Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,234)
  • Open Access

    ARTICLE

    Clinical Knowledge-Based Hybrid Swin Transformer for Brain Tumor Segmentation

    Xiaoliang Lei1, Xiaosheng Yu2,*, Hao Wu3, Chengdong Wu2,*, Jingsi Zhang2

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3797-3811, 2023, DOI:10.32604/cmc.2023.042069 - 08 October 2023

    Abstract Accurate tumor segmentation from brain tissues in Magnetic Resonance Imaging (MRI) imaging is crucial in the pre-surgical planning of brain tumor malignancy. MRI images’ heterogeneous intensity and fuzzy boundaries make brain tumor segmentation challenging. Furthermore, recent studies have yet to fully employ MRI sequences’ considerable and supplementary information, which offers critical a priori knowledge. This paper proposes a clinical knowledge-based hybrid Swin Transformer multimodal brain tumor segmentation algorithm based on how experts identify malignancies from MRI images. During the encoder phase, a dual backbone network with a Swin Transformer backbone to capture long dependencies from… More >

  • Open Access

    ARTICLE

    A Double-Branch Xception Architecture for Acute Hemorrhage Detection and Subtype Classification

    Muhammad Naeem Akram1, Muhammad Usman Yaseen1, Muhammad Waqar1, Muhammad Imran1,*, Aftab Hussain2

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3727-3744, 2023, DOI:10.32604/cmc.2023.041855 - 08 October 2023

    Abstract This study presents a deep learning model for efficient intracranial hemorrhage (ICH) detection and subtype classification on non-contrast head computed tomography (CT) images. ICH refers to bleeding in the skull, leading to the most critical life-threatening health condition requiring rapid and accurate diagnosis. It is classified as intra-axial hemorrhage (intraventricular, intraparenchymal) and extra-axial hemorrhage (subdural, epidural, subarachnoid) based on the bleeding location inside the skull. Many computer-aided diagnoses (CAD)-based schemes have been proposed for ICH detection and classification at both slice and scan levels. However, these approaches perform only binary classification and suffer from a… More >

  • Open Access

    ARTICLE

    Binary Oriented Feature Selection for Valid Product Derivation in Software Product Line

    Muhammad Fezan Afzal1, Imran Khan1, Javed Rashid1,2,3, Mubbashar Saddique4,*, Heba G. Mohamed5

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3653-3670, 2023, DOI:10.32604/cmc.2023.041627 - 08 October 2023

    Abstract Software Product Line (SPL) is a group of software-intensive systems that share common and variable resources for developing a particular system. The feature model is a tree-type structure used to manage SPL’s common and variable features with their different relations and problem of Crosstree Constraints (CTC). CTC problems exist in groups of common and variable features among the sub-tree of feature models more diverse in Internet of Things (IoT) devices because different Internet devices and protocols are communicated. Therefore, managing the CTC problem to achieve valid product configuration in IoT-based SPL is more complex, time-consuming,… More >

  • Open Access

    ARTICLE

    Improving Sentiment Analysis in Election-Based Conversations on Twitter with ElecBERT Language Model

    Asif Khan1, Huaping Zhang1,*, Nada Boudjellal2, Arshad Ahmad3, Maqbool Khan3

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3345-3361, 2023, DOI:10.32604/cmc.2023.041520 - 08 October 2023

    Abstract Sentiment analysis plays a vital role in understanding public opinions and sentiments toward various topics. In recent years, the rise of social media platforms (SMPs) has provided a rich source of data for analyzing public opinions, particularly in the context of election-related conversations. Nevertheless, sentiment analysis of election-related tweets presents unique challenges due to the complex language used, including figurative expressions, sarcasm, and the spread of misinformation. To address these challenges, this paper proposes Election-focused Bidirectional Encoder Representations from Transformers (ElecBERT), a new model for sentiment analysis in the context of election-related tweets. Election-related tweets… More >

  • Open Access

    ARTICLE

    Multi-Layer Deep Sparse Representation for Biological Slice Image Inpainting

    Haitao Hu1, Hongmei Ma2, Shuli Mei1,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3813-3832, 2023, DOI:10.32604/cmc.2023.041416 - 08 October 2023

    Abstract Biological slices are an effective tool for studying the physiological structure and evolution mechanism of biological systems. However, due to the complexity of preparation technology and the presence of many uncontrollable factors during the preparation processing, leads to problems such as difficulty in preparing slice images and breakage of slice images. Therefore, we proposed a biological slice image small-scale corruption inpainting algorithm with interpretability based on multi-layer deep sparse representation, achieving the high-fidelity reconstruction of slice images. We further discussed the relationship between deep convolutional neural networks and sparse representation, ensuring the high-fidelity characteristic of… More >

  • Open Access

    ARTICLE

    An Intelligent Secure Adversarial Examples Detection Scheme in Heterogeneous Complex Environments

    Weizheng Wang1,3, Xiangqi Wang2,*, Xianmin Pan1, Xingxing Gong3, Jian Liang3, Pradip Kumar Sharma4, Osama Alfarraj5, Wael Said6

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3859-3876, 2023, DOI:10.32604/cmc.2023.041346 - 08 October 2023

    Abstract Image-denoising techniques are widely used to defend against Adversarial Examples (AEs). However, denoising alone cannot completely eliminate adversarial perturbations. The remaining perturbations tend to amplify as they propagate through deeper layers of the network, leading to misclassifications. Moreover, image denoising compromises the classification accuracy of original examples. To address these challenges in AE defense through image denoising, this paper proposes a novel AE detection technique. The proposed technique combines multiple traditional image-denoising algorithms and Convolutional Neural Network (CNN) network structures. The used detector model integrates the classification results of different models as the input to… More >

  • Open Access

    ARTICLE

    An Intelligent Algorithm for Solving Weapon-Target Assignment Problem: DDPG-DNPE Algorithm

    Tengda Li, Gang Wang, Qiang Fu*, Xiangke Guo, Minrui Zhao, Xiangyu Liu

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3499-3522, 2023, DOI:10.32604/cmc.2023.041253 - 08 October 2023

    Abstract Aiming at the problems of traditional dynamic weapon-target assignment algorithms in command decision-making, such as large computational amount, slow solution speed, and low calculation accuracy, combined with deep reinforcement learning theory, an improved Deep Deterministic Policy Gradient algorithm with dual noise and prioritized experience replay is proposed, which uses a double noise mechanism to expand the search range of the action, and introduces a priority experience playback mechanism to effectively achieve data utilization. Finally, the algorithm is simulated and validated on the ground-to-air countermeasures digital battlefield. The results of the experiment show that, under the… More >

  • Open Access

    ARTICLE

    Malicious Traffic Compression and Classification Technique for Secure Internet of Things

    Yu-Rim Lee1, Na-Eun Park1, Seo-Yi Kim2, Il-Gu Lee1,2,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3465-3482, 2023, DOI:10.32604/cmc.2023.041196 - 08 October 2023

    Abstract With the introduction of 5G technology, the application of Internet of Things (IoT) devices is expanding to various industrial fields. However, introducing a robust, lightweight, low-cost, and low-power security solution to the IoT environment is challenging. Therefore, this study proposes two methods using a data compression technique to detect malicious traffic efficiently and accurately for a secure IoT environment. The first method, compressed sensing and learning (CSL), compresses an event log in a bitmap format to quickly detect attacks. Then, the attack log is detected using a machine-learning classification model. The second method, precise re-learning… More >

  • Open Access

    ARTICLE

    PAN-DeSpeck: A Lightweight Pyramid and Attention-Based Network for SAR Image Despeckling

    Saima Yasmeen1, Muhammad Usman Yaseen1,*, Syed Sohaib Ali2, Moustafa M. Nasralla3, Sohaib Bin Altaf Khattak3

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3671-3689, 2023, DOI:10.32604/cmc.2023.041195 - 08 October 2023

    Abstract SAR images commonly suffer from speckle noise, posing a significant challenge in their analysis and interpretation. Existing convolutional neural network (CNN) based despeckling methods have shown great performance in removing speckle noise. However, these CNN-based methods have a few limitations. They do not decouple complex background information in a multi-resolution manner. Moreover, they have deep network structures that may result in many parameters, limiting their applicability to mobile devices. Furthermore, extracting key speckle information in the presence of complex background is also a major problem with SAR. The proposed study addresses these limitations by introducing… More >

  • Open Access

    ARTICLE

    Efficient Multi-Authority Attribute-Based Searchable Encryption Scheme with Blockchain Assistance for Cloud-Edge Coordination

    Peng Liu1, Qian He1,*, Baokang Zhao2, Biao Guo1, Zhongyi Zhai1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3325-3343, 2023, DOI:10.32604/cmc.2023.041167 - 08 October 2023

    Abstract Cloud storage and edge computing are utilized to address the storage and computational challenges arising from the exponential data growth in IoT. However, data privacy is potentially risky when data is outsourced to cloud servers or edge services. While data encryption ensures data confidentiality, it can impede data sharing and retrieval. Attribute-based searchable encryption (ABSE) is proposed as an effective technique for enhancing data security and privacy. Nevertheless, ABSE has its limitations, such as single attribute authorization failure, privacy leakage during the search process, and high decryption overhead. This paper presents a novel approach called… More >

Displaying 2371-2380 on page 238 of 7234. Per Page