Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    Evaluating Partitioning Based Clustering Methods for Extended Non-negative Matrix Factorization (NMF)

    Neetika Bhandari1,*, Payal Pahwa2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2043-2055, 2023, DOI:10.32604/iasc.2023.028368

    Abstract Data is humongous today because of the extensive use of World Wide Web, Social Media and Intelligent Systems. This data can be very important and useful if it is harnessed carefully and correctly. Useful information can be extracted from this massive data using the Data Mining process. The information extracted can be used to make vital decisions in various industries. Clustering is a very popular Data Mining method which divides the data points into different groups such that all similar data points form a part of the same group. Clustering methods are of various types. Many parameters and indexes exist… More >

  • Open Access

    ARTICLE

    Automatic Leukaemia Segmentation Approach for Blood Cancer Classification Using Microscopic Images

    Anuj Sharma1, Deepak Prashar2, Arfat Ahmad Khan3, Faizan Ahmed Khan4, Settawit Poochaya3,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3629-3648, 2022, DOI:10.32604/cmc.2022.030879

    Abstract Leukaemia is a type of blood cancer that is caused by undeveloped White Blood Cells (WBC), and it is also called a blast blood cell. In the marrow of human bones, leukaemia is developed and is responsible for blood cell generation with leukocytes and WBC, and if any cell gets blasted, then it may become a cause of death. Therefore, the diagnosis of leukaemia in its early stages helps greatly in the treatment along with saving human lives. Subsequently, in terms of detection, image segmentation techniques play a vital role, and they turn out to be the important image processing… More >

  • Open Access

    ARTICLE

    Efficient Segmentation Approach for Different Medical Image Modalities

    Walid El-Shafai1,2, Amira A. Mahmoud1, El-Sayed M. El-Rabaie1, Taha E. Taha1, Osama F. Zahran1, Adel S. El-Fishawy1, Naglaa F. Soliman3, Amel A. Alhussan4,*, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3119-3135, 2022, DOI:10.32604/cmc.2022.028935

    Abstract This paper presents a study of the segmentation of medical images. The paper provides a solid introduction to image enhancement along with image segmentation fundamentals. In the first step, the morphological operations are employed to ensure image detail protection and noise-immunity. The objective of using morphological operations is to remove the defects in the texture of the image. Secondly, the Fuzzy C-Means (FCM) clustering algorithm is used to modify membership function based only on the spatial neighbors instead of the distance between pixels within local spatial neighbors and cluster centers. The proposed technique is very simple to implement and significantly… More >

  • Open Access

    ARTICLE

    An Efficient Deep Learning-based Content-based Image Retrieval Framework

    M. Sivakumar1,*, N. M. Saravana Kumar2, N. Karthikeyan1

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 683-700, 2022, DOI:10.32604/csse.2022.021459

    Abstract The use of massive image databases has increased drastically over the few years due to evolution of multimedia technology. Image retrieval has become one of the vital tools in image processing applications. Content-Based Image Retrieval (CBIR) has been widely used in varied applications. But, the results produced by the usage of a single image feature are not satisfactory. So, multiple image features are used very often for attaining better results. But, fast and effective searching for relevant images from a database becomes a challenging task. In the previous existing system, the CBIR has used the combined feature extraction technique using… More >

  • Open Access

    ARTICLE

    MRI Brain Tumor Segmentation with Intuitionist Possibilistic Fuzzy Clustering and Morphological Operations

    J. Anitha*, M. Kalaiarasu

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 363-379, 2022, DOI:10.32604/csse.2022.022402

    Abstract Digital Image Processing (DIP) is a well-developed field in the biological sciences which involves classification and detection of tumour. In medical science, automatic brain tumor diagnosis is an important phase. Brain tumor detection is performed by Computer-Aided Diagnosis (CAD) systems. The human image creation is greatly achieved by an approach namely medical imaging which is exploited for medical and research purposes. Recently Automatic brain tumor detection from MRI images has become the emerging research area of medical research. Brain tumor diagnosis mainly performed for obtaining exact location, orientation and area of abnormal tissues. Cancer and edema regions inference from brain… More >

  • Open Access

    ARTICLE

    An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures

    Chandrashekhar Meshram1,*, Agbotiname Lucky Imoize2,3, Sajjad Shaukat Jamal4, Parkash Tambare5, Adel R. Alharbi6, Iqtadar Hussain7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1373-1389, 2022, DOI:10.32604/cmc.2022.024996

    Abstract The Human-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive. In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps. The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network… More >

  • Open Access

    ARTICLE

    Efficient Computer Aided Diagnosis System for Hepatic Tumors Using Computed Tomography Scans

    Yasmeen Al-Saeed1,2, Wael A. Gab-Allah1, Hassan Soliman1, Maysoon F. Abulkhair3, Wafaa M. Shalash4, Mohammed Elmogy1,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4871-4894, 2022, DOI:10.32604/cmc.2022.023638

    Abstract One of the leading causes of mortality worldwide is liver cancer. The earlier the detection of hepatic tumors, the lower the mortality rate. This paper introduces a computer-aided diagnosis system to extract hepatic tumors from computed tomography scans and classify them into malignant or benign tumors. Segmenting hepatic tumors from computed tomography scans is considered a challenging task due to the fuzziness in the liver pixel range, intensity values overlap between the liver and neighboring organs, high noise from computed tomography scanner, and large variance in tumors shapes. The proposed method consists of three main stages; liver segmentation using Fast… More >

  • Open Access

    ARTICLE

    Medical Data Clustering and Classification Using TLBO and Machine Learning Algorithms

    Ashutosh Kumar Dubey1,*, Umesh Gupta2, Sonal Jain2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4523-4543, 2022, DOI:10.32604/cmc.2022.021148

    Abstract This study aims to empirically analyze teaching-learning-based optimization (TLBO) and machine learning algorithms using k-means and fuzzy c-means (FCM) algorithms for their individual performance evaluation in terms of clustering and classification. In the first phase, the clustering (k-means and FCM) algorithms were employed independently and the clustering accuracy was evaluated using different computational measures. During the second phase, the non-clustered data obtained from the first phase were preprocessed with TLBO. TLBO was performed using k-means (TLBO-KM) and FCM (TLBO-FCM) (TLBO-KM/FCM) algorithms. The objective function was determined by considering both minimization and maximization criteria. Non-clustered data obtained from the first phase… More >

  • Open Access

    ARTICLE

    A Shadowed Rough-fuzzy Clustering Algorithm Based on Mahalanobis Distance for Intrusion Detection

    Lina Wang1,2,*, Jie Wang3, Yongjun Ren4, Zimeng Xing1, Tao Li1, Jinyue Xia5

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 31-47, 2021, DOI:10.32604/iasc.2021.018577

    Abstract Intrusion detection has been widely used in many application domains; thus, it has caught significant attention in academic fields these years. Assembled with more and more sub-systems, the network is more vulnerable to multiple attacks aiming at the network security. Compared with the other issues such as complex environment and resources-constrained devices, network security has been the biggest challenge for Internet construction. To deal with this problem, a fundamental measure for safeguarding network security is to select an intrusion detection algorithm. As is known, it is less effective to determine the abnormal behavior as an intrusion and learn the entire… More >

  • Open Access

    ARTICLE

    Determination of Cup to Disc Ratio Using Unsupervised Machine Learning Techniques for Glaucoma Detection

    R. Praveena*, T. R. GaneshBabu

    Molecular & Cellular Biomechanics, Vol.18, No.2, pp. 69-86, 2021, DOI:10.32604/mcb.2021.014622

    Abstract The cup nerve head, optic cup, optic disc ratio and neural rim configuration are observed as important for detecting glaucoma at an early stage in clinical practice. The main clinical indicator of glaucoma optic cup to disc ratio is currently determined manually by limiting the mass screening was potential. This paper proposes the following methods for an automatic cup to disc ratio determination. In the first part of the work, fundus image of the optic disc region is considered. Clustering means K is used automatically to extract the optic disc whereas K-value is automatically selected by algorithm called hill climbing.… More >

Displaying 1-10 on page 1 of 15. Per Page