Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,015)
  • Open Access

    ARTICLE

    Contrast Normalization Strategies in Brain Tumor Imaging: From Preprocessing to Classification

    Samar M. Alqhtani1, Toufique A. Soomro2,*, Faisal Bin Ubaid3, Ahmed Ali4, Muhammad Irfan5, Abdullah A. Asiri6

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1539-1562, 2024, DOI:10.32604/cmes.2024.051475

    Abstract Cancer-related to the nervous system and brain tumors is a leading cause of mortality in various countries. Magnetic resonance imaging (MRI) and computed tomography (CT) are utilized to capture brain images. MRI plays a crucial role in the diagnosis of brain tumors and the examination of other brain disorders. Typically, manual assessment of MRI images by radiologists or experts is performed to identify brain tumors and abnormalities in the early stages for timely intervention. However, early diagnosis of brain tumors is intricate, necessitating the use of computerized methods. This research introduces an innovative approach for the automated segmentation of brain… More > Graphic Abstract

    Contrast Normalization Strategies in Brain Tumor Imaging: From Preprocessing to Classification

  • Open Access

    ARTICLE

    Generalized nth-Order Perturbation Method Based on Loop Subdivision Surface Boundary Element Method for Three-Dimensional Broadband Structural Acoustic Uncertainty Analysis

    Ruijin Huo1,2,3, Qingxiang Pei1,2,3, Xiaohui Yuan1,*, Yanming Xu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 2053-2077, 2024, DOI:10.32604/cmes.2024.049185

    Abstract In this paper, a generalized th-order perturbation method based on the isogeometric boundary element method is proposed for the uncertainty analysis of broadband structural acoustic scattering problems. The Burton-Miller method is employed to solve the problem of non-unique solutions that may be encountered in the external acoustic field, and the th-order discretization formulation of the boundary integral equation is derived. In addition, the computation of loop subdivision surfaces and the subdivision rules are introduced. In order to confirm the effectiveness of the algorithm, the computed results are contrasted and analyzed with the results under Monte Carlo simulations (MCs) through several… More >

  • Open Access

    ARTICLE

    Direct Pointwise Comparison of FE Predictions to StereoDIC Measurements: Developments and Validation Using Double Edge-Notched Tensile Specimen

    Troy Myers1, Michael A. Sutton1,*, Hubert Schreier2, Alistair Tofts2, Sreehari Rajan Kattil1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1263-1298, 2024, DOI:10.32604/cmes.2024.048743

    Abstract To compare finite element analysis (FEA) predictions and stereovision digital image correlation (StereoDIC) strain measurements at the same spatial positions throughout a region of interest, a field comparison procedure is developed. The procedure includes (a) conversion of the finite element data into a triangular mesh, (b) selection of a common coordinate system, (c) determination of the rigid body transformation to place both measurements and FEA data in the same system and (d) interpolation of the FEA nodal information to the same spatial locations as the StereoDIC measurements using barycentric coordinates. For an aluminum Al-6061 double edge notched tensile specimen, FEA… More >

  • Open Access

    ARTICLE

    An Enhanced Hybrid Model Based on CNN and BiLSTM for Identifying Individuals via Handwriting Analysis

    Md. Abdur Rahim1, Fahmid Al Farid2, Abu Saleh Musa Miah3, Arpa Kar Puza1, Md. Nur Alam4, Md. Najmul Hossain5, Sarina Mansor2, Hezerul Abdul Karim2,6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1689-1710, 2024, DOI:10.32604/cmes.2024.048714

    Abstract Handwriting is a unique and significant human feature that distinguishes them from one another. There are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for person identification through verification. However, such systems are susceptible to forgery, posing security risks. In response to these challenges, we propose an innovative hybrid technique for individual identification based on independent handwriting, eliminating the reliance on specific signatures or symbols. In response to these challenges, we propose an innovative hybrid technique for individual identification based on independent handwriting, eliminating the reliance on specific signatures or symbols. Our innovative method… More >

  • Open Access

    ARTICLE

    An Improved Deep Learning Framework for Automated Optic Disc Localization and Glaucoma Detection

    Hela Elmannai1,*, Monia Hamdi1, Souham Meshoul1, Amel Ali Alhussan2, Manel Ayadi3, Amel Ksibi3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1429-1457, 2024, DOI:10.32604/cmes.2024.048557

    Abstract Glaucoma disease causes irreversible damage to the optical nerve and it has the potential to cause permanent loss of vision. Glaucoma ranks as the second most prevalent cause of permanent blindness. Traditional glaucoma diagnosis requires a highly experienced specialist, costly equipment, and a lengthy wait time. For automatic glaucoma detection, state-of-the-art glaucoma detection methods include a segmentation-based method to calculate the cup-to-disc ratio. Other methods include multi-label segmentation networks and learning-based methods and rely on hand-crafted features. Localizing the optic disc (OD) is one of the key features in retinal images for detecting retinal diseases, especially for glaucoma disease detection.… More >

  • Open Access

    ARTICLE

    Numerical Treatments for Crossover Cancer Model of Hybrid Variable-Order Fractional Derivatives

    Nasser Sweilam1, Seham Al-Mekhlafi2,*, Aya Ahmed3, Ahoud Alsheri4, Emad Abo-Eldahab3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1619-1645, 2024, DOI:10.32604/cmes.2024.047896

    Abstract In this paper, two crossover hybrid variable-order derivatives of the cancer model are developed. Grünwald-Letnikov approximation is used to approximate the hybrid fractional and variable-order fractional operators. The existence, uniqueness, and stability of the proposed model are discussed. Adams Bashfourth’s fifth-step method with a hybrid variable-order fractional operator is developed to study the proposed models. Comparative studies with generalized fifth-order Runge-Kutta method are given. Numerical examples and comparative studies to verify the applicability of the used methods and to demonstrate the simplicity of these approximations are presented. We have showcased the efficiency of the proposed method and garnered robust empirical… More >

  • Open Access

    ARTICLE

    Improving Channel Estimation in a NOMA Modulation Environment Based on Ensemble Learning

    Lassaad K. Smirani1, Leila Jamel2,*, Latifah Almuqren2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1315-1337, 2024, DOI:10.32604/cmes.2024.047551

    Abstract This study presents a layered generalization ensemble model for next generation radio mobiles, focusing on supervised channel estimation approaches. Channel estimation typically involves the insertion of pilot symbols with a well-balanced rhythm and suitable layout. The model, called Stacked Generalization for Channel Estimation (SGCE), aims to enhance channel estimation performance by eliminating pilot insertion and improving throughput. The SGCE model incorporates six machine learning methods: random forest (RF), gradient boosting machine (GB), light gradient boosting machine (LGBM), support vector regression (SVR), extremely randomized tree (ERT), and extreme gradient boosting (XGB). By generating meta-data from five models (RF, GB, LGBM, SVR,… More >

  • Open Access

    ARTICLE

    Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices

    So-Eun Jeon1, Ye-Sol Oh1, Yeon-Ji Lee1, Il-Gu Lee1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1669-1687, 2024, DOI:10.32604/cmes.2024.047239

    Abstract With the advancement of wireless network technology, vast amounts of traffic have been generated, and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated. While signature-based detection methods, static analysis, and dynamic analysis techniques have been previously explored for malicious traffic detection, they have limitations in identifying diversified malware traffic patterns. Recent research has been focused on the application of machine learning to detect these patterns. However, applying machine learning to lightweight devices like IoT devices is challenging because of the high computational demands and complexity involved in the learning process. In this study, we examined methods… More >

  • Open Access

    ARTICLE

    A New Malicious Code Classification Method for the Security of Financial Software

    Xiaonan Li1,2, Qiang Wang1, Conglai Fan2,3, Wei Zhan1, Mingliang Zhang4,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 773-792, 2024, DOI:10.32604/csse.2024.039849

    Abstract The field of finance heavily relies on cybersecurity to safeguard its systems and clients from harmful software. The identification of malevolent code within financial software is vital for protecting both the financial system and individual clients. Nevertheless, present detection models encounter limitations in their ability to identify malevolent code and its variations, all while encompassing a multitude of parameters. To overcome these obstacles, we introduce a lean model for classifying families of malevolent code, formulated on Ghost-DenseNet-SE. This model integrates the Ghost module, DenseNet, and the squeeze-and-excitation (SE) channel domain attention mechanism. It substitutes the standard convolutional layer in DenseNet… More >

  • Open Access

    ARTICLE

    Optimizing Sustainability: Exergoenvironmental Analysis of a Multi-Effect Distillation with Thermal Vapor Compression System for Seawater Desalination

    Zineb Fergani1, Zakaria Triki1, Rabah Menasri1, Hichem Tahraoui1,2,*, Meriem Zamouche3, Mohammed Kebir4, Jie Zhang5, Abdeltif Amrane6,*

    Frontiers in Heat and Mass Transfer, Vol.22, No.2, pp. 455-473, 2024, DOI:10.32604/fhmt.2024.050332

    Abstract Seawater desalination stands as an increasingly indispensable solution to address global water scarcity issues. This study conducts a thorough exergoenvironmental analysis of a multi-effect distillation with thermal vapor compression (MED-TVC) system, a highly promising desalination technology. The MED-TVC system presents an energy-efficient approach to desalination by harnessing waste heat sources and incorporating thermal vapor compression. The primary objective of this research is to assess the system’s thermodynamic efficiency and environmental impact, considering both energy and exergy aspects. The investigation delves into the intricacies of energy and exergy losses within the MED-TVC process, providing a holistic understanding of its performance. By… More >

Displaying 1-10 on page 1 of 2015. Per Page