Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (18)
  • Open Access

    ARTICLE

    Enhancing Building Facade Image Segmentation via Object-Wise Processing and Cascade U-Net

    Haemin Jung1, Heesung Park2, Hae Sun Jung3, Kwangyon Lee4,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2261-2279, 2024, DOI:10.32604/cmc.2024.057118 - 18 November 2024

    Abstract The growing demand for energy-efficient solutions has led to increased interest in analyzing building facades, as buildings contribute significantly to energy consumption in urban environments. However, conventional image segmentation methods often struggle to capture fine details such as edges and contours, limiting their effectiveness in identifying areas prone to energy loss. To address this challenge, we propose a novel segmentation methodology that combines object-wise processing with a two-stage deep learning model, Cascade U-Net. Object-wise processing isolates components of the facade, such as walls and windows, for independent analysis, while Cascade U-Net incorporates contour information to… More >

  • Open Access

    ARTICLE

    Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption

    Zongbao Jiang, Minqing Zhang*, Weina Dong, Chao Jiang, Fuqiang Di

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1123-1155, 2024, DOI:10.32604/cmc.2024.055120 - 15 October 2024

    Abstract With the rapid advancement of cloud computing technology, reversible data hiding algorithms in encrypted images (RDH-EI) have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments. However, existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios. To address these challenges, this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection (AMED) and ciphertext-policy attribute-based encryption (CP-ABE). This proposed algorithm enhances the conventional median edge detection (MED) by incorporating dynamic variables to improve pixel prediction… More >

  • Open Access

    ARTICLE

    An Adaptive Edge Detection Algorithm for Weed Image Analysis

    Yousef Alhwaiti1,*, Muhammad Hameed Siddiqi1, Irshad Ahmad2

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3011-3031, 2023, DOI:10.32604/csse.2023.042110 - 09 November 2023

    Abstract Weeds are one of the utmost damaging agricultural annoyers that have a major influence on crops. Weeds have the responsibility to get higher production costs due to the waste of crops and also have a major influence on the worldwide agricultural economy. The significance of such concern got motivation in the research community to explore the usage of technology for the detection of weeds at early stages that support farmers in agricultural fields. Some weed methods have been proposed for these fields; however, these algorithms still have challenges as they were implemented against controlled environments.… More >

  • Open Access

    ARTICLE

    Research and Application of Log Defect Detection and Visualization System Based on Dry Coupling Ultrasonic Method

    Yongning Yuan1, Dong Zhang2, Usama Sayed3, Hao Zhu1, Jun Wang4, Xiaojun Yang2, Zheng Wang2,*

    Journal of Renewable Materials, Vol.11, No.11, pp. 3917-3932, 2023, DOI:10.32604/jrm.2023.028764 - 31 October 2023

    Abstract In order to optimize the wood internal quality detection and evaluation system and improve the comprehensive utilization rate of wood, this paper invented a set of log internal defect detection and visualization system by using the ultrasonic dry coupling agent method. The detection and visualization analysis of internal log defects were realized through log specimen test. The main conclusions show that the accuracy, reliability and practicability of the system for detecting the internal defects of log specimens have been effectively verified. The system can make the edge of the detected image smooth by interpolation algorithm, More >

  • Open Access

    ARTICLE

    A Novel Color Image Watermarking Method with Adaptive Scaling Factor Using Similarity-Based Edge Region

    Kali Gurkahraman1,*, Rukiye Karakis2, Hidayet Takci1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 55-77, 2023, DOI:10.32604/csse.2023.037798 - 26 May 2023

    Abstract This study aimed to deal with three challenges: robustness, imperceptibility, and capacity in the image watermarking field. To reach a high capacity, a novel similarity-based edge detection algorithm was developed that finds more edge points than traditional techniques. The colored watermark image was created by inserting a randomly generated message on the edge points detected by this algorithm. To ensure robustness and imperceptibility, watermark and cover images were combined in the high-frequency subbands using Discrete Wavelet Transform and Singular Value Decomposition. In the watermarking stage, the watermark image was weighted by the adaptive scaling factor More >

  • Open Access

    ARTICLE

    An Active Image Forgery Detection Approach Based on Edge Detection

    Hüseyin Bilal Macit1, Arif Koyun2,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1603-1619, 2023, DOI:10.32604/cmc.2023.036216 - 06 February 2023

    Abstract Recently, digital images have become the most used data, thanks to high internet speed and high resolution, cheap and easily accessible digital cameras. We generate, transmit and store millions of images every second. Most of these images are insignificant images containing only personal information. However, in many fields such as banking, finance, public institutions, and educational institutions, the images of many valuable objects like ID cards, photographs, credit cards, and transaction receipts are stored and transmitted to the digital environment. These images are very significant and must be secured. A valuable image can be maliciously… More >

  • Open Access

    ARTICLE

    Color Edge Detection Using Multidirectional Sobel Filter and Fuzzy Fusion

    Slim Ben Chaabane1,2,*, Anas Bushnag1

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2839-2852, 2023, DOI:10.32604/cmc.2023.032760 - 31 October 2022

    Abstract A new model is proposed in this paper on color edge detection that uses the second derivative operators and data fusion mechanism. The second-order neighborhood shows the connection between the current pixel and the surroundings of this pixel. This connection is for each RGB component color of the input image. Once the image edges are detected for the three primary colors: red, green, and blue, these colors are merged using the combination rule. Then, the final decision is applied to obtain the segmentation. This process allows different data sources to be combined, which is essential More >

  • Open Access

    ARTICLE

    Intelligent Machine Learning Enabled Retinal Blood Vessel Segmentation and Classification

    Nora Abdullah Alkhaldi1,*, Hanan T. Halawani2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 399-414, 2023, DOI:10.32604/cmc.2023.030872 - 22 September 2022

    Abstract Automated segmentation of blood vessels in retinal fundus images is essential for medical image analysis. The segmentation of retinal vessels is assumed to be essential to the progress of the decision support system for initial analysis and treatment of retinal disease. This article develops a new Grasshopper Optimization with Fuzzy Edge Detection based Retinal Blood Vessel Segmentation and Classification (GOFED-RBVSC) model. The proposed GOFED-RBVSC model initially employs contrast enhancement process. Besides, GOAFED approach is employed to detect the edges in the retinal fundus images in which the use of GOA adjusts the membership functions. The More >

  • Open Access

    ARTICLE

    Spoofing Face Detection Using Novel Edge-Net Autoencoder for Security

    Amal H. Alharbi1, S. Karthick2, K. Venkatachalam3, Mohamed Abouhawwash4,5, Doaa Sami Khafaga1,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2773-2787, 2023, DOI:10.32604/iasc.2023.030763 - 17 August 2022

    Abstract Recent security applications in mobile technologies and computer systems use face recognition for high-end security. Despite numerous security techniques, face recognition is considered a high-security control. Developers fuse and carry out face identification as an access authority into these applications. Still, face identification authentication is sensitive to attacks with a 2-D photo image or captured video to access the system as an authorized user. In the existing spoofing detection algorithm, there was some loss in the recreation of images. This research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame… More >

  • Open Access

    ARTICLE

    Community Detection Using Jaacard Similarity with SIM-Edge Detection Techniques

    K. Chitra*, A. Tamilarasi

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 327-337, 2023, DOI:10.32604/csse.2023.023920 - 01 June 2022

    Abstract The structure and dynamic nature of real-world networks can be revealed by communities that help in promotion of recommendation systems. Social Media platforms were initially developed for effective communication, but now it is being used widely for extending and to obtain profit among business community. The numerous data generated through these platforms are utilized by many companies that make a huge profit out of it. A giant network of people in social media is grouped together based on their similar properties to form a community. Community detection is recent topic among the research community due… More >

Displaying 1-10 on page 1 of 18. Per Page