Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23)
  • Open Access

    ARTICLE

    A Systematic Comparison of Discrete Cosine Transform-Based Approaches for Multi-Focus Image Fusion

    Muhammad Osama1, Sarwar Shah Khan2,*, Sajid Khan2, Muzammil Khan3, Mian Muhammad Danyal4, Reshma Khan1

    Digital Engineering and Digital Twin, Vol.3, pp. 17-34, 2025, DOI:10.32604/dedt.2025.066344 - 19 August 2025

    Abstract Image fusion is a technique used to combine essential information from two or more source images into a single, more informative output image. The resulting fused image contains more meaningful details than any individual source image. This study focuses on multi-focus image fusion, a crucial area in image processing. Due to the limited depth of field of optical lenses, it is often challenging to capture an image where all areas are in focus simultaneously. As a result, multi-focus image fusion plays a key role in integrating and extracting the necessary details from different focal regions.… More >

  • Open Access

    ARTICLE

    Addressing Class Overlap in Sonic Hedgehog Medulloblastoma Molecular Subtypes Classification Using Under-Sampling and SVD-Enhanced Multinomial Regression

    Isra Mohammed1, Mohamed Elhafiz M. Musa2, Murtada K. Elbashir3,*, Ayman Mohamed Mostafa3, Amin Ibrahim Adam4, Mahmood A. Mahmood3, Areeg S. Faggad5

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3749-3763, 2025, DOI:10.32604/cmc.2025.063880 - 03 July 2025

    Abstract Sonic Hedgehog Medulloblastoma (SHH-MB) is one of the four primary molecular subgroups of Medulloblastoma. It is estimated to be responsible for nearly one-third of all MB cases. Using transcriptomic and DNA methylation profiling techniques, new developments in this field determined four molecular subtypes for SHH-MB. SHH-MB subtypes show distinct DNA methylation patterns that allow their discrimination from overlapping subtypes and predict clinical outcomes. Class overlapping occurs when two or more classes share common features, making it difficult to distinguish them as separate. Using the DNA methylation dataset, a novel classification technique is presented to address… More >

  • Open Access

    ARTICLE

    DeepSVDNet: A Deep Learning-Based Approach for Detecting and Classifying Vision-Threatening Diabetic Retinopathy in Retinal Fundus Images

    Anas Bilal1, Azhar Imran2, Talha Imtiaz Baig3,4, Xiaowen Liu1,*, Haixia Long1, Abdulkareem Alzahrani5, Muhammad Shafiq6

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 511-528, 2024, DOI:10.32604/csse.2023.039672 - 19 March 2024

    Abstract Artificial Intelligence (AI) is being increasingly used for diagnosing Vision-Threatening Diabetic Retinopathy (VTDR), which is a leading cause of visual impairment and blindness worldwide. However, previous automated VTDR detection methods have mainly relied on manual feature extraction and classification, leading to errors. This paper proposes a novel VTDR detection and classification model that combines different models through majority voting. Our proposed methodology involves preprocessing, data augmentation, feature extraction, and classification stages. We use a hybrid convolutional neural network-singular value decomposition (CNN-SVD) model for feature extraction and selection and an improved SVM-RBF with a Decision Tree More >

  • Open Access

    ARTICLE

    A Novel Color Image Watermarking Method with Adaptive Scaling Factor Using Similarity-Based Edge Region

    Kali Gurkahraman1,*, Rukiye Karakis2, Hidayet Takci1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 55-77, 2023, DOI:10.32604/csse.2023.037798 - 26 May 2023

    Abstract This study aimed to deal with three challenges: robustness, imperceptibility, and capacity in the image watermarking field. To reach a high capacity, a novel similarity-based edge detection algorithm was developed that finds more edge points than traditional techniques. The colored watermark image was created by inserting a randomly generated message on the edge points detected by this algorithm. To ensure robustness and imperceptibility, watermark and cover images were combined in the high-frequency subbands using Discrete Wavelet Transform and Singular Value Decomposition. In the watermarking stage, the watermark image was weighted by the adaptive scaling factor More >

  • Open Access

    ARTICLE

    A Color Image Encryption Scheme Based on Singular Values and Chaos

    Adnan Malik1, Muhammad Ali1, Faisal S. Alsubaei2, Nisar Ahmed3,*, Harish Kumar4

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 965-999, 2023, DOI:10.32604/cmes.2023.022493 - 23 April 2023

    Abstract The security of digital images transmitted via the Internet or other public media is of the utmost importance. Image encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized entities. This study provides an approach to color image encryption that could find practical use in various contexts. The proposed method, which combines four chaotic systems, employs singular value decomposition and a chaotic sequence, making it both secure and compression-friendly. The unified average change intensity, the number of pixels’ change rate, information More >

  • Open Access

    ARTICLE

    A Cyber-Attack Detection System Using Late Fusion Aggregation Enabled Cyber-Net

    P. Shanmuga Prabha*, S. Magesh Kumar

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3101-3119, 2023, DOI:10.32604/iasc.2023.034885 - 15 March 2023

    Abstract Today, securing devices connected to the internet is challenging as security threats are generated through various sources. The protection of cyber-physical systems from external attacks is a primary task. The presented method is planned on the prime motive of detecting cybersecurity attacks and their impacted parameters. The proposed architecture employs the LYSIS dataset and formulates Multi Variant Exploratory Data Analysis (MEDA) through Principle Component Analysis (PCA) and Singular Value Decomposition (SVD) for the extraction of unique parameters. The feature mappings are analyzed with Recurrent 2 Convolutional Neural Network (R2CNN) and Gradient Boost Regression (GBR) to More >

  • Open Access

    ARTICLE

    A Novel Method to Enhance the Inversion Speed and Precision of the NMR T2 Spectrum by the TSVD Based Linearized Bregman Iteration

    Yiguo Chen1,2,3,*, Congjun Feng1,2, Yonghong He3, Zhijun Chen3, Xiaowei Fan3, Chao Wang3, Xinmin Ge4

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2451-2463, 2023, DOI:10.32604/cmes.2023.021145 - 09 March 2023

    Abstract The low-field nuclear magnetic resonance (NMR) technique has been used to probe the pore size distribution and the fluid composition in geophysical prospecting and related fields. However, the speed and accuracy of the existing numerical inversion methods are still challenging due to the ill-posed nature of the first kind Fredholm integral equation and the contamination of the noises. This paper proposes a novel inversion algorithm to accelerate the convergence and enhance the precision using empirical truncated singular value decompositions (TSVD) and the linearized Bregman iteration. The L1 penalty term is applied to construct the objective More > Graphic Abstract

    A Novel Method to Enhance the Inversion Speed and Precision of the NMR T<sub>2</sub> Spectrum by the TSVD Based Linearized Bregman Iteration

  • Open Access

    ARTICLE

    Hybrid Watermarking and Encryption Techniques for Securing Medical Images

    Amel Ali Alhussan1,*, Hanaa A. Abdallah2, Sara Alsodairi2, Abdelhamied A. Ateya3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 403-416, 2023, DOI:10.32604/csse.2023.035048 - 20 January 2023

    Abstract Securing medical data while transmission on the network is required because it is sensitive and life-dependent data. Many methods are used for protection, such as Steganography, Digital Signature, Cryptography, and Watermarking. This paper introduces a novel robust algorithm that combines discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) digital image-watermarking algorithms. The host image is decomposed using a two-dimensional DWT (2D-DWT) to approximate low-frequency sub-bands in the embedding process. Then the sub-band low-high (LH) is decomposed using 2D-DWT to four new sub-bands. The resulting sub-band low-high (LH1) is decomposed using 2D-DWT… More >

  • Open Access

    ARTICLE

    Effective and Efficient Video Compression by the Deep Learning Techniques

    Karthick Panneerselvam1,2,*, K. Mahesh1, V. L. Helen Josephine3, A. Ranjith Kumar2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1047-1061, 2023, DOI:10.32604/csse.2023.030513 - 03 November 2022

    Abstract Deep learning has reached many successes in Video Processing. Video has become a growing important part of our daily digital interactions. The advancement of better resolution content and the large volume offers serious challenges to the goal of receiving, distributing, compressing and revealing high-quality video content. In this paper we propose a novel Effective and Efficient video compression by the Deep Learning framework based on the flask, which creatively combines the Deep Learning Techniques on Convolutional Neural Networks (CNN) and Generative Adversarial Networks (GAN). The video compression method involves the layers are divided into different… More >

  • Open Access

    ARTICLE

    DWT-SVD Based Image Steganography Using Threshold Value Encryption Method

    Jyoti Khandelwal1, Vijay Kumar Sharma1, Dilbag Singh2,*, Atef Zaguia3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3299-3312, 2022, DOI:10.32604/cmc.2022.023116 - 29 March 2022

    Abstract Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system. This paper presents an image scrambling method that is very useful for grayscale secret images. In this method, the secret image decomposes in three parts based on the pixel's threshold value. The division of the color image into three parts is very easy based on the color channel but in the grayscale image, it is difficult to implement. The proposed image scrambling method is implemented in image More >

Displaying 1-10 on page 1 of 23. Per Page