Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21)
  • Open Access

    ARTICLE

    A Novel Color Image Watermarking Method with Adaptive Scaling Factor Using Similarity-Based Edge Region

    Kali Gurkahraman1,*, Rukiye Karakis2, Hidayet Takci1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 55-77, 2023, DOI:10.32604/csse.2023.037798 - 26 May 2023

    Abstract This study aimed to deal with three challenges: robustness, imperceptibility, and capacity in the image watermarking field. To reach a high capacity, a novel similarity-based edge detection algorithm was developed that finds more edge points than traditional techniques. The colored watermark image was created by inserting a randomly generated message on the edge points detected by this algorithm. To ensure robustness and imperceptibility, watermark and cover images were combined in the high-frequency subbands using Discrete Wavelet Transform and Singular Value Decomposition. In the watermarking stage, the watermark image was weighted by the adaptive scaling factor More >

  • Open Access

    ARTICLE

    Power Quality Improvement Using ANN Controller For Hybrid Power Distribution Systems

    Abdul Quawi1,*, Y. Mohamed Shuaib1, M. Manikandan2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3469-3486, 2023, DOI:10.32604/iasc.2023.035001 - 15 March 2023

    Abstract In this work, an Artificial Neural Network (ANN) based technique is suggested for classifying the faults which occur in hybrid power distribution systems. Power, which is generated by the solar and wind energy-based hybrid system, is given to the grid at the Point of Common Coupling (PCC). A boost converter along with perturb and observe (P&O) algorithm is utilized in this system to obtain a constant link voltage. In contrast, the link voltage of the wind energy conversion system (WECS) is retained with the assistance of a Proportional Integral (PI) controller. The grid synchronization is… More >

  • Open Access

    ARTICLE

    Crack Segmentation Based on Fusing Multi-Scale Wavelet and Spatial-Channel Attention

    Peng Geng*, Ji Lu, Hongtao Ma, Guiyi Yang

    Structural Durability & Health Monitoring, Vol.17, No.1, pp. 1-22, 2023, DOI:10.32604/sdhm.2023.018632 - 02 March 2023

    Abstract Accurate and reliable crack segmentation is a challenge and meaningful task. In this article, aiming at the characteristics of cracks on the concrete images, the intensity frequency information of source images which is obtained by Discrete Wavelet Transform (DWT) is fed into deep learning-based networks to enhance the ability of network on crack segmentation. To well integrate frequency information into network an effective and novel DWTA module based on the DWT and scSE attention mechanism is proposed. The semantic information of cracks is enhanced and the irrelevant information is suppressed by DWTA module. And the… More >

  • Open Access

    ARTICLE

    Robust Image Watermarking Using LWT and Stochastic Gradient Firefly Algorithm

    Sachin Sharma1,*, Meena Malik2, Chander Prabha3, Amal Al-Rasheed4, Mona Alduailij4, Sultan Almakdi5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 393-407, 2023, DOI:10.32604/cmc.2023.033536 - 06 February 2023

    Abstract Watermarking of digital images is required in diversified applications ranging from medical imaging to commercial images used over the web. Usually, the copyright information is embossed over the image in the form of a logo at the corner or diagonal text in the background. However, this form of visible watermarking is not suitable for a large class of applications. In all such cases, a hidden watermark is embedded inside the original image as proof of ownership. A large number of techniques and algorithms are proposed by researchers for invisible watermarking. In this paper, we focus… More >

  • Open Access

    ARTICLE

    Hybrid Watermarking and Encryption Techniques for Securing Medical Images

    Amel Ali Alhussan1,*, Hanaa A. Abdallah2, Sara Alsodairi2, Abdelhamied A. Ateya3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 403-416, 2023, DOI:10.32604/csse.2023.035048 - 20 January 2023

    Abstract Securing medical data while transmission on the network is required because it is sensitive and life-dependent data. Many methods are used for protection, such as Steganography, Digital Signature, Cryptography, and Watermarking. This paper introduces a novel robust algorithm that combines discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) digital image-watermarking algorithms. The host image is decomposed using a two-dimensional DWT (2D-DWT) to approximate low-frequency sub-bands in the embedding process. Then the sub-band low-high (LH) is decomposed using 2D-DWT to four new sub-bands. The resulting sub-band low-high (LH1) is decomposed using 2D-DWT… More >

  • Open Access

    ARTICLE

    Anomaly Detection Based on Discrete Wavelet Transformation for Insider Threat Classification

    Dong-Wook Kim1, Gun-Yoon Shin1, Myung-Mook Han2,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 153-164, 2023, DOI:10.32604/csse.2023.034589 - 20 January 2023

    Abstract Unlike external attacks, insider threats arise from legitimate users who belong to the organization. These individuals may be a potential threat for hostile behavior depending on their motives. For insider detection, many intrusion detection systems learn and prevent known scenarios, but because malicious behavior has similar patterns to normal behavior, in reality, these systems can be evaded. Furthermore, because insider threats share a feature space similar to normal behavior, identifying them by detecting anomalies has limitations. This study proposes an improved anomaly detection methodology for insider threats that occur in cybersecurity in which a discrete… More >

  • Open Access

    ARTICLE

    Implementation of VLSI on Signal Processing-Based Digital Architecture Using AES Algorithm

    Mohanapriya Marimuthu1, Santhosh Rajendran2, Reshma Radhakrishnan2, Kalpana Rengarajan3, Shahzada Khurram4, Shafiq Ahmad5, Abdelaty Edrees Sayed5, Muhammad Shafiq6,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4729-4745, 2023, DOI:10.32604/cmc.2023.033020 - 28 December 2022

    Abstract Continuous improvements in very-large-scale integration (VLSI) technology and design software have significantly broadened the scope of digital signal processing (DSP) applications. The use of application-specific integrated circuits (ASICs) and programmable digital signal processors for many DSP applications have changed, even though new system implementations based on reconfigurable computing are becoming more complex. Adaptable platforms that combine hardware and software programmability efficiency are rapidly maturing with discrete wavelet transformation (DWT) and sophisticated computerized design techniques, which are much needed in today’s modern world. New research and commercial efforts to sustain power optimization, cost savings, and improved… More >

  • Open Access

    ARTICLE

    Optimal IoT Based Improved Deep Learning Model for Medical Image Classification

    Prasanalakshmi Balaji1,*, B. Sri Revathi2, Praveetha Gobinathan3, Shermin Shamsudheen3, Thavavel Vaiyapuri4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2275-2291, 2022, DOI:10.32604/cmc.2022.028560 - 16 June 2022

    Abstract Recently medical image classification plays a vital role in medical image retrieval and computer-aided diagnosis system. Despite deep learning has proved to be superior to previous approaches that depend on handcrafted features; it remains difficult to implement because of the high intra-class variance and inter-class similarity generated by the wide range of imaging modalities and clinical diseases. The Internet of Things (IoT) in healthcare systems is quickly becoming a viable alternative for delivering high-quality medical treatment in today’s e-healthcare systems. In recent years, the Internet of Things (IoT) has been identified as one of the… More >

  • Open Access

    ARTICLE

    Research on Thunderstorm Identification Based on Discrete Wavelet Transform

    Xiaopeng Li1, Ziyuan Xu3,4, Jin Han1,*, Xingming Sun1,2, Yi Cao5

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1153-1166, 2022, DOI:10.32604/iasc.2022.023261 - 08 February 2022

    Abstract Lightning has been one of the most talked-about natural disasters worldwide in recent years, as it poses a great threat to all industries and can cause huge economic losses. Thunderstorms are often accompanied by natural phenomena such as lightning strikes and lightning, and many scholars have studied deeply the regulations of thunderstorm generation, movement and dissipation to reduce the risk of lightning damage. Most of the current methods for studying thunderstorms focus on using more complex algorithms based on radar or lightning data, which increases the computational burden and reduces the computational efficiency to some… More >

  • Open Access

    ARTICLE

    Synovial Sarcoma Classification Technique Using Support Vector Machine and Structure Features

    P. Arunachalam1, N. Janakiraman1,*, Arun Kumar Sivaraman2, A. Balasundaram3, Rajiv Vincent2, Sita Rani4, Barnali Dey5, A. Muralidhar2, M. Rajesh2

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1241-1259, 2022, DOI:10.32604/iasc.2022.022573 - 17 November 2021

    Abstract Digital clinical histopathology technique is used for accurately diagnosing cancer cells and achieving optimal results using Internet of Things (IoT) and blockchain technology. The cell pattern of Synovial Sarcoma (SS) cancer images always appeared as spindle shaped cell (SSC) structures. Identifying the SSC and its prognostic indicator are very crucial problems for computer aided diagnosis, especially in healthcare industry applications. A constructive framework has been proposed for the classification of SSC feature components using Support Vector Machine (SVM) with the assistance of relevant Support Vectors (SVs). This framework used the SS images, and it has… More >

Displaying 1-10 on page 1 of 21. Per Page