Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (331)
  • Open Access

    ARTICLE

    Picture-Neutrosophic Trusted Safe Semi-Supervised Fuzzy Clustering for Noisy Data

    Pham Huy Thong1,2,3, Florentin Smarandache4, Phung The Huan5, Tran Manh Tuan6, Tran Thi Ngan6,*, Vu Duc Thai5, Nguyen Long Giang2, Le Hoang Son3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1981-1997, 2023, DOI:10.32604/csse.2023.035692

    Abstract Clustering is a crucial method for deciphering data structure and producing new information. Due to its significance in revealing fundamental connections between the human brain and events, it is essential to utilize clustering for cognitive research. Dealing with noisy data caused by inaccurate synthesis from several sources or misleading data production processes is one of the most intriguing clustering difficulties. Noisy data can lead to incorrect object recognition and inference. This research aims to innovate a novel clustering approach, named Picture-Neutrosophic Trusted Safe Semi-Supervised Fuzzy Clustering (PNTS3FCM), to solve the clustering problem with noisy data using neutral and refusal degrees… More >

  • Open Access

    ARTICLE

    An Improved Steganographic Scheme Using the Contour Principle to Ensure the Privacy of Medical Data on Digital Images

    R. Bala Krishnan1, D. Yuvaraj2, P. Suthanthira Devi3, Varghese S. Chooralil4, N. Rajesh Kumar1, B. Karthikeyan5, G. Manikandan5,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1563-1576, 2023, DOI:10.32604/csse.2023.035307

    Abstract With the improvement of current online communication schemes, it is now possible to successfully distribute and transport secured digital Content via the communication channel at a faster transmission rate. Traditional steganography and cryptography concepts are used to achieve the goal of concealing secret Content on a media and encrypting it before transmission. Both of the techniques mentioned above aid in the confidentiality of feature content. The proposed approach concerns secret content embodiment in selected pixels on digital image layers such as Red, Green, and Blue. The private Content originated from a medical client and was forwarded to a medical practitioner… More >

  • Open Access

    ARTICLE

    Contrastive Clustering for Unsupervised Recognition of Interference Signals

    Xiangwei Chen1, Zhijin Zhao1,2,*, Xueyi Ye1, Shilian Zheng2, Caiyi Lou2, Xiaoniu Yang2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1385-1400, 2023, DOI:10.32604/csse.2023.034543

    Abstract Interference signals recognition plays an important role in anti-jamming communication. With the development of deep learning, many supervised interference signals recognition algorithms based on deep learning have emerged recently and show better performance than traditional recognition algorithms. However, there is no unsupervised interference signals recognition algorithm at present. In this paper, an unsupervised interference signals recognition method called double phases and double dimensions contrastive clustering (DDCC) is proposed. Specifically, in the first phase, four data augmentation strategies for interference signals are used in data-augmentation-based (DA-based) contrastive learning. In the second phase, the original dataset’s k-nearest neighbor set (KNNset) is designed… More >

  • Open Access

    ARTICLE

    Nonlinear Teager-Kaiser Infomax Boost Clustering Algorithm for Brain Tumor Detection Technique

    P. M. Siva Raja1,*, S. Brinthakumari2, K. Ramanan3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2589-2599, 2023, DOI:10.32604/csse.2023.028542

    Abstract Brain tumor detection and division is a difficult tedious undertaking in clinical image preparation. When it comes to the new technology that enables accurate identification of the mysterious tissues of the brain, magnetic resonance imaging (MRI) is a great tool. It is possible to alter the tumor’s size and shape at any time for any number of patients by using the Brain picture. Radiologists have a difficult time sorting and classifying tumors from multiple images. Brain tumors may be accurately detected using a new approach called Nonlinear Teager-Kaiser Iterative Infomax Boost Clustering-Based Image Segmentation (NTKFIBC-IS). Teager-Kaiser filtering is used to… More >

  • Open Access

    ARTICLE

    Clustering-Aided Supervised Malware Detection with Specialized Classifiers and Early Consensus

    Murat Dener*, Sercan Gulburun

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1235-1251, 2023, DOI:10.32604/cmc.2023.036357

    Abstract One of the most common types of threats to the digital world is malicious software. It is of great importance to detect and prevent existing and new malware before it damages information assets. Machine learning approaches are used effectively for this purpose. In this study, we present a model in which supervised and unsupervised learning algorithms are used together. Clustering is used to enhance the prediction performance of the supervised classifiers. The aim of the proposed model is to make predictions in the shortest possible time with high accuracy and f1 score. In the first stage of the model, the… More >

  • Open Access

    ARTICLE

    Enhanced Clustering Based OSN Privacy Preservation to Ensure k-Anonymity, t-Closeness, l-Diversity, and Balanced Privacy Utility

    Rupali Gangarde1,2,*, Amit Sharma3, Ambika Pawar4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2171-2190, 2023, DOI:10.32604/cmc.2023.035559

    Abstract Online Social Networks (OSN) sites allow end-users to share a great deal of information, which may also contain sensitive information, that may be subject to commercial or non-commercial privacy attacks. As a result, guaranteeing various levels of privacy is critical while publishing data by OSNs. The clustering-based solutions proved an effective mechanism to achieve the privacy notions in OSNs. But fixed clustering limits the performance and scalability. Data utility degrades with increased privacy, so balancing the privacy utility trade-off is an open research issue. The research has proposed a novel privacy preservation model using the enhanced clustering mechanism to overcome… More >

  • Open Access

    ARTICLE

    Enhanced Energy Efficient with a Trust Aware in MANET for Real-Time Applications

    M. V. Narayana1, Vadla Pradeep Kumar2, Ashok Kumar Nanda2,*, Hanumantha Rao Jalla3, Subba Reddy Chavva4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 587-607, 2023, DOI:10.32604/cmc.2023.034773

    Abstract Mobile ad hoc networks (MANETs) are subjected to attack detection for transmitting and creating new messages or existing message modifications. The attacker on another node evaluates the forging activity in the message directly or indirectly. Every node sends short packets in a MANET environment with its identifier, location on the map, and time through beacons. The attackers on the network broadcast the warning message using faked coordinates, providing the appearance of a network collision. Similarly, MANET degrades the channel utilization performance. Performance highly affects network performance through security algorithms. This paper developed a trust management technique called Enhanced Beacon Trust… More >

  • Open Access

    ARTICLE

    Lens-Oppositional Wild Geese Optimization Based Clustering Scheme for Wireless Sensor Networks Assists Real Time Disaster Management

    R. Surendran1,*, Youseef Alotaibi2, Ahmad F. Subahi3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 835-851, 2023, DOI:10.32604/csse.2023.036757

    Abstract Recently, wireless sensor networks (WSNs) find their applicability in several real-time applications such as disaster management, military, surveillance, healthcare, etc. The utilization of WSNs in the disaster monitoring process has gained significant attention among research communities and governments. Real-time monitoring of disaster areas using WSN is a challenging process due to the energy-limited sensor nodes. Therefore, the clustering process can be utilized to improve the energy utilization of the nodes and thereby improve the overall functioning of the network. In this aspect, this study proposes a novel Lens-Oppositional Wild Goose Optimization based Energy Aware Clustering (LOWGO-EAC) scheme for WSN-assisted real-time… More >

  • Open Access

    ARTICLE

    Design of Evolutionary Algorithm Based Energy Efficient Clustering Approach for Vehicular Adhoc Networks

    V. Dinesh1, S. Srinivasan2, Gyanendra Prasad Joshi3, Woong Cho4,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 687-699, 2023, DOI:10.32604/csse.2023.035459

    Abstract In a vehicular ad hoc network (VANET), a massive quantity of data needs to be transmitted on a large scale in shorter time durations. At the same time, vehicles exhibit high velocity, leading to more vehicle disconnections. Both of these characteristics result in unreliable data communication in VANET. A vehicle clustering algorithm clusters the vehicles in groups employed in VANET to enhance network scalability and connection reliability. Clustering is considered one of the possible solutions for attaining effectual interaction in VANETs. But one such difficulty was reducing the cluster number under increasing transmitting nodes. This article introduces an Evolutionary Hide… More >

  • Open Access

    ARTICLE

    A Novel Soft Clustering Method for Detection of Exudates

    Kittipol Wisaeng*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1039-1058, 2023, DOI:10.32604/csse.2023.034901

    Abstract One of the earliest indications of diabetes consequence is Diabetic Retinopathy (DR), the main contributor to blindness worldwide. Recent studies have proposed that Exudates (EXs) are the hallmark of DR severity. The present study aims to accurately and automatically detect EXs that are difficult to detect in retinal images in the early stages. An improved Fusion of Histogram–Based Fuzzy C–Means Clustering (FHBFCM) by a New Weight Assignment Scheme (NWAS) and a set of four selected features from stages of pre-processing to evolve the detection method is proposed. The features of DR train the optimal parameter of FHBFCM for detecting EXs… More >

Displaying 51-60 on page 6 of 331. Per Page