Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (171)
  • Open Access

    ARTICLE

    A Unique Discrete Wavelet & Deterministic Walk-Based Glaucoma Classification Approach Using Image-Specific Enhanced Retinal Images

    Krishna Santosh Naidana, Soubhagya Sankar Barpanda*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 699-720, 2023, DOI:10.32604/csse.2023.036744

    Abstract Glaucoma is a group of ocular atrophy diseases that cause progressive vision loss by affecting the optic nerve. Because of its asymptomatic nature, glaucoma has become the leading cause of human blindness worldwide. In this paper, a novel computer-aided diagnosis (CAD) approach for glaucomatous retinal image classification has been introduced. It extracts graph-based texture features from structurally improved fundus images using discrete wavelet-transformation (DWT) and deterministic tree-walk (DTW) procedures. Retinal images are considered from both public repositories and eye hospitals. Images are enhanced with image-specific luminance and gradient transitions for both contrast and texture improvement. The enhanced images are mapped… More >

  • Open Access

    ARTICLE

    Power Quality Improvement Using ANN Controller For Hybrid Power Distribution Systems

    Abdul Quawi1,*, Y. Mohamed Shuaib1, M. Manikandan2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3469-3486, 2023, DOI:10.32604/iasc.2023.035001

    Abstract In this work, an Artificial Neural Network (ANN) based technique is suggested for classifying the faults which occur in hybrid power distribution systems. Power, which is generated by the solar and wind energy-based hybrid system, is given to the grid at the Point of Common Coupling (PCC). A boost converter along with perturb and observe (P&O) algorithm is utilized in this system to obtain a constant link voltage. In contrast, the link voltage of the wind energy conversion system (WECS) is retained with the assistance of a Proportional Integral (PI) controller. The grid synchronization is tainted with the assistance of… More >

  • Open Access

    ARTICLE

    Dual Image Cryptosystem Using Henon Map and Discrete Fourier Transform

    Hesham Alhumyani*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2933-2945, 2023, DOI:10.32604/iasc.2023.034689

    Abstract This paper introduces an efficient image cryptography system. The proposed image cryptography system is based on employing the two-dimensional (2D) chaotic henon map (CHM) in the Discrete Fourier Transform (DFT). The proposed DFT-based CHM image cryptography has two procedures which are the encryption and decryption procedures. In the proposed DFT-based CHM image cryptography, the confusion is employed using the CHM while the diffusion is realized using the DFT. So, the proposed DFT-based CHM image cryptography achieves both confusion and diffusion characteristics. The encryption procedure starts by applying the DFT on the image then the DFT transformed image is scrambled using… More >

  • Open Access

    ARTICLE

    Crack Segmentation Based on Fusing Multi-Scale Wavelet and Spatial-Channel Attention

    Peng Geng*, Ji Lu, Hongtao Ma, Guiyi Yang

    Structural Durability & Health Monitoring, Vol.17, No.1, pp. 1-22, 2023, DOI:10.32604/sdhm.2023.018632

    Abstract Accurate and reliable crack segmentation is a challenge and meaningful task. In this article, aiming at the characteristics of cracks on the concrete images, the intensity frequency information of source images which is obtained by Discrete Wavelet Transform (DWT) is fed into deep learning-based networks to enhance the ability of network on crack segmentation. To well integrate frequency information into network an effective and novel DWTA module based on the DWT and scSE attention mechanism is proposed. The semantic information of cracks is enhanced and the irrelevant information is suppressed by DWTA module. And the gap between frequency information and… More >

  • Open Access

    ARTICLE

    Adaptive Weighted Flow Net Algorithm for Human Activity Recognition Using Depth Learned Features

    G. Augusta Kani*, P. Geetha

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1447-1469, 2023, DOI:10.32604/csse.2023.035969

    Abstract Human Activity Recognition (HAR) from video data collections is the core application in vision tasks and has a variety of utilizations including object detection applications, video-based behavior monitoring, video classification, and indexing, patient monitoring, robotics, and behavior analysis. Although many techniques are available for HAR in video analysis tasks, most of them are not focusing on behavioral analysis. Hence, a new HAR system analysis the behavioral activity of a person based on the deep learning approach proposed in this work. The most essential aim of this work is to recognize the complex activities that are useful in many tasks that… More >

  • Open Access

    ARTICLE

    A Novel Motor Fault Diagnosis Method Based on Generative Adversarial Learning with Distribution Fusion of Discrete Working Conditions

    Qixin Lan, Binqiang Chen*, Bin Yao

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 2017-2037, 2023, DOI:10.32604/cmes.2023.025307

    Abstract Many kinds of electrical equipment are used in civil and building engineering. The motor is one of the main power components of this electrical equipment, which can provide stable power output. During the long-term use of motors, various motor faults may occur, which affects the normal use of electrical equipment and even causes accidents. It is significant to apply fault diagnosis for the motors at the construction site. Aiming at the problem that signal data of faulty motor lack diversity, this research designs a multi-layer perceptron Wasserstein generative adversarial network, which is used to enhance training data through distribution fusion.… More >

  • Open Access

    ARTICLE

    Robust Image Watermarking Using LWT and Stochastic Gradient Firefly Algorithm

    Sachin Sharma1,*, Meena Malik2, Chander Prabha3, Amal Al-Rasheed4, Mona Alduailij4, Sultan Almakdi5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 393-407, 2023, DOI:10.32604/cmc.2023.033536

    Abstract Watermarking of digital images is required in diversified applications ranging from medical imaging to commercial images used over the web. Usually, the copyright information is embossed over the image in the form of a logo at the corner or diagonal text in the background. However, this form of visible watermarking is not suitable for a large class of applications. In all such cases, a hidden watermark is embedded inside the original image as proof of ownership. A large number of techniques and algorithms are proposed by researchers for invisible watermarking. In this paper, we focus on issues that are critical… More >

  • Open Access

    ARTICLE

    Hybrid Watermarking and Encryption Techniques for Securing Medical Images

    Amel Ali Alhussan1,*, Hanaa A. Abdallah2, Sara Alsodairi2, Abdelhamied A. Ateya3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 403-416, 2023, DOI:10.32604/csse.2023.035048

    Abstract Securing medical data while transmission on the network is required because it is sensitive and life-dependent data. Many methods are used for protection, such as Steganography, Digital Signature, Cryptography, and Watermarking. This paper introduces a novel robust algorithm that combines discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) digital image-watermarking algorithms. The host image is decomposed using a two-dimensional DWT (2D-DWT) to approximate low-frequency sub-bands in the embedding process. Then the sub-band low-high (LH) is decomposed using 2D-DWT to four new sub-bands. The resulting sub-band low-high (LH1) is decomposed using 2D-DWT to four new sub-bands.… More >

  • Open Access

    ARTICLE

    Anomaly Detection Based on Discrete Wavelet Transformation for Insider Threat Classification

    Dong-Wook Kim1, Gun-Yoon Shin1, Myung-Mook Han2,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 153-164, 2023, DOI:10.32604/csse.2023.034589

    Abstract Unlike external attacks, insider threats arise from legitimate users who belong to the organization. These individuals may be a potential threat for hostile behavior depending on their motives. For insider detection, many intrusion detection systems learn and prevent known scenarios, but because malicious behavior has similar patterns to normal behavior, in reality, these systems can be evaded. Furthermore, because insider threats share a feature space similar to normal behavior, identifying them by detecting anomalies has limitations. This study proposes an improved anomaly detection methodology for insider threats that occur in cybersecurity in which a discrete wavelet transformation technique is applied… More >

  • Open Access

    ARTICLE

    The Effects of the Particle Size Ratio on the Behaviors of Binary Granular Materials

    Deze Yang, Xihua Chu*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 63-85, 2023, DOI:10.32604/cmes.2023.025062

    Abstract The particle size ratio (PSR) is an important parameter for binary granular materials, which may affect the microstructure and macro behaviors of granular materials. However, the effect of particle ratio on granular assemblies with different arrangements is still unclear. To explore and further clarify the effect of PSR in different packing structures, three types of numerical samples with regular, layered, and random packing are designed. Numerical results show that PSR has significant effects on binary granular samples with regular packing. The larger the PSR, the stronger the strength, the larger the modulus, and the smaller the angle between the shear… More >

Displaying 21-30 on page 3 of 171. Per Page