Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    Enhanced Nature Inspired-Support Vector Machine for Glaucoma Detection

    Jahanzaib Latif1, Shanshan Tu1,*, Chuangbai Xiao1, Anas Bilal2, Sadaqat Ur Rehman3, Zohaib Ahmad4

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1151-1172, 2023, DOI:10.32604/cmc.2023.040152 - 08 June 2023

    Abstract Glaucoma is a progressive eye disease that can lead to blindness if left untreated. Early detection is crucial to prevent vision loss, but current manual scanning methods are expensive, time-consuming, and require specialized expertise. This study presents a novel approach to Glaucoma detection using the Enhanced Grey Wolf Optimized Support Vector Machine (EGWO-SVM) method. The proposed method involves preprocessing steps such as removing image noise using the adaptive median filter (AMF) and feature extraction using the previously processed speeded-up robust feature (SURF), histogram of oriented gradients (HOG), and Global features. The enhanced Grey Wolf Optimization More >

  • Open Access

    ARTICLE

    Ship Detection and Recognition Based on Improved YOLOv7

    Wei Wu1, Xiulai Li2, Zhuhua Hu1, Xiaozhang Liu3,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 489-498, 2023, DOI:10.32604/cmc.2023.039929 - 08 June 2023

    Abstract In this paper, an advanced YOLOv7 model is proposed to tackle the challenges associated with ship detection and recognition tasks, such as the irregular shapes and varying sizes of ships. The improved model replaces the fixed anchor boxes utilized in conventional YOLOv7 models with a set of more suitable anchor boxes specifically designed based on the size distribution of ships in the dataset. This paper also introduces a novel multi-scale feature fusion module, which comprises Path Aggregation Network (PAN) modules, enabling the efficient capture of ship features across different scales. Furthermore, data preprocessing is enhanced More >

  • Open Access

    ARTICLE

    A Flexible Architecture for Cryptographic Applications: ECC and PRESENT

    Muhammad Rashid1,*, Omar S. Sonbul1, Muhammad Arif2, Furqan Aziz Qureshi3, Saud. S. Alotaibi4, Mohammad H. Sinky1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1009-1025, 2023, DOI:10.32604/cmc.2023.039901 - 08 June 2023

    Abstract This work presents a flexible/unified hardware architecture of Elliptic-curve Cryptography (ECC) and PRESENT for cryptographic applications. The features of the proposed work are (i) computation of only the point multiplication operation of ECC over for a 163-bit key generation, (ii) execution of only the variant of an 80-bit PRESENT block cipher for data encryption & decryption and (iii) execution of point multiplication operation (ECC algorithm) along with the data encryption and decryption (PRESENT algorithm). To establish an area overhead for the flexible design, dedicated hardware architectures of ECC and PRESENT are implemented in the first More >

  • Open Access

    ARTICLE

    Fractional Processing Based Adaptive Beamforming Algorithm

    Syed Asghar Ali Shah1, Tariqullah Jan1, Syed Muslim Shah2, Ruhul Amin Khalil1,*, Ahmad Sawalmeh3, Muhammad Anan4

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1065-1084, 2023, DOI:10.32604/cmc.2023.039826 - 08 June 2023

    Abstract Fractional order algorithms have shown promising results in various signal processing applications due to their ability to improve performance without significantly increasing complexity. The goal of this work is to investigate the use of fractional order algorithm in the field of adaptive beamforming, with a focus on improving performance while keeping complexity lower. The effectiveness of the algorithm will be studied and evaluated in this context. In this paper, a fractional order least mean square (FLMS) algorithm is proposed for adaptive beamforming in wireless applications for effective utilization of resources. This algorithm aims to improve… More >

  • Open Access

    ARTICLE

    Novel Framework for Generating Criminals Images Based on Textual Data Using Identity GANs

    Mohamed Fathallah1,*, Mohamed Sakr2, Sherif Eletriby2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 383-396, 2023, DOI:10.32604/cmc.2023.039824 - 08 June 2023

    Abstract Text-to-image generation is a vital task in different fields, such as combating crime and terrorism and quickly arresting lawbreakers. For several years, due to a lack of deep learning and machine learning resources, police officials required artists to draw the face of a criminal. Traditional methods of identifying criminals are inefficient and time-consuming. This paper presented a new proposed hybrid model for converting the text into the nearest images, then ranking the produced images according to the available data. The framework contains two main steps: generation of the image using an Identity Generative Adversarial Network… More >

  • Open Access

    ARTICLE

    NTRU_ SSS: Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing

    Asma Ibrahim Hussein1,*, Abeer Tariq MaoLood2, Ekhlas Khalaf Gbashi2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 753-769, 2023, DOI:10.32604/cmc.2023.039804 - 08 June 2023

    Abstract With the advent of quantum computing, numerous efforts have been made to standardize post-quantum cryptosystems with the intention of (eventually) replacing Elliptic Curve Cryptography (ECC) and Rivets-Shamir-Adelman (RSA). A modified version of the traditional N-Th Degree Truncated Polynomial Ring (NTRU) cryptosystem called NTRU Prime has been developed to reduce the attack surface. In this paper, the Signcryption scheme was proposed, and it is most efficient than others since it reduces the complexity and runs the time of the code execution, and at the same time, provides a better security degree since it ensures the integrity… More >

  • Open Access

    ARTICLE

    Deep Transfer Learning Based Detection and Classification of Citrus Plant Diseases

    Shah Faisal1, Kashif Javed1, Sara Ali1, Areej Alasiry2, Mehrez Marzougui2, Muhammad Attique Khan3,*, Jae-Hyuk Cha4,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 895-914, 2023, DOI:10.32604/cmc.2023.039781 - 08 June 2023

    Abstract Citrus fruit crops are among the world’s most important agricultural products, but pests and diseases impact their cultivation, resulting in yield and quality losses. Computer vision and machine learning have been widely used to detect and classify plant diseases over the last decade, allowing for early disease detection and improving agricultural production. This paper presented an automatic system for the early detection and classification of citrus plant diseases based on a deep learning (DL) model, which improved accuracy while decreasing computational complexity. The most recent transfer learning-based models were applied to the Citrus Plant Dataset More >

  • Open Access

    ARTICLE

    Anomalous Situations Recognition in Surveillance Images Using Deep Learning

    Qurat-ul-Ain Arshad1, Mudassar Raza1, Wazir Zada Khan2, Ayesha Siddiqa2, Abdul Muiz2, Muhammad Attique Khan3,*, Usman Tariq4, Taerang Kim5, Jae-Hyuk Cha5,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1103-1125, 2023, DOI:10.32604/cmc.2023.039752 - 08 June 2023

    Abstract Anomalous situations in surveillance videos or images that may result in security issues, such as disasters, accidents, crime, violence, or terrorism, can be identified through video anomaly detection. However, differentiating anomalous situations from normal can be challenging due to variations in human activity in complex environments such as train stations, busy sporting fields, airports, shopping areas, military bases, care centers, etc. Deep learning models’ learning capability is leveraged to identify abnormal situations with improved accuracy. This work proposes a deep learning architecture called Anomalous Situation Recognition Network (ASRNet) for deep feature extraction to improve the… More >

  • Open Access

    ARTICLE

    Deletion and Recovery Scheme of Electronic Health Records Based on Medical Certificate Blockchain

    Baowei Wang1,2,*, Neng Wang1, Yuxiao Zhang1, Zenghui Xu1, Junhao Zhang1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 849-859, 2023, DOI:10.32604/cmc.2023.039749 - 08 June 2023

    Abstract The trusted sharing of Electronic Health Records (EHRs) can realize the efficient use of medical data resources. Generally speaking, EHRs are widely used in blockchain-based medical data platforms. EHRs are valuable private assets of patients, and the ownership belongs to patients. While recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals, it does not address the challenge of record sharing when patients revisit doctors. In order to solve this problem, this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate Blockchain. This paper uses… More >

  • Open Access

    ARTICLE

    MEM-TET: Improved Triplet Network for Intrusion Detection System

    Weifei Wang1, Jinguo Li1,*, Na Zhao2, Min Liu1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 471-487, 2023, DOI:10.32604/cmc.2023.039733 - 08 June 2023

    Abstract With the advancement of network communication technology, network traffic shows explosive growth. Consequently, network attacks occur frequently. Network intrusion detection systems are still the primary means of detecting attacks. However, two challenges continue to stymie the development of a viable network intrusion detection system: imbalanced training data and new undiscovered attacks. Therefore, this study proposes a unique deep learning-based intrusion detection method. We use two independent in-memory autoencoders trained on regular network traffic and attacks to capture the dynamic relationship between traffic features in the presence of unbalanced training data. Then the original data is… More >

Displaying 9171-9180 on page 918 of 31561. Per Page