多
关键词 Privacy computing Private information description Privacy metric Evaluation of the privacy-preserving effect Privacy computing language
下载PDF
Dynamic Hand Gesture Recognition Based on Short-Term Sampling Neural Networks 被引量:7
8
作者 Wenjin Zhang Jiacun Wang Fangping Lan 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第1期110-120,共11页
Hand gestures are a natural way for human-robot interaction.Vision based dynamic hand gesture recognition has become a hot research topic due to its various applications.This paper presents a novel deep learning netwo... Hand gestures are a natural way for human-robot interaction.Vision based dynamic hand gesture recognition has become a hot research topic due to its various applications.This paper presents a novel deep learning network for hand gesture recognition.The network integrates several well-proved modules together to learn both short-term and long-term features from video inputs and meanwhile avoid intensive computation.To learn short-term features,each video input is segmented into a fixed number of frame groups.A frame is randomly selected from each group and represented as an RGB image as well as an optical flow snapshot.These two entities are fused and fed into a convolutional neural network(Conv Net)for feature extraction.The Conv Nets for all groups share parameters.To learn longterm features,outputs from all Conv Nets are fed into a long short-term memory(LSTM)network,by which a final classification result is predicted.The new model has been tested with two popular hand gesture datasets,namely the Jester dataset and Nvidia dataset.Comparing with other models,our model produced very competitive results.The robustness of the new model has also been proved with an augmented dataset with enhanced diversity of hand gestures. 展开更多
关键词 Convolutional neural network(ConvNet) hand gesture recognition long short-term memory(LSTM)network short-term sampling transfer learning
下载PDF
Human Pose Estimation and Object Interaction for Sports Behaviour 被引量:1
9
作者 Ayesha Arif Yazeed Yasin Ghadi +3 位作者 Mohammed Alarfaj Ahmad Jalal Shaharyar Kamal Dong-Seong Kim 《Computers, Materials & Continua》 SCIE EI 2022年第7期1-18,共18页
In the new era of technology,daily human activities are becoming more challenging in terms of monitoring complex scenes and backgrounds.To understand the scenes and activities from human life logs,human-object interac... In the new era of technology,daily human activities are becoming more challenging in terms of monitoring complex scenes and backgrounds.To understand the scenes and activities from human life logs,human-object interaction(HOI)is important in terms of visual relationship detection and human pose estimation.Activities understanding and interaction recognition between human and object along with the pose estimation and interaction modeling have been explained.Some existing algorithms and feature extraction procedures are complicated including accurate detection of rare human postures,occluded regions,and unsatisfactory detection of objects,especially small-sized objects.The existing HOI detection techniques are instancecentric(object-based)where interaction is predicted between all the pairs.Such estimation depends on appearance features and spatial information.Therefore,we propose a novel approach to demonstrate that the appearance features alone are not sufficient to predict the HOI.Furthermore,we detect the human body parts by using the Gaussian Matric Model(GMM)followed by object detection using YOLO.We predict the interaction points which directly classify the interaction and pair them with densely predicted HOI vectors by using the interaction algorithm.The interactions are linked with the human and object to predict the actions.The experiments have been performed on two benchmark HOI datasets demonstrating the proposed approach. 展开更多
关键词 Human object interaction human pose estimation object detection sports estimation sports prediction
下载PDF
Automated Facial Expression Recognition and Age Estimation Using Deep Learning 被引量:1
10
作者 Syeda Amna Rizwan Yazeed Yasin Ghadi +1 位作者 Ahmad Jalal Kibum Kim 《Computers, Materials & Continua》 SCIE EI 2022年第6期5235-5252,共18页
With the advancement of computer vision techniques in surveillance systems,the need for more proficient,intelligent,and sustainable facial expressions and age recognition is necessary.The main purpose of this study is... With the advancement of computer vision techniques in surveillance systems,the need for more proficient,intelligent,and sustainable facial expressions and age recognition is necessary.The main purpose of this study is to develop accurate facial expressions and an age recognition system that is capable of error-free recognition of human expression and age in both indoor and outdoor environments.The proposed system first takes an input image pre-process it and then detects faces in the entire image.After that landmarks localization helps in the formation of synthetic face mask prediction.A novel set of features are extracted and passed to a classifier for the accurate classification of expressions and age group.The proposed system is tested over two benchmark datasets,namely,the Gallagher collection person dataset and the Images of Groups dataset.The system achieved remarkable results over these benchmark datasets about recognition accuracy and computational time.The proposed system would also be applicable in different consumer application domains such as online business negotiations,consumer behavior analysis,E-learning environments,and emotion robotics. 展开更多
关键词 Feature extraction face expression model local transform features and recurrent neural network(RNN)
下载PDF
CNN Based Multi-Object Segmentation and Feature Fusion for Scene Recognition 被引量:1
11
作者 Adnan Ahmed Rafique Yazeed Yasin Ghadi +3 位作者 Suliman AAlsuhibany Samia Allaoua Chelloug Ahmad Jalal Jeongmin Park 《Computers, Materials & Continua》 SCIE EI 2022年第12期4657-4675,共19页
Latest advancements in vision technology offer an evident impact on multi-object recognition and scene understanding.Such sceneunderstanding task is a demanding part of several technologies,like augmented reality-base... Latest advancements in vision technology offer an evident impact on multi-object recognition and scene understanding.Such sceneunderstanding task is a demanding part of several technologies,like augmented reality-based scene integration,robotic navigation,autonomous driving,and tourist guide.Incorporating visual information in contextually unified segments,convolution neural networks-based approaches will significantly mitigate the clutter,which is usual in classical frameworks during scene understanding.In this paper,we propose a convolutional neural network(CNN)based segmentation method for the recognition of multiple objects in an image.Initially,after acquisition and preprocessing,the image is segmented by using CNN.Then,CNN features are extracted from these segmented objects,and discrete cosine transform(DCT)and discrete wavelet transform(DWT)features are computed.After the extraction of CNN features and computation of classical machine learning features,fusion is performed using a fusion technique.Then,to select theminimal set of features,genetic algorithm-based feature selection is used.In order to recognize and understand the multi-objects in the scene,a neuro-fuzzy approach is applied.Once objects in the scene are recognized,the relationship between these objects is examined by employing the object-to-object relation approach.Finally,a decision tree is incorporated to assign the relevant labels to the scenes based on recognized objects in the image.The experimental results over complex scene datasets including SUN Red Green Blue-Depth(RGB-D)and Cityscapes’demonstrated a remarkable performance. 展开更多
关键词 Convolutional neural network decision tree feature fusion neurofuzzy system
下载PDF
3D Head Pose Estimation through Facial Features and Deep Convolutional Neural Networks 被引量:1
12
作者 Khalil Khan Jehad Ali +6 位作者 Kashif Ahmad Asma Gul Ghulam Sarwar Sahib Khan Qui Thanh Hoai Ta Tae-Sun Chung Muhammad Attique 《Computers, Materials & Continua》 SCIE EI 2021年第2期1757-1770,共14页
Face image analysis is one among several important cues in computer vision.Over the last five decades,methods for face analysis have received immense attention due to large scale applications in various face analysis ... Face image analysis is one among several important cues in computer vision.Over the last five decades,methods for face analysis have received immense attention due to large scale applications in various face analysis tasks.Face parsing strongly benefits various human face image analysis tasks inducing face pose estimation.In this paper we propose a 3D head pose estimation framework developed through a prior end to end deep face parsing model.We have developed an end to end face parts segmentation framework through deep convolutional neural networks(DCNNs).For training a deep face parts parsing model,we label face images for seven different classes,including eyes,brows,nose,hair,mouth,skin,and back.We extract features from gray scale images by using DCNNs.We train a classifier using the extracted features.We use the probabilistic classification method to produce gray scale images in the form of probability maps for each dense semantic class.We use a next stage of DCNNs and extract features from grayscale images created as probability maps during the segmentation phase.We assess the performance of our newly proposed model on four standard head pose datasets,including Pointing’04,Annotated Facial Landmarks in the Wild(AFLW),Boston University(BU),and ICT-3DHP,obtaining superior results as compared to previous results. 展开更多
关键词 Face image analysis face parsing face pose estimation
下载PDF
An empirical study of DSRC V2V performance in truck platooning scenarios 被引量:5
13
作者 Song Gao Alvin Lim David Bevly 《Digital Communications and Networks》 SCIE 2016年第4期233-244,共12页
下载PDF
Smart Security Framework for Educational Institutions Using Internet of Things(IoT)
14
作者 Afzal Badshah Anwar Ghani +1 位作者 Muhammad Ahsan Qureshi Shahaboddin Shamshirband 《Computers, Materials & Continua》 SCIE EI 2019年第7期81-101,共21页
Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a ... Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a secure environment to the educational institutions is a challenging task.This effort is motivated by recent assaults,made at Army Public School Peshawar,following another attack at Charsada University,Khyber Pukhtun Khwa,Pakistan and also the Santa Fe High School Texas,USA massacre.This study uses the basic technologies of edge computing,cloud computing and IoT to design a smart emergency alarm system framework.IoT is engaged in developing this world smarter,can contribute significantly to design the Smart Security Framework(SSF)for educational institutions.In the emergency situation,all the command and control centres must be informed within seconds to halt or minimize the loss.In this article,the SSF is proposed.This framework works on three layers.The first layer is the sensors and smart devices layer.All these sensors and smart devices are connected to the Emergency Control Room(ECR),which is the second layer of the proposed framework.The second layer uses edge computing technologies to process massive data and information locally.The third layer uses cloud computing techniques to transmit and process data and information to different command and control centres.The proposed system was tested on Cisco Packet Tracer 7.The result shows that this approach can play an efficient role in security alert,not only in the educational institutions but also in other organizations too. 展开更多
关键词 Internet of things smart security framework massacres TERRORISM smart emergency alert
下载PDF
Body Worn Sensors for Health Gaming and e-Learning in Virtual Reality
15
作者 Mir Mushhood Afsar Shizza Saqib +3 位作者 Yazeed Yasin Ghadi Suliman A.Alsuhibany Ahmad Jalal Jeongmin Park 《Computers, Materials & Continua》 SCIE EI 2022年第12期4763-4777,共15页
Virtual reality is an emerging field in the whole world.The problem faced by people today is that they are more indulged in indoor technology rather than outdoor activities.Hence,the proposed system introduces a fitne... Virtual reality is an emerging field in the whole world.The problem faced by people today is that they are more indulged in indoor technology rather than outdoor activities.Hence,the proposed system introduces a fitness solution connecting virtual reality with a gaming interface so that an individual can play first-person games.The system proposed in this paper is an efficient and cost-effective solution that can entertain people along with playing outdoor games such as badminton and cricket while sitting in the room.To track the human movement,sensors Micro Processor Unit(MPU6050)are used that are connected with Bluetoothmodules andArduino responsible for sending the sensor data to the game.Further,the sensor data is sent to a machine learning model,which detects the game played by the user.The detected game will be operated on human gestures.A publicly available dataset named IM-Sporting Behaviors is initially used,which utilizes triaxial accelerometers attached to the subject’s wrist,knee,and below neck regions to capture important aspects of human motion.The main objective is that the person is enjoying while playing the game and simultaneously is engaged in some kind of sporting activity.The proposed system uses artificial neural networks classifier giving an accuracy of 88.9%.The proposed system should apply to many systems such as construction,education,offices and the educational sector.Extensive experimentation proved the validity of the proposed system. 展开更多
关键词 Artificial neural networks bluetooth connection inertial sensors machine learning virtual reality exergaming
下载PDF
A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos
16
作者 Muhammad Islam Kamran Muazzam A.Khan +4 位作者 Suliman A.Alsuhibany Yazeed Yasin Ghadi Arshad Jameel Arif Jawad Ahmad 《Computers, Materials & Continua》 SCIE EI 2022年第10期657-672,共16页
The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th generation(4G)and 5th generation(5G)etc.Research... The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th generation(4G)and 5th generation(5G)etc.Researchers have proposed many image encryption algorithms based on the classical random walk and chaos theory for sharing an image in a secure way.Instead of the classical random walk,this paper proposes the quantum walk to achieve high image security.Classical random walk exhibits randomness due to the stochastic transitions between states,on the other hand,the quantum walk is more random and achieve randomness due to the superposition,and the interference of the wave functions.The proposed image encryption scheme is evaluated using extensive security metrics such as correlation coefficient,entropy,histogram,time complexity,number of pixels change rate and unified average intensity etc.All experimental results validate the proposed scheme,and it is concluded that the proposed scheme is highly secured,lightweight and computationally efficient.In the proposed scheme,the values of the correlation coefficient,entropy,mean square error(MSE),number of pixels change rate(NPCR),unified average change intensity(UACI)and contrast are 0.0069,7.9970,40.39,99.60%,33.47 and 10.4542 respectively. 展开更多
关键词 CRYPTOGRAPHY chaotic maps logistic map quantum walk SECURITY
下载PDF
Cloud Computing Solution and Services for RFID Based Supply Chain Management
17
作者 S. M. Khalid Jamal A. Omer Asiya Abdus Salam Qureshi 《Advances in Internet of Things》 2013年第4期79-85,共7页
Deploying and Implementing RFID Systems for tracking and controlling products in supply chain management is not affordable for small and midsized companies due to its complexity, cost, and difficulties pertaining data... Deploying and Implementing RFID Systems for tracking and controlling products in supply chain management is not affordable for small and midsized companies due to its complexity, cost, and difficulties pertaining data management and maintenance. Cloud computing can be used to mitigate the risks associated with the implementation and deployment of RFID based on system in supply chain management because the complex system for data filtering, management and maintenance can be implemented on the cloud that otherwise requires the purchase of new hardware, staff and professional services. 展开更多
关键词 Cloud COMPUTING RFID Tags READERS BARCODES
下载PDF
Home Automation-Based Health Assessment Along Gesture Recognition via Inertial Sensors
18
作者 Hammad Rustam Muhammad Muneeb +4 位作者 Suliman A.Alsuhibany Yazeed Yasin Ghadi Tamara Al Shloul Ahmad Jalal Jeongmin Park 《Computers, Materials & Continua》 SCIE EI 2023年第4期2331-2346,共16页
Hand gesture recognition (HGR) is used in a numerous applications,including medical health-care, industrial purpose and sports detection.We have developed a real-time hand gesture recognition system using inertialsens... Hand gesture recognition (HGR) is used in a numerous applications,including medical health-care, industrial purpose and sports detection.We have developed a real-time hand gesture recognition system using inertialsensors for the smart home application. Developing such a model facilitatesthe medical health field (elders or disabled ones). Home automation has alsobeen proven to be a tremendous benefit for the elderly and disabled. Residentsare admitted to smart homes for comfort, luxury, improved quality of life,and protection against intrusion and burglars. This paper proposes a novelsystem that uses principal component analysis, linear discrimination analysisfeature extraction, and random forest as a classifier to improveHGRaccuracy.We have achieved an accuracy of 94% over the publicly benchmarked HGRdataset. The proposed system can be used to detect hand gestures in thehealthcare industry as well as in the industrial and educational sectors. 展开更多
关键词 Genetic algorithm human locomotion activity recognition human–computer interaction human gestures recognition principal hand gestures recognition inertial sensors principal component analysis linear discriminant analysis stochastic neighbor embedding
下载PDF
Visual News Ticker Surveillance Approach from Arabic Broadcast Streams
19
作者 Moeen Tayyab Ayyaz Hussain +2 位作者 Usama Mir M.Aqeel Iqbal Muhammad Haneef 《Computers, Materials & Continua》 SCIE EI 2023年第3期6177-6193,共17页
The news ticker is a common feature of many different news networks that display headlines and other information.News ticker recognition applications are highly valuable in e-business and news surveillance for media r... The news ticker is a common feature of many different news networks that display headlines and other information.News ticker recognition applications are highly valuable in e-business and news surveillance for media regulatory authorities.In this paper,we focus on the automatic Arabic Ticker Recognition system for the Al-Ekhbariya news channel.The primary emphasis of this research is on ticker recognition methods and storage schemes.To that end,the research is aimed at character-wise explicit segmentation using a semantic segmentation technique and words identification method.The proposed learning architecture considers the grouping of homogeneousshaped classes.This incorporates linguistic taxonomy in a unified manner to address the imbalance in data distribution which leads to individual biases.Furthermore,experiments with a novel ArabicNews Ticker(Al-ENT)dataset that provides accurate character-level and character components-level labeling to evaluate the effectiveness of the suggested approach.The proposed method attains 96.5%,outperforming the current state-of-the-art technique by 8.5%.The study reveals that our strategy improves the performance of lowrepresentation correlated character classes. 展开更多
关键词 Arabic text recognition optical character recognition deep convolutional network SegNet LeNet
下载PDF
Chest Radiographs Based Pneumothorax Detection Using Federated Learning
20
作者 Ahmad Almadhor Arfat Ahmad Khan +4 位作者 Chitapong Wechtaisong Iqra Yousaf Natalia Kryvinska Usman Tariq Haithem Ben Chikha 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1775-1791,共17页
Pneumothorax is a thoracic condition that occurs when a person’s lungs collapse,causing air to enter the pleural cavity,the area close to the lungs and chest wall.The most persistent disease,as well as one that neces... Pneumothorax is a thoracic condition that occurs when a person’s lungs collapse,causing air to enter the pleural cavity,the area close to the lungs and chest wall.The most persistent disease,as well as one that necessitates particular patient care and the privacy of their health records.The radiologists find it challenging to diagnose pneumothorax due to the variations in images.Deep learning-based techniques are commonly employed to solve image categorization and segmentation problems.However,it is challenging to employ it in the medical field due to privacy issues and a lack of data.To address this issue,a federated learning framework based on an Xception neural network model is proposed in this research.The pneumothorax medical image dataset is obtained from the Kaggle repository.Data preprocessing is performed on the used dataset to convert unstructured data into structured information to improve the model’s performance.Min-max normalization technique is used to normalize the data,and the features are extracted from chest Xray images.Then dataset converts into two windows to make two clients for local model training.Xception neural network model is trained on the dataset individually and aggregates model updates from two clients on the server side.To decrease the over-fitting effect,every client analyses the results three times.Client 1 performed better in round 2 with a 79.0%accuracy,and client 2 performed better in round 2 with a 77.0%accuracy.The experimental result shows the effectiveness of the federated learning-based technique on a deep neural network,reaching a 79.28%accuracy while also providing privacy to the patient’s data. 展开更多
关键词 Privacy preserving pneumothorax disease federated learning chest x-ray images healthcare machine learning deep learning
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部