Home / Journals / CSSE / Vol.40, No.2, 2022
Special Issues
  • Open AccessOpen Access

    ARTICLE

    Energy-Aware Scheduling for Tasks with Target-Time in Blockchain based Data Centres

    I. Devi*, G.R. Karpagam
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 405-419, 2022, DOI:10.32604/csse.2022.018573 - 09 September 2021
    Abstract

    Cloud computing infrastructures have intended to provide computing services to end-users through the internet in a pay-per-use model. The extensive deployment of the Cloud and continuous increment in the capacity and utilization of data centers (DC) leads to massive power consumption. This intensifying scale of DCs has made energy consumption a critical concern. This paper emphasizes the task scheduling algorithm by formulating the system model to minimize the makespan and energy consumption incurred in a data center. Also, an energy-aware task scheduling in the Blockchain-based data center was proposed to offer an optimal solution that

    More >

  • Open AccessOpen Access

    ARTICLE

    Usability and Security of Arabic Text-based CAPTCHA Using Visual Cryptography

    Suliman A. Alsuhibany*, Meznah Alquraishi
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 421-440, 2022, DOI:10.32604/csse.2022.018929 - 09 September 2021
    Abstract Recently, with the spread of online services involving websites, attackers have the opportunity to expose these services to malicious actions. To protect these services, A Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) is a proposed technique. Since many Arabic countries have developed their online services in Arabic, Arabic text-based CAPTCHA has been introduced to improve the usability for their users. Moreover, there exist a visual cryptography (VC) technique which can be exploited in order to enhance the security of text-based CAPTCHA by encrypting a CAPTCHA image into two shares and More >

  • Open AccessOpen Access

    ARTICLE

    Video Identification Based on Watermarking Schemes and Visual Cryptography

    Maged Wafy1,2,*, Samr Gamal Zanaty1,3, Mahmoud Elkhouly1
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 441-453, 2022, DOI:10.32604/csse.2022.018597 - 09 September 2021
    Abstract Related to the growth of data sharing on the Internet and the wide - spread use of digital media, multimedia security and copyright protection have become of broad interest. Visual cryptography () is a method of sharing a secret image between a group of participants, where certain groups of participants are defined as qualified and may combine their share of the image to obtain the original, and certain other groups are defined as prohibited, and even if they combine knowledge of their parts, they can’t obtain any information on the secret image. The visual cryptography… More >

  • Open AccessOpen Access

    ARTICLE

    Implementation of K-Means Algorithm and Dynamic Routing Protocol in VANET

    Manoj Sindhwani1, Charanjeet Singh1,*, Rajeshwar Singh2
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 455-467, 2022, DOI:10.32604/csse.2022.018498 - 09 September 2021
    (This article belongs to the Special Issue: Emerging Trends in Intelligent Communication and Wireless Technologies)
    Abstract With the growth of Vehicular Ad-hoc Networks, many services delivery is gaining more attention from the intelligent transportation system. However, mobility characteristics of vehicular networks cause frequent disconnection of routes, especially during the delivery of data. In both developed and developing countries, a lot of time is consumed due to traffic congestion. This has significant negative consequences, including driver stress due to increased time demand, decreased productivity for various personalized and commercial vehicles, and increased emissions of hazardous gases especially air polluting gases are impacting public health in highly populated areas. Clustering is one of… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Identification and Resolution of Software Requirement Conflicts: Assessment and Evaluation

    Maysoon Aldekhail1, Marwah Almasri2,*
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 469-489, 2022, DOI:10.32604/csse.2022.018269 - 09 September 2021
    Abstract Considerable research has demonstrated how effective requirements engineering is critical for the success of software projects. Requirements engineering has been established and recognized as one of the most important aspects of software engineering as of late. It is noteworthy to mention that requirement consistency is a critical factor in project success, and conflicts in requirements lead to waste of cost, time, and effort. A considerable number of research studies have shown the risks and problems caused by working with requirements that are in conflict with other requirements. These risks include running overtime or over budget,… More >

  • Open AccessOpen Access

    ARTICLE

    Mammogram Learning System for Breast Cancer Diagnosis Using Deep Learning SVM

    G. Jayandhi1,*, J.S. Leena Jasmine2, S. Mary Joans2
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 491-503, 2022, DOI:10.32604/csse.2022.016376 - 09 September 2021
    Abstract The most common form of cancer for women is breast cancer. Recent advances in medical imaging technologies increase the use of digital mammograms to diagnose breast cancer. Thus, an automated computerized system with high accuracy is needed. In this study, an efficient Deep Learning Architecture (DLA) with a Support Vector Machine (SVM) is designed for breast cancer diagnosis. It combines the ideas from DLA with SVM. The state-of-the-art Visual Geometric Group (VGG) architecture with 16 layers is employed in this study as it uses the small size of 3 × 3 convolution filters that reduces… More >

  • Open AccessOpen Access

    ARTICLE

    Organizational Data Breach: Building Conscious Care Behavior in Incident Response

    Adlyn Adam Teoh1, Norjihan Binti Abdul Ghani1,*, Muneer Ahmad1, Nz Jhanjhi2, Mohammed A. Alzain3, Mehedi Masud4
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 505-515, 2022, DOI:10.32604/csse.2022.018468 - 09 September 2021
    Abstract Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses. This research study draws upon the literature in the areas of information security, incident response, theory of planned behaviour, and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation. The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date, the 2018 SingHealth data breach. The single in-depth case study More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Renewable Energy Source Combined Dynamic Voltage Restorer for Power Quality Improvement

    N. Kanagaraj*
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 517-538, 2022, DOI:10.32604/csse.2022.019149 - 09 September 2021
    (This article belongs to the Special Issue: Advances in Computational Intelligence and its Applications)
    Abstract In this paper, the hybrid photovoltaic-thermoelectric generator (PV-TEG) combined dynamic voltage restorer (DVR) system is proposed for the power quality disturbances compensation in a single-phase distribution system. The stable and precise level of input voltage is essential for the smooth and trouble-free operation of the electrically sensitive loads which are connected at the utility side to avoid system malfunctions. In this context, the hybrid PV-TEG energy module combined DVR system is proposed in this paper. With the support of the hybrid energy module, the DVR will perform the power quality disturbances compensation effectively with needed… More >

  • Open AccessOpen Access

    ARTICLE

    An improved CRNN for Vietnamese Identity Card Information Recognition

    Trinh Tan Dat1, Le Tran Anh Dang1,2, Nguyen Nhat Truong1,2, Pham Cung Le Thien Vu1, Vu Ngoc Thanh Sang1, Pham Thi Vuong1, Pham The Bao1,*
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 539-555, 2022, DOI:10.32604/csse.2022.019064 - 09 September 2021
    Abstract This paper proposes an enhancement of an automatic text recognition system for extracting information from the front side of the Vietnamese citizen identity (CID) card. First, we apply Mask-RCNN to segment and align the CID card from the background. Next, we present two approaches to detect the CID card’s text lines using traditional image processing techniques compared to the EAST detector. Finally, we introduce a new end-to-end Convolutional Recurrent Neural Network (CRNN) model based on a combination of Connectionist Temporal Classification (CTC) and attention mechanism for Vietnamese text recognition by jointly train the CTC and… More >

  • Open AccessOpen Access

    ARTICLE

    An Architecture Supporting Intelligent Mobile Healthcare Using Human-Computer Interaction HCI Principles

    Mesfer Alrizq1, Shauban Ali Solangi2, Abdullah Alghamdi1,*, Muhammad Ali Nizamani2, Muhammad Ali Memon2, Mohammed Hamdi1
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 557-569, 2022, DOI:10.32604/csse.2022.018800 - 09 September 2021
    (This article belongs to the Special Issue: Advances in Computational Intelligence and its Applications)
    Abstract Recent advancements in the Internet of Things IoT and cloud computing have paved the way for mobile Healthcare (mHealthcare) services. A patient within the hospital is monitored by several devices. Moreover, upon leaving the hospital, the patient can be remotely monitored whether directly using body wearable sensors or using a smartphone equipped with sensors to monitor different user-health parameters. This raises potential challenges for intelligent monitoring of patient’s health. In this paper, an improved architecture for smart mHealthcare is proposed that is supported by HCI design principles. The HCI also provides the support for the… More >

  • Open AccessOpen Access

    ARTICLE

    Performance Analysis and Throughput Enhancement of the STET Technique for WLAN IEEE 802.11ad

    M. Vanitha1,*, J. Kirubakaran2, K. Radhika2
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 571-579, 2022, DOI:10.32604/csse.2022.017663 - 09 September 2021
    Abstract The IEEE 802.11ad innovation has enabled the impact of remote devices in unauthorized 60 GHz unlicensed frequency band at Giga bits per second information transfer rate in speed concentrated 5G applications. We have presented an innovative work that deals with the upgradation of the ability of IEEE 802.11ad wireless LAN to make it suitable for wireless applications. An exact examination on the IEEE 802.11ad analysis has been carried out in this work to achieve the greatest throughput. This has pulled attraction in broad consideration for accomplishing the pinnacle transmission rate of 8 Gbit/s. IEEE 802.11ad… More >

  • Open AccessOpen Access

    ARTICLE

    Fuzzy Based Ant Colony Optimization Scheduling in Cloud Computing

    K. Rajakumari1,*, M.Vinoth Kumar2, Garima Verma3, S. Balu4, Dilip Kumar Sharma5, Sudhakar Sengan6
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 581-592, 2022, DOI:10.32604/csse.2022.019175 - 09 September 2021
    Abstract Cloud computing is an Information Technology deployment model established on virtualization. Task scheduling states the set of rules for task allocations to an exact virtual machine in the cloud computing environment. However, task scheduling challenges such as optimal task scheduling performance solutions, are addressed in cloud computing. First, the cloud computing performance due to task scheduling is improved by proposing a Dynamic Weighted Round-Robin algorithm. This recommended DWRR algorithm improves the task scheduling performance by considering resource competencies, task priorities, and length. Second, a heuristic algorithm called Hybrid Particle Swarm Parallel Ant Colony Optimization is More >

  • Open AccessOpen Access

    ARTICLE

    Design of Neural Network Based Wind Speed Prediction Model Using GWO

    R. Kingsy Grace1,*, R. Manimegalai2
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 593-606, 2022, DOI:10.32604/csse.2022.019240 - 09 September 2021
    Abstract The prediction of wind speed is imperative nowadays due to the increased and effective generation of wind power. Wind power is the clean, free and conservative renewable energy. It is necessary to predict the wind speed, to implement wind power generation. This paper proposes a new model, named WT-GWO-BPNN, by integrating Wavelet Transform (WT), Back Propagation Neural Network (BPNN) and Grey Wolf Optimization (GWO). The wavelet transform is adopted to decompose the original time series data (wind speed) into approximation and detailed band. GWO – BPNN is applied to predict the wind speed. GWO is… More >

  • Open AccessOpen Access

    ARTICLE

    Desertification Detection in Makkah Region based on Aerial Images Classification

    Yahia Said1,2,*, Mohammad Barr1, Taoufik Saidani2,3, Mohamed Atri2,4
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 607-618, 2022, DOI:10.32604/csse.2022.018479 - 09 September 2021
    Abstract Desertification has become a global threat and caused a crisis, especially in Middle Eastern countries, such as Saudi Arabia. Makkah is one of the most important cities in Saudi Arabia that needs to be protected from desertification. The vegetation area in Makkah has been damaged because of desertification through wind, floods, overgrazing, and global climate change. The damage caused by desertification can be recovered provided urgent action is taken to prevent further degradation of the vegetation area. In this paper, we propose an automatic desertification detection system based on Deep Learning techniques. Aerial images are More >

  • Open AccessOpen Access

    ARTICLE

    Applying Non-Local Means Filter on Seismic Exploration

    Mustafa Youldash1, Saleh Al-Dossary2,*, Lama AlDaej1, Farah AlOtaibi1, Asma AlDubaikil1, Noora AlBinali1, Maha AlGhamdi1
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 619-628, 2022, DOI:10.32604/csse.2022.017733 - 09 September 2021
    Abstract The seismic reflection method is one of the most important methods in geophysical exploration. There are three stages in a seismic exploration survey: acquisition, processing, and interpretation. This paper focuses on a pre-processing tool, the Non-Local Means (NLM) filter algorithm, which is a powerful technique that can significantly suppress noise in seismic data. However, the domain of the NLM algorithm is the whole dataset and 3D seismic data being very large, often exceeding one terabyte (TB), it is impossible to store all the data in Random Access Memory (RAM). Furthermore, the NLM filter would require More >

  • Open AccessOpen Access

    ARTICLE

    Classification and Diagnosis of Lymphoma’s Histopathological Images Using Transfer Learning

    Schahrazad Soltane*, Sameer Alsharif , Salwa M.Serag Eldin
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 629-644, 2022, DOI:10.32604/csse.2022.019333 - 09 September 2021
    Abstract Current cancer diagnosis procedure requires expert knowledge and is time-consuming, which raises the need to build an accurate diagnosis support system for lymphoma identification and classification. Many studies have shown promising results using Machine Learning and, recently, Deep Learning to detect malignancy in cancer cells. However, the diversity and complexity of the morphological structure of lymphoma make it a challenging classification problem. In literature, many attempts were made to classify up to four simple types of lymphoma. This paper presents an approach using a reliable model capable of diagnosing seven different categories of rare and… More >

  • Open AccessOpen Access

    ARTICLE

    Hardware Chip Performance of CORDIC Based OFDM Transceiver for Wireless Communication

    Amit Kumar1, Adesh Kumar2,*, Geetam Singh Tomar3
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 645-659, 2022, DOI:10.32604/csse.2022.019449 - 09 September 2021
    (This article belongs to the Special Issue: Emerging Trends in Intelligent Communication and Wireless Technologies)
    Abstract The fourth-generation (4G) and fifth-generation (5G) wireless communication systems use the orthogonal frequency division multiplexing (OFDM) modulation techniques and subcarrier allocations. The OFDM modulator and demodulator have inverse fast Fourier transform (IFFT) and fast Fourier transform (FFT) respectively. The biggest challenge in IFFT/FFT processor is the computation of imaginary and real values. CORDIC has been proved one of the best rotation algorithms for logarithmic, trigonometric, and complex calculations. The proposed work focuses on the OFDM transceiver hardware chip implementation, in which 8-point to 1024-point IFFT and FFT are used to compute the operations in transmitter… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Root Memory Optimized Indexing Methodology for Image Search Engines

    R. Karthikeyan1,*, A. Celine Kavida2, P. Suresh3
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 661-672, 2022, DOI:10.32604/csse.2022.018744 - 09 September 2021
    Abstract Digitization has created an abundance of new information sources by altering how pictures are captured. Accessing large image databases from a web portal requires an opted indexing structure instead of reducing the contents of different kinds of databases for quick processing. This approach paves a path toward the increase of efficient image retrieval techniques and numerous research in image indexing involving large image datasets. Image retrieval usually encounters difficulties like a) merging the diverse representations of images and their Indexing, b) the low-level visual characters and semantic characters associated with an image are indirectly proportional,… More >

  • Open AccessOpen Access

    ARTICLE

    Novel Compact UWB Band Notch Antenna Design for Body-Centric Communications

    Sk Raziul Ahasan1, Kaisarul Islam1, Mohammad Monirujjaman Khan1,*, Mehedi Masud2, Gurjot Singh Gaba3, Hesham A. Alhumyani4
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 673-689, 2022, DOI:10.32604/csse.2022.019585 - 09 September 2021
    (This article belongs to the Special Issue: Emerging Trends in Intelligent Communication and Wireless Technologies)
    Abstract In this paper, a novel and compact ultra-wideband (UWB) antenna with band-notched characteristics for body-centric communication is examined and implemented. The shape of the designed antenna looks like a ‘swan’ with a slotted patch. The performance parameters of this antenna for both the free space and on-body scenario for body-centric communication are analyzed and investigated through the simulation process using Computer Simulation Technology (CST). This antenna can avoid the interference caused by Wireless Local Area Network (WLAN) (5.15–5.825 GHz) and Worldwide Interoperability for Microwave Access (WiMAX) (5.25–5.85 GHz) systems with a band notch because of… More >

  • Open AccessOpen Access

    ARTICLE

    Blockchain and Artificial Intelligence Applications to Defeat COVID-19 Pandemic

    Mohammed Baz1, Sabita Khatri2, Abdullah Baz3, Hosam Alhakami4, Alka Agrawal2, Raees Ahmad Khan2,*
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 691-702, 2022, DOI:10.32604/csse.2022.019079 - 09 September 2021
    Abstract The rapid emergence of novel virus named SARS-CoV2 and unchecked dissemination of this virus around the world ever since its outbreak in 2020, provide critical research criteria to assess the vulnerabilities of our current health system. The paper addresses our preparedness for the management of such acute health emergencies and the need to enhance awareness, about public health and healthcare mechanisms. In view of this unprecedented health crisis, distributed ledger and AI technology can be seen as one of the promising alternatives for fighting against such epidemics at the early stages, and with the higher… More >

  • Open AccessOpen Access

    ARTICLE

    ML-Fresh: Novel Routing Protocol in Opportunistic Networks Using Machine Learning

    Puneet Garg*, Ashutosh Dixit, Preeti Sethi
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 703-717, 2022, DOI:10.32604/csse.2022.019557 - 09 September 2021
    (This article belongs to the Special Issue: Emerging Trends in Intelligent Communication and Wireless Technologies)
    Abstract Opportunistic Networks (OppNets) is gaining popularity day-by-day due to their various applications in the real-life world. The two major reasons for its popularity are its suitability to be established without any requirement of additional infrastructure and the ability to tolerate long delays during data communication. Opportunistic Network is also considered as a descendant of Mobile Ad hoc Networks (Manets) and Wireless Sensor Networks (WSNs), therefore, it inherits most of the traits from both mentioned networking techniques. Apart from its popularity, Opportunistic Networks are also starting to face challenges nowadays to comply with the emerging issues of… More >

  • Open AccessOpen Access

    ARTICLE

    Integrated Random Early Detection for Congestion Control at the Router Buffer

    Ahmad Adel Abu-Shareha*
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 719-734, 2022, DOI:10.32604/csse.2022.018369 - 09 September 2021
    Abstract This paper proposed an Integrated Random Early Detection (IRED) method that aims to resolve the problems of the queue-based AQM and load-based AQM and gain the benefits of both using indicators from both types. The arrival factor (e.g., arrival rate, queue and capacity) and the departure factors are used to estimate the congestion through two integrated indicators. The utilized indicators are mathematically calculated and integrated to gain unified and coherent congestion indicators. Besides, IRED is built based on a new dropping calculation approach that fits the utilized congestion indicators while maintaining the intended buffer management More >

  • Open AccessOpen Access

    ARTICLE

    Understand Students Feedback Using Bi-Integrated CRF Model Based Target Extraction

    K. Sangeetha1,*, D. Prabha2
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 735-747, 2022, DOI:10.32604/csse.2022.019310 - 09 September 2021
    Abstract Educational institutions showing interest to find the opinion of the students about their course and the instructors to enhance the teaching-learning process. For this, most research uses sentiment analysis to track students’ behavior. Traditional sentence-level sentiment analysis focuses on the whole sentence sentiment. Previous studies show that the sentiments alone are not enough to observe the feeling of the students because different words express different sentiments in a sentence. There is a need to extract the targets in a given sentence which helps to find the sentiment towards those targets. Target extraction is the subtask More >

  • Open AccessOpen Access

    ARTICLE

    Deterministic and Stochastic Fractional Order Model for Lesser Date Moth

    Moustafa El-shahed1,*, Asmaa M. Al-Dububan2
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 749-764, 2022, DOI:10.32604/csse.2022.019655 - 09 September 2021
    Abstract In this paper, a deterministic and stochastic fractional order model for lesser date moth (LDM) using mating disruption and natural enemies is proposed and analysed. The interaction between LDM larvae, fertilized LDM female, unfertilized LDM female, LDM male and the natural enemy is investigated. In order to clarify the characteristics of the proposed deterministic fractional order model, the analysis of existence, uniqueness, non-negativity and boundedness of the solutions of the proposed fractional-order model are examined. In addition, some sufficient conditions are obtained to ensure the local and global stability of equilibrium points. The occurrence of More >

  • Open AccessOpen Access

    ARTICLE

    Learning Patterns from COVID-19 Instances

    Rehan Ullah Khan*, Waleed Albattah, Suliman Aladhadh, Shabana Habib
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 765-777, 2022, DOI:10.32604/csse.2022.019757 - 09 September 2021
    Abstract Coronavirus disease, which resulted from the SARS-CoV-2 virus, has spread worldwide since early 2020 and has been declared a pandemic by the World Health Organization (WHO). Coronavirus disease is also termed COVID-19. It affects the human respiratory system and thus can be traced and tracked from the Chest X-Ray images. Therefore, Chest X-Ray alone may play a vital role in identifying COVID-19 cases. In this paper, we propose a Machine Learning (ML) approach that utilizes the X-Ray images to classify the healthy and affected patients based on the patterns found in these images. The article… More >

  • Open AccessOpen Access

    ARTICLE

    Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment

    V. Rajkumar1,*, M. Prakash2, V. Vennila3
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 779-793, 2022, DOI:10.32604/csse.2022.019622 - 09 September 2021
    Abstract Cloud storage is an incipient technology in today’s world. Lack of security in cloud environment is one of the primary challenges faced these days. This scenario poses new security issues and it forms the crux of the current work. The current study proposes Secure Interactional Proof System (SIPS) to address this challenge. This methodology has a few key essential components listed herewith to strengthen the security such as authentication, confidentiality, access control, integrity and the group of components such as AVK Scheme (Access List, Verifier and Key Generator). It is challenging for every user to… More >

  • Open AccessOpen Access

    ARTICLE

    Symbol Detection Based on Back Tracking Search Algorithm in MIMO-NOMA Systems

    M. Nuri Seyman*
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 795-804, 2022, DOI:10.32604/csse.2022.019734 - 09 September 2021
    (This article belongs to the Special Issue: Emerging Trends in Intelligent Communication and Wireless Technologies)
    Abstract One of the most important methods used to cope with multipath fading effects, which cause the symbol to be received incorrectly in wireless communication systems, is the use of multiple transceiver antenna structures. By combining the multi-input multi-output (MIMO) antenna structure with non-orthogonal multiple access (NOMA), which is a new multiplexing method, the fading effects of the channels are not only reduced but also high data rate transmission is ensured. However, when the maximum likelihood (ML) algorithm that has high performance on coherent detection, is used as a symbol detector in MIMO NOMA systems, the… More >

  • Open AccessOpen Access

    ARTICLE

    Computerized Detection of Limbal Stem Cell Deficiency from Digital Cornea Images

    Hanan A. Hosni Mahmoud*, Doaa S. Khafga, Amal H. Alharbi
    Computer Systems Science and Engineering, Vol.40, No.2, pp. 805-821, 2022, DOI:10.32604/csse.2022.019633 - 09 September 2021
    Abstract Limbal Stem Cell Deficiency (LSCD) is an eye disease that can cause corneal opacity and vascularization. In its advanced stage it can lead to a degree of visual impairment. It involves the changing in the semispherical shape of the cornea to a drooping shape to downwards direction. LSCD is hard to be diagnosed at early stages. The color and texture of the cornea surface can provide significant information about the cornea affected by LSCD. Parameters such as shape and texture are very crucial to differentiate normal from LSCD cornea. Although several medical approaches exist, most… More >

Per Page:

Share Link