In conventional human-robot interaction (HRI), it is difficult to provide adaptability by located systems in the human body. Surface Electromyography (sEMG) signals have the potential to meet adaptability in HRI by di...
In conventional human-robot interaction (HRI), it is difficult to provide adaptability by located systems in the human body. Surface Electromyography (sEMG) signals have the potential to meet adaptability in HRI by directly representing movements, and classifying hand gestures with sEMG can be an effective solution to meet the increasing needs of these applications. In this paper, a hybrid and multi-scale convolutional neural network (CNN) model is proposed to obtain an efficient sEMG-based classification approach of human hand gestures. The proposed method includes an effective feature extraction process, including spectral moments, sparseness, irregularity factor, Teager–Kaiser energy, Shannon entropy, Katz fractal dimension, and Higuchi’s fractal dimension, and waveform length. The obtained features are then converted to RGB images. The designed network is built on multi-scale convolutional blocks with residual learning and convolutional blocks, including the CBAM to improve the network performance by focusing on channel and spatial features. Furthermore, a pyramid non-pooling local block is utilized at the end of the network to learn more powerful features and their correlations. Five comprehensive publicly available datasets are evaluated in the experiments, and the obtained results are compared with the benchmark CNN models and network variations with different attention mechanisms. In the comparative evaluations, the CBAM achieves a classification accuracy between 84.62 % and 97.56 % while other attention mechanism results give accuracy values between 82.88 % and 97.17 %. The experiments show that the proposed method gives more accurate and robust classification performance compared with other variations and benchmark models.
In ocean engineering, curved structures are commonly used in various marine applications, including unmanned underwater vehicles (UUVs) and autonomous underwater vehicles (AUVs). However, the interaction between under...
详细信息
Clear imagery of retinal vessels is one of the critical shreds of evidence in specific disease diagnosis and evaluation, including sophisticated hierarchical topology and plentiful-and-intensive capillaries. In this w...
详细信息
Access modifiers allow Java developers to define package and class interfaces tailored for different groups of clients. According to the principles of information hiding and encapsulation, the accessibility of types, ...
详细信息
The paper presents a taxonomy of the existing forms of parallel computer architectures, based on the characteristics of the hardware architecture and the abstract machine layered upon it. The abstract machine reflects...
详细信息
The paper presents a taxonomy of the existing forms of parallel computer architectures, based on the characteristics of the hardware architecture and the abstract machine layered upon it. The abstract machine reflects the programming models provided. The main classes of hardware architectures are: physically shared memory systems and distributed memory systems. Distributed memory systems may be remote memory access architectures or message passing architectures. The major forms of abstract machine architecture are: message passing systems and logically shared memory architectures. Three solutions for logically shared memory architectures are known (1) distributed shared memory architectures, (2) multi-threaded architectures, and (3) virtual shared memory architectures. All three types are discussed in detail under the aspects of performance, programmability, and scalability, and their corresponding programming paradigms are characterized. The implications of the three concepts on node architecture and the requirements of latency minimization or latency hiding are discussed and illustrated by examples taken from pioneering realizations of the three kinds of architecture such as DASH, *T, and MANNA.
A major attribute of telecommunications software systems is change. For evolving telecom systems, significant expertise is needed to effectively handle and capitalize on these changes. This paper discusses some of the...
详细信息
A major attribute of telecommunications software systems is change. For evolving telecom systems, significant expertise is needed to effectively handle and capitalize on these changes. This paper discusses some of the key dimensions of change that occur during telecom systems software development, the areas of expertise that software developers apply in managing these changes, and some of the means by which high-performing project members have overcome the learning curves associated with these systems. We base our results on data gathered from several Bell Labs multiyear development projects and interviews with experienced staff.
In the era of rapid societal modernization, the issue of crime stands as an intrinsic facet, demanding our attention and consideration. As our communities evolve and adopt technological advancements, the dynamic lands...
详细信息
Managing dependencies between software development artifacts helps achieve traceability and consistency in software-intensive systems. Traceability supports the alignment between different stakeholder concerns, develo...
详细信息
作者:
Slewe, THoogenboom, MManaging consultant
specializing in security and architecture Capgemini The Netherlands. Principal consultant
specializing in connecting architecture studies to software engineering projects Capgemini The Netherlands
In the not-so-distant past, bandits and highwaymen frequently roamed themajor transportation routes robbing travelers and the pony express of gold, money, and otherprecious assets. In the current digital age, except f...
详细信息
In the not-so-distant past, bandits and highwaymen frequently roamed themajor transportation routes robbing travelers and the pony express of gold, money, and otherprecious assets. In the current digital age, except for few retail transactions where paper money orcoins are used, money and money flows are represented by information about financial assets owned,owed, or transferred to another party. When information is no longer isolated, surrounded by thickwalls, or guarded by armed security personnel, and never locked in a safe, it seems an almostimpossible task to provide security for money.
The casing is a critical design factor for underwater weapons, significantly influencing the energy output of underwater explosion (UNDEX) charges. In this study, a numerical model for cased charge UNDEX was developed...
详细信息
暂无评论