Forthcoming and Online First Articles

International Journal of Biometrics

International Journal of Biometrics (IJBM)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

International Journal of Biometrics (26 papers in press)

Regular Issues

  • Enabling secure authentication using fingerprint and visual cryptography   Order a copy of this article
    by Sneha Manohar Annappanavar, Pallavi Vijay Chavan  
    Abstract: Biometrics is the form of information associated with an individual that helps in unique identification and verification at different platforms. The fingerprint is an important biometric information and has become most popular for authentication and authorisation. However, maintaining the secrecy of fingerprint data becomes a challenging task over the cloud. This paper presents a novel encryption approach using visual cryptography that encrypts fingerprints and stores them in the form of shares. The visual cryptography scheme implemented in this paper is expansionless and has no greying effect. The authors have collected fingerprint data from residential societies. The algorithm achieves 100% of the peak signal-to-noise ratio. This ratio is highest when compared with state-of-the-art methods of visual cryptography schemes. The mean square error achieved is zero which helps in 100% correct identification of the fingerprint. The paper also presents a secure voting mechanism using fingerprint authentication for general elections.
    Keywords: biometrics; fingerprint recognition; confidentiality; authentication; visual cryptography; secret sharing; shares.
    DOI: 10.1504/IJBM.2024.10063996
     
  • Feature ranking for effective continuous user authentication using keystroke and mouse dynamics with the cat recurrent neural model   Order a copy of this article
    by Princy Ann Thomas, Preetha Mathew Keerikkattil 
    Abstract: Behavioural biometric modalities such as keystroke and mouse dynamics are ideal for continuous user authentication due to their non-intrusive quality. The success of the authentication framework is largely determined by the discriminative power of the features used. It is critical to be able to select the necessary discriminative features for optimal authentication performance. In this research, we implement multiple ranking algorithms on features derived from temporal information of keystroke and mouse dynamics to distinguish their discriminative capacity. The ranked features are then employed for continuous authentication using the cat recurrent neural model (CRNM) to optimise the search space and authenticate users. The experimental results given in this work propose a strategy for developing commercially deployable continuous authentication systems with broad applicability. Experiments are carried out with filter, wrapper, and embedded feature ranking approaches, and authentication outcomes are compared with the CRNM framework. The findings indicate that discrimination is manifested in uncommon rather than normal user conduct. Furthermore, it is discovered that applying feature ranking reduces authentication time from 198 seconds to 138 seconds and improves accuracy from 98.25% to 99.21%.
    Keywords: ranking; temporal features; keystroke dynamics; mouse dynamics; cat swarm optimisation; recurrent neural model.
    DOI: 10.1504/IJBM.2024.10064403
     
  • A systematic literature review and bibliometric analysis of signature verification spanning four decades   Order a copy of this article
    by Sameera Khan, Dileep Kumar Singh 
    Abstract: This article conducts a systematic literature review and bibliometric analysis spanning four decades of research in the field of signature verification (SV). SV holds substantial significance in practical domains like finance, law enforcement, and document authentication. The primary objective of this study is to offer a comprehensive overview of SV’s evolution, pinpoint research trends, and illuminate gaps within the existing literature. The review encompasses 1,552 studies published from 1982 to the present, with analysis focusing on various SV facets such as feature extraction, classification algorithms, datasets, evaluation metrics, and applications. The findings underscore substantial growth and diversification within the field, showcasing the development and testing of diverse approaches. Nevertheless, challenges such as the absence of standardised evaluation metrics and limited accessibility to public datasets emerge. The article concludes with a discourse on prospective directions for SV, considering the potential influence of emerging technologies like deep learning and biometric authentication on the field’s future.
    Keywords: signature verification; SV; bibliometric analysis; thematic evaluation; cluster analysis.
    DOI: 10.1504/IJBM.2025.10064620
     
  • An action recognition of track and field athletes based on Gaussian mixture model   Order a copy of this article
    by Qin Yang, Zhenhua Zhou 
    Abstract: To solve the problem of low recognition accuracy caused by the complexity of individual actions in track and field in the past, a method of action recognition for track and field athletes based on Gaussian mixture model was proposed. First, the data is analysed by the interaction of spatiotemporal features. Secondly, a low-pass filter is used to eliminate the impact of noise on the data to reduce the calculation loss. On the basis of pre-processing data, Hilbert Huang transform (HHT) was used for feature extraction to capture and understand athletes' motion features more accurately, thus significantly improving the accuracy of movement recognition. Then, the Gaussian mixture model is used to model the characteristic parameters, determine the number of mixed components and initialise the model parameters, and complete the movement recognition of track and field athletes. The experimental results show that the traditional method has high computational loss and low recognition accuracy, while the proposed method has very low computational loss and the highest recognition accuracy can reach 98%. The comparison shows that this method has the advantages of low computational complexity, high accuracy and good recognition performance.
    Keywords: Gaussian mixture model; GMM; interaction of spatiotemporal features; action data; low pass filter; athlete movement recognition.
    DOI: 10.1504/IJBM.2025.10064813
     
  • Towards biometric template update protocols for cryptobiometric constructions   Order a copy of this article
    by Subhas Barman 
    Abstract: Biometric data have been stored remotely for authentication purposes. The crypto-biometric construction needs to update the biometric template periodically for security confirmation. However, the revocation of enrolled biometric data requires secure transmission of biometric data from the user to the server. We have analyzed three existing schemes where users' biometric templates are stored in the remote server. In the first scheme, a cryptographic key is protected and shared with the biometric data. In the second approach, the biometric template is stored in the server's database and is used to exchange cryptographic keys. In the third scheme, a biometric template is stored and used to derive a permanent key that encrypts the session key and distributes it to the communicating party under a biometric-based key distribution center. We have analyzed the security of all the proposed protocols using the Random Oracle security model and proved that the protocols are secure against an attacker. We have compared our approaches with the existing approach and found that our third protocol has a minimum communication cost, that is 2368 bits.
    Keywords: biometric authentication; crypto-biometric frameworks; template update protocol; radom oracle; cryptographic key exchange.
    DOI: 10.1504/IJBM.2025.10065177
     
  • Symbolic data analysis-based few-shot learning for offline handwritten signature verification   Order a copy of this article
    by Mohamed Anis Djoudjai, Youcef Chibani, Adel Hafiane 
    Abstract: This paper presents a novel approach for offline handwritten signature verification using few-shot learning and symbolic data analysis. The method effectively handles high intra-class variability and limited data availability, common challenges in signature recognition. The model is trained on dissimilarities from the Signet feature extractor, capturing subtle differences within the same writers signatures. A new weighted membership function measures similarity between query and reference signatures. The method outperforms traditional approaches, achieving competitive equal error rates on four public datasets (GPDS, CEDAR, MCYT, PUC-PR) using only five genuine reference signatures. The system surpasses state-of-the-art results on GPDS and PUC-PR datasets. This combination of few-shot learning and symbolic data analysis offers robust and efficient signature verification, ideal for real-world applications with scarce labelled data.
    Keywords: few-shot learning; FSL; signature verification; intra-class variability; one-class symbolic data analysis classifier; dissimilarities.
    DOI: 10.1504/IJBM.2025.10065178
     
  • A discriminative model for scale, translation and rotation invariant face recognition.   Order a copy of this article
    by Puja S. Prasad, Esther Varma, Sanjay Kumar Prasad 
    Abstract: There are many challenges like different illumination conditions, aging, different poses and orientation of images, limited datasets for training, and other variational conditions associated with facial recognition and verification. SIFT is a robust and popular algorithm for facial recognition due to its invariant nature towards scale, and orientation, but it has its some limitations. This paper proposes a framework in which we modify the steps of SIFT algorithm in two ways. First, for calculating extrema using a non-maximal suppression algorithm we compare the grid in fixed patches instead of whole images, and by reducing the size of the SIFT feature descriptor. For this experiment, we are using five public databases FERET, Yale2B, M2VTS, Face 94, ORL and found an improvement in terms of accuracy with respect to the existing facial recognition system. The novelty of the proposed method is that it has less computational complexity compare to original SIFT and good accuracy compare to other state-of-the-art methods.
    Keywords: scale invariant feature transform; SIFT; ORL; MOPS; FERET; Yale2B; M2VTS; Extrema.
    DOI: 10.1504/IJBM.2025.10065805
     
  • An online noun phrase translation method based on speech recognition technology   Order a copy of this article
    by Kun Li 
    Abstract: Due to the low translation accuracy of traditional methods, a noun phrase online translation method based on speech recognition technology is proposed. Firstly, an online speech signal recogniser is used to collect the speech signals of noun phrases, and Fourier transform is used for denoising processing. Secondly, based on the denoised speech signal, a benchmark translation context is set to extract the features of noun phrase speech signals in the optimal translation context. Finally, a transformation layer is introduced into the seq2seq model, with the source noun phrase as input and the target noun phrase as output, to construct a neural machine translation model for noun phrases and complete online translation of noun phrases. The experimental results show that the method proposed in this paper can accurately recognise the speech signals of noun phrases and improve the accuracy of online translation. The accuracy of online translation remains above 93%.
    Keywords: speech recognition; noun phrase; online translation; seq2seq model; conversion layer.
    DOI: 10.1504/IJBM.2025.10066023
     
  • Threshold selection for keystroke dynamics identification system   Order a copy of this article
    by Onsiri Silasai, Sucha Smanchat, Sirapat Boonkrong 
    Abstract: Keystroke dynamics is the timing information captured when typing on a computer keyboard. It includes hold time and inter-key time. In authentication and identification systems, a threshold is an essential element used in the decision-making process to determine whether a user be granted access or not. Therefore, the threshold selection process is vital. In this work, 15 users were asked to type long texts using a word processor twice a day for 10 days. Two scenarios were used to determine the ability to identify users. EER and accuracy were used to confirm the result and find the most appropriate threshold. The result showed that the highest count thresholds were 0.20 and 0.30. When confirmed by using EER and accuracy, the optimal threshold is 0.20 with an EER of 0.08% and an accuracy of 87.60%. Additionally, our proposed method outperforms those that use free texts to create typing patterns.
    Keywords: keystroke dynamics; threshold selection; user identification.
    DOI: 10.1504/IJBM.2025.10066656
     
  • Performance analysis on fingerprint identification by deep learning approach   Order a copy of this article
    by Florence Francis-Lothai, Kung Chuang Ting, Emily Sing Kiang Siew, Hai Inn Ho, Annie Joseph, Tengku Mohd Afendi Zulcaffle, David B. L. Bong 
    Abstract: Achieving high accuracy in fingerprint identification remains challenging, despite various approaches that have been introduced over the years, including deep learning-based methods. These approaches can be computationally complex and may require a vast amount of training data. This study aims to evaluate the performance of deep learning-based approaches for fingerprint identification using two pretrained deep network models, i.e., GoogLeNet and ResNet18. The images in the datasets are first registered and cropped before being trained and validated. The validation rates demonstrated that the preprocessed images produced higher average validation rates compared to the original images. These images are then applied during the testing phase, resulting in nearly perfect identification rates for both models. In comparison, with only 20% of the training dataset, GoogLeNet and ResNet18 achieved 93.00% and 97.00% for the FingerDOS database, respectively. Both models obtained an 88.75% identification rate on the FVC2002 DB1A database, outperforming other methods.
    Keywords: fingerprint identification; biometric; deep learning; GoogLeNet; ResNet18; image registration; speeded up robust features; SURF.
    DOI: 10.1504/IJBM.2025.10067397
     
  • Enhancing security and accuracy in biometric systems through the fusion of fingerprint and gait recognition technologies   Order a copy of this article
    by Mayank Shekhar, Amit Kumar Trivedi, Ripon Patgiri 
    Abstract: In the evolving landscape of security technology, biometric systems are pivotal for unique identification through physiological or behavioural traits. This research focuses on enhancing biometric system security and accuracy by integrating fingerprint and gait recognition technologies. Fingerprint recognition is valued for its precision and ease of data acquisition, while gait recognition offers non-invasiveness and resistance to obfuscation. The study explores feature and score level fusions of these modalities, utilising advanced algorithms to optimise the integration and elevate recognition performance. Experimental evaluations demonstrate that the proposed multimodal system not only outperforms unimodal systems but also strengthens robustness against spoofing attacks. Key contributions include a novel gait feature extraction technique compatible with fingerprint features and an optimised score-level fusion algorithm, significantly enhancing accuracy and security. Biometric security systems have become integral to modern security architectures, leveraging unique physiological and behavioural characteristics to authenticate individuals.
    Keywords: multimodal biometrics; fingerprint recognition; gait recognition; biometric security; feature fusion; biometric authentication.
    DOI: 10.1504/IJBM.2025.10068285
     

Special Issue on: Advanced Bio-Inspired Algorithms for Biometrics - Part 2

  • Character emotion recognition algorithm in small sample video based on multimodal feature fusion   Order a copy of this article
    by Jian Xie, Dan Chu 
    Abstract: In order to overcome the problems of poor recognition accuracy and low recognition accuracy in traditional character emotion recognition algorithms, this paper proposes a small sample video character emotion recognition algorithm based on multimodal feature fusion, aiming to overcome the problems of low accuracy and poor precision in traditional algorithms. The steps of this algorithm include extracting facial image scene features and expression features from small sample videos, using GloVe technology to extract text features, and obtaining character speech features through filter banks. Subsequently, a bidirectional LSTM model was used to fuse multimodal features, and emotions were classified using fully connected layers and softmax functions. The experimental results show that the method achieves an emotion recognition accuracy of up to 98.6%, with a recognition rate of 64% for happy emotions and 62% for neutral emotions.
    Keywords: multimodal feature fusion; bidirectional LSTM model; attention mechanism; softmax function.
    DOI: 10.1504/IJBM.2024.10063382
     
  • Fine grain emotional intelligent recognition method for athletes based on multi physiological information fusion   Order a copy of this article
    by Dong Guo 
    Abstract: Aiming to solve the problems of low accuracy in collecting multiple physiological information, low recognition rate of fine-grained emotions, and long recognition time in traditional recognition methods, a fine grain emotional intelligent recognition method for athletes based on multi physiological information fusion is proposed. Various physiological information of athletes are collected using ECG sensors, EMG sensors, EDA sensors, as well as airflow sensors to acquire signals such as electrocardiogram, electromyogram, skin conductance, and respiration. The collected information is denoised, and the denoised information is then fused using the Bayesian method. Fuzzy neural networks are used to extract fine-grained emotional characteristics of athletes, and the results of fine-grained emotion recognition are obtained by combining with base classifiers. Experimental results show that the average accuracy of multi-physiological information collection of the proposed method is 97.2%, the average recognition rate is 97.5%, and the average recognition time is 1.41s.
    Keywords: multi physiological information fusion; athletes; fine grain emotional intelligent recognition; Bayesian method; fuzzy neural networks; base classifiers.
    DOI: 10.1504/IJBM.2024.10063383
     
  • Motion recognition of football players based on deformable convolutional neural networks   Order a copy of this article
    by Lingqiang Xuan, Di Zhang 
    Abstract: In order to improve the accuracy of football player action recognition and the number of frames transmitted per second, a football player action recognition method based on deformable convolutional neural network is proposed. Firstly, the action images of football players are collected through binocular vision, and distortion correction and disparity calculation are performed on the images to improve their quality. Secondly, based on the collected athlete action images, the receptive field of the action images is calculated in two-dimensional convolution to extract football player action features. Finally, the extracted action features are input into the support vector machine to construct the optimal classification plane and complete the recognition of football player actions. The experimental results show that the action recognition accuracy of our method can reach up to 99.3%, and the transmission speed of our method is always stable at 24 frames per second or above.
    Keywords: variable convolutional neural network; CNN; football players; action recognition; binocular vision.
    DOI: 10.1504/IJBM.2024.10063378
     
  • A method for identifying foul actions of athletes based on multimodal perception   Order a copy of this article
    by Jiuying Hu 
    Abstract: In order to improve the recall rate and accuracy of foul action recognition for track and field athletes, and solve the problem of poor classification effect of foul action, this study proposed and designed a multi-modal perception-based foul action recognition method for track and field athletes. Firstly, the foul action dataset of track and field athletes is constructed. Then, the wavelet denoising method is used to process the movement image noise of track and field athletes. Finally, the recognition function of foul action of track and field athletes is established by means of multi-modal perception, and the bidirectional ranking loss is used to train the function and the similarity between skeleton and video matching is calculated, so as to obtain the final recognition result of foul action of track and field athletes. The experimental results show that the accuracy of foul action identification is 98.5%, the classification accuracy is 98.6%, the recognition recall rate is 99.2%, the recognition sensitivity is high, and the application effect is good.
    Keywords: multimodal perception; athletes; identification of foul actions; bidirectional ranking loss.
    DOI: 10.1504/IJBM.2024.10063381
     
  • Facial expression recognition method based on multi-level feature fusion of high-resolution images   Order a copy of this article
    by Li Wan, Wenzhi Cheng 
    Abstract: To improve the accuracy of facial expression recognition, the paper designs a facial expression recognition method based on multi-level feature fusion of high-resolution images. Firstly, smooth the noise and texture in the facial image and perform enhancement processing. Secondly, extract multi-level features of facial images, and then fuse multi-level features through reverse solving. Thirdly, extract the attributes of different regions of the face and assign them to the corresponding representation data. Then, extract decoupled data of facial expressions based on feature fusion results. Lastly, compare decoupled representation and representation data to complete the facial expression recognition. The experiment shows that the geometric mean of the recognition results obtained by this method is between 0.963 and 0.989, and the similarity of the feature vectors is between 0.972 and 0.988, indicating that this method can accurately output facial expression recognition results.
    Keywords: facial images; expression recognition; high-resolution images; multi-level feature fusion.
    DOI: 10.1504/IJBM.2024.10063380
     
  • Basketball player action recognition based on improved LSTM neural network   Order a copy of this article
    by Xudong Yang 
    Abstract: In order to improve the IoU value and accuracy of basketball player action recognition methods, this paper proposes a basketball player action recognition method based on an improved LSTM neural network. Firstly, establish a coordinate system in the visual system and perform appropriate sequence transformations on the collected basketball player action images to complete image acquisition. Next, a Kalman filter is used to filter and process the collected action images. Finally, based on the LSTM neural network unit, two sigmoid gating units are introduced to improve it. Using the filtered action image as input and the action recognition result as output, an improved LSTM neural network is used to construct an action recognition model and obtain the recognition result. The experimental results show that the proposed method has achieved significant improvement in IoU value and accuracy in action recognition, with the highest recognition accuracy reaching 98.26%.
    Keywords: improving LSTM neural network; basketball players; action recognition.
    DOI: 10.1504/IJBM.2024.10063379
     
  • A method of badminton video motion recognition based on adaptive enhanced AdaBoost algorithm   Order a copy of this article
    by YunTao Chang 
    Abstract: To overcome the problems of low recognition accuracy, poor recognition recall, and long recognition time in traditional badminton video action recognition methods, a badminton video action recognition method based on an adaptive enhanced AdaBoost algorithm is proposed. Firstly, the badminton video actions are collected through inertial sensors, and the badminton action videos are captured to construct an action dataset. The data in this dataset is normalised, and then the badminton video action features are extracted. The weighted fusion method is used to fuse the extracted badminton video action features. Finally, the fused action features are used as the basis, Construct a badminton video action classifier using the adaptive enhanced AdaBoost algorithm, and output the badminton video action recognition results through the classifier. The experimental results show that the proposed method has good performance in recognising badminton video actions.
    Keywords: inertial sensor; weighted fusion method; AdaBoost algorithm; motion recognition; data standardisation.
    DOI: 10.1504/IJBM.2024.10063377
     
  • Classroom learning behavior recognition method for English teaching students based on adaptive feature fusion   Order a copy of this article
    by Shuyu Li 
    Abstract: A new method of English teaching students' classroom learning behaviour recognition based on adaptive feature fusion is proposed aiming at the problem of low recognition rate of classroom learning behaviour recognition. First, the video images of English teaching class were collected and then divided into frames and grey-scale processing. Secondly, the improved guided filtering algorithm was used to enhance the image. Then, the maximum inter-class variance method was used to segment the image. Finally, SIFT algorithm was introduced to design an adaptive feature fusion architecture, which adaptively allocates feature weights and fuses shallow and deep features to realise learning behaviour recognition. The experimental results show that the proposed method has a peak signal-to-noise ratio of 51.7 dB, a recognition rate of 97.9%, and a maximum delay of 1.9 s, which can accurately identify classroom learning behaviour.
    Keywords: adaptive feature fusion; English teaching; student classroom; learning behaviour recognition; guided filtering algorithm; maximum between-class variance method.
    DOI: 10.1504/IJBM.2025.10063979
     
  • A method for identifying abnormal classroom behaviours of students based on multi-objective weighted learning   Order a copy of this article
    by Lin Zou 
    Abstract: In order to improve the accuracy of identifying abnormal behaviours among students and shorten the recognition time, a method based on multi-objective weight learning for identifying abnormal behaviours in student classrooms is proposed. Firstly, use mixed Gaussian background modelling to remove noise from student classroom monitoring images and improve image quality. Secondly, normalise the coordinates of student behaviour posture and extract classroom behaviour characteristics from both temporal and spatial features. Finally, taking student behaviour characteristics as input and student classroom abnormal behaviour recognition results as output, a multi-objective weight learning abnormal behaviour recognition model is constructed to obtain the recognition results of student classroom abnormal behaviour. The experimental results show that the method proposed in this paper can improve the recognition accuracy of abnormal classroom behaviour among students, with a recognition accuracy of 95.4%, and can shorten the recognition time, all of which are not less than 3.5 seconds.
    Keywords: multi-objective weight learning; abnormal behaviour; student behaviour; classroom monitoring images.
    DOI: 10.1504/IJBM.2025.10063980
     
  • Keystroke dynamics and quantum machine learning   Order a copy of this article
    by Namisha Bhasin, Sanjay Kumar Sharma, Rajesh Mishra 
    Abstract: The performance of machine learning algorithms is often suboptimal in identifying and classifying patterns hence, there was always a requirement for methods that could provide optimal solutions. Quantum algorithms have demonstrated a significantly greater efficiency in many tasks than traditional machine learning algorithms. Quantum computers leverage unique properties such as entanglement and superposition, allowing them to generate patterns inaccessible to classical systems. Keystroke dynamics, a method for user identification based on typing style, is categorised into static authentication, where users input a username/password combination of 15-20 letters, and dynamic authentication, where users type unbiased text such as emails, chats, or online exams. Both static and dynamic authentication primarily involve involuntary actions. This research paper focuses on authenticating users based on static keystroke dynamics using various quantum and hybrid algorithms.
    Keywords: quantum support vector classifier; QSVC; ZZFeatureMap; quantum neural network; QNN; variational quantum circuit; VQC.
    DOI: 10.1504/IJBM.2025.10065008
     
  • English translation robot pronunciation error correction method based on semantic matching   Order a copy of this article
    by Xiaohong Yu 
    Abstract: In order to improve the pronunciation accuracy of English translation robots, a semantic matching based pronunciation correction method for English translation robots is proposed. Use digital filters to pre emphasise the collected pronunciation signals to improve the accuracy and clarity of the pronunciation signals. Then, by calculating the semantic weight of the pronunciation signal and limiting the vector direction based on its weighted vector of semantic features, the pronunciation semantics of the English translation robot are matched. In order to further improve accuracy, the method of state separation can be used when processing feature quantities of pronunciation signals, and pronunciation error correction can be achieved through feature fusion. The experimental results show that this method is less affected by noise and can improve the reliability of robot pronunciation correction.
    Keywords: semantic matching; speech recognition; English translation robot; mispronunciation signal; pronunciation recognition.
    DOI: 10.1504/IJBM.2025.10064550
     
  • A method of athlete foul action recognition based on DTW algorithm   Order a copy of this article
    by Weihai Zhong, Yanpeng Zhao, Cheng Yang, Chuan Wang 
    Abstract: There may be various foul actions in different sports events, which vary in form, speed, and rhythm, increasing the difficulty of action recognition. Therefore, a DTW algorithm based athlete foul action recognition method is proposed. Select the OV7670 camera to collect athlete action images, extract image contour information, and use it as a feature of athlete foul actions. Based on the collected images, evenly sample the contours of the images to obtain contour feature points. Optimise the DTW algorithm from three aspects: reference template modelling, distortion calculation, and determining the optimal path. Use the extracted action feature sequence as the input of the DTW algorithm to output the recognition results of athlete foul actions. The experimental results show that the distortion of this method is as low as 0.58, indicating that it can accurately identify athlete foul actions and has high application value.
    Keywords: DTW algorithm; athletes; foul action; identification method; distortion; optimal path.
    DOI: 10.1504/IJBM.2025.10064549
     
  • Detection method of students' English classroom learning behaviour: multi-channel feature fusion   Order a copy of this article
    by Yun Zhang 
    Abstract: Aiming to improve the problems of large root mean square error and low F1-value in existing methods, a student English classroom learning behaviour detection method based on multi-channel feature fusion is proposed. Firstly, collect classroom data such as students' oral pronunciation characteristics, note taking texts, eye tracking data, and facial expression recognition. Secondly, extract student English classroom learning behaviours, including oral pronunciation features, text features, and visual attention features; then, input the above features into a recurrent neural network to achieve feature fusion. Finally, establish a machine learning model, use semi supervised learning for model training, and use the trained model to detect student English classroom learning behaviour. The experimental results show that the average RMSE of the proposed method is 0.30, and the F1-value is higher, fully indicating that its detection effect is better.
    Keywords: multi-channel feature fusion; English classroom; learning behaviour; acoustic signal processing technology; semi-supervised learning.
    DOI: 10.1504/IJBM.2025.10065017
     
  • Accurate recognition of emotions of audio-visual bimodal characters based on dual level feature dimensions   Order a copy of this article
    by Xiao Zhang 
    Abstract: In order to accurately and quickly recognise the emotions of bimodal characters, a precise emotion recognition method for audio-visual bimodal characters based on dual level feature dimensions is proposed. Firstly, based on audio data, logarithmic transformation and cepstral function are used to extract emotional features from character audio signals. Secondly, by using local binarisation mode and Gabor wavelet transform, emotional feature maps of character videos are extracted. Finally, after cross modal interaction processing of the audio and video features of the character's emotions, a feature fusion model based on gated neural networks is constructed using the visual and acoustic features after interaction as inputs to obtain the final audio-visual bimodal character emotion recognition results. The experimental results show that compared to existing methods, the highest accuracy of character emotion recognition in our method is 0.99, and the longest recognition time does not exceed 10 s.
    Keywords: dual level feature dimension; audio and video dual-mode; character emotions; accurate recognition.
    DOI: 10.1504/IJBM.2025.10065016
     
  • Anomalous behaviour recognition in MOOC learning based on local intuitionistic fuzzy support vector machine   Order a copy of this article
    by Qingyun An 
    Abstract: In order to improve the accuracy and efficiency of MOOC learning anomalous behaviour recognition, a MOOC learning anomalous behaviour recognition method based on local intuitionistic fuzzy support vector machine is proposed. Firstly, construct a sliding filter for MOOC learning video image grids and filter the MOOC learning video image channels. Secondly, using the key points of the student skeleton as behavioural posture features, the detection of anomalous behaviour in MOOC learning is carried out. Finally, based on the theory of local intuitionistic fuzzy sets, the local intuitionistic indices of positive and negative samples in MOOC learning behaviour are calculated, and a decision function for classifying and recognising MOOC learning anomalous behaviours is constructed to complete the classification and recognition of MOOC learning anomalous behaviours. The results show that the recognition accuracy of the method proposed in this paper is consistently above 90%, and the recognition time does not exceed 3 s.
    Keywords: local intuitionistic fuzzy support vector machine; MOOC learning; anomalous recognition; posture features.
    DOI: 10.1504/IJBM.2025.10065015