Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    Classification of Electroencephalogram Signals Using LSTM and SVM Based on Fast Walsh-Hadamard Transform

    Saeed Mohsen1,2,*, Sherif S. M. Ghoneim3, Mohammed S. Alzaidi3, Abdullah Alzahrani3, Ashraf Mohamed Ali Hassan4

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5271-5286, 2023, DOI:10.32604/cmc.2023.038758 - 29 April 2023

    Abstract Classification of electroencephalogram (EEG) signals for humans can be achieved via artificial intelligence (AI) techniques. Especially, the EEG signals associated with seizure epilepsy can be detected to distinguish between epileptic and non-epileptic regions. From this perspective, an automated AI technique with a digital processing method can be used to improve these signals. This paper proposes two classifiers: long short-term memory (LSTM) and support vector machine (SVM) for the classification of seizure and non-seizure EEG signals. These classifiers are applied to a public dataset, namely the University of Bonn, which consists of 2 classes –seizure and… More >

  • Open Access

    ARTICLE

    A Hybrid Security Framework for Medical Image Communication

    Walid El-Shafai1,2, Hayam A. Abd El-Hameed3, Ashraf A. M. Khalaf3, Naglaa F. Soliman4, Amel A. Alhussan5,*, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2713-2730, 2022, DOI:10.32604/cmc.2022.028739 - 16 June 2022

    Abstract Authentication of the digital image has much attention for the digital revolution. Digital image authentication can be verified with image watermarking and image encryption schemes. These schemes are widely used to protect images against forgery attacks, and they are useful for protecting copyright and rightful ownership. Depending on the desirable applications, several image encryption and watermarking schemes have been proposed to moderate this attention. This framework presents a new scheme that combines a Walsh Hadamard Transform (WHT)-based image watermarking scheme with an image encryption scheme based on Double Random Phase Encoding (DRPE). First, on the More >

  • Open Access

    ARTICLE

    Field Programmable Gate Arrays (FPGA) Based Computational Complexity Analysis of Multicarrier Waveforms

    C. Ajitha1,*, T. Jaya2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1033-1048, 2022, DOI:10.32604/iasc.2022.021984 - 03 May 2022

    Abstract Multicarrier waveforms with enhanced spectral efficiency, low latency, and high throughput are required for 5G wireless networks. The Orthogonal Frequency Division Multiplexing (OFDM) method is well-known in research, but due to its limited spectral efficiency, various alternative waveforms are being considered for 5G systems. In the recent communication world, NOMA (non-orthogonal multiple access) plays a significant part due to its wider transmission of data with less bandwidth allocation. Even if a high data rate can be attained, the transmission problem will arise due to the spread of multiple paths. In order to reduce complexity and… More >

  • Open Access

    ARTICLE

    A Reversible Data Hiding Algorithm Based on Secret Sharing

    Xin Jin*, Lanxin Su, Jitao Huang

    Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 69-82, 2021, DOI:10.32604/jihpp.2021.014108 - 30 July 2021

    Abstract In traditional secret sharing schemes, all shared images containing secret segments are needed to recover secret information. In this paper, a reversible data hiding scheme based on Shamir secret sharing is used. Secret information can be recovered even if only part of the encrypted sharing is owned. This method can reduce the vulnerability of traditional encryption sharing schemes to attack. Before uploading the secret information to the cloud server, embed the encrypted n segments of secret information into n different pictures. The receiver downloads t images from the cloud server (t < n), extracts the More >

  • Open Access

    ARTICLE

    Cloning and characterization of 5-enopyruvylshikimate-3-phosphate synthase from Phragmites australis

    ZHIHUI WANG1, YE YUAN2,*

    BIOCELL, Vol.44, No.4, pp. 731-736, 2020, DOI:10.32604/biocell.2020.010575 - 24 December 2020

    Abstract Glyphosate is a non-selective broad-spectrum herbicide that blocks plant growth by inhibiting 5- Enolpyruvylshikimate-3-phosphate synthase (EPSPS), a key enzyme of the shikimate pathway in microorganisms and plants. The full-length epsps cDNA sequence (paepsps, Genebank: KY860582.1) was cloned and characterized for the first time from Phragmites australis. The full-length cDNA of paepsps was 1308 bp encoding a polypeptide of 435 amino acids. The bioinformatic analyses showed that PaEPSPS has highly homologous with EPSPS from other plants. RT-PCR analysis of paepsps expression indicated that the gene expressed in leaves, stems, and roots, with higher expression in leaves. The expression of More >

  • Open Access

    ARTICLE

    PERFORMANCE OF THE OPTIMIZED TREE-TYPE CYLINDRICALSHAPED NANOPOROUS FILTERING MEMBRANES WITH 9 OR 10 BRANCH PORES IN EACH PORE TREE

    Yongbin Zhang*

    Frontiers in Heat and Mass Transfer, Vol.11, pp. 1-5, 2018, DOI:10.5098/hmt.11.26

    Abstract The paper analytically studies the performance of the optimized tree-type cylindrical-shaped nanoporous filtering membranes with 9 or 10 branch pores in each pore tree. The optimum ratio of the radius of the trunk pore to the radius of its branch pore was found. The corresponding lowest flow resistances of the membranes were typically calculated respectively for weak, medium and strong liquid-pore wall interactions. For liquid-liquid separations, the optimum radii of the trunk pore in the membranes were calculated according to the weak liquid-pore wall interaction. The capability of the liquidliquid separation of the membranes was More >

Displaying 1-10 on page 1 of 6. Per Page