Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (62)
  • Open Access

    ARTICLE

    A Mathematical Model for COVID-19 Image Enhancement based on Mittag-Leffler-Chebyshev Shift

    Ibtisam Aldawish1, Hamid A. Jalab2,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1307-1316, 2022, DOI:10.32604/cmc.2022.029445

    Abstract The lungs CT scan is used to visualize the spread of the disease across the lungs to obtain better knowledge of the state of the COVID-19 infection. Accurately diagnosing of COVID-19 disease is a complex challenge that medical system face during the pandemic time. To address this problem, this paper proposes a COVID-19 image enhancement based on Mittag-Leffler-Chebyshev polynomial as pre-processing step for COVID-19 detection and segmentation. The proposed approach comprises the Mittag-Leffler sum convoluted with Chebyshev polynomial. The idea for using the proposed image enhancement model is that it improves images with low gray-level changes by estimating the probability… More >

  • Open Access

    ARTICLE

    Lamport Certificateless Signcryption Deep Neural Networks for Data Aggregation Security in WSN

    P. Saravanakumar1, T. V. P. Sundararajan2, Rajesh Kumar Dhanaraj3, Kashif Nisar4,*, Fida Hussain Memon5,6, Ag. Asri Bin Ag. Ibrahim4

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1835-1847, 2022, DOI:10.32604/iasc.2022.018953

    Abstract Confidentiality and data integrity are essential paradigms in data aggregation owing to the various cyberattacks in wireless sensor networks (WSNs). This study proposes a novel technique named Lamport certificateless signcryption-based shift-invariant connectionist artificial deep neural networks (LCS-SICADNN) by using artificial deep neural networks to develop the data aggregation security model. This model utilises the input layer with several sensor nodes, four hidden layers to overcome different attacks (data injection, compromised node, Sybil and black hole attacks) and the output layer to analyse the given input. The Lamport one-time certificateless signcryption technique involving three different processes (key generation, signcryption and unsigncryption)… More >

  • Open Access

    ARTICLE

    Hypoxia induced apoptosis of rat gastric mucosal cells by activating autophagy through HIF-1α/TERT/mTORC1 pathway

    YAPING WANG1,2,#,*; XIAOHONG XUE2,#; ZHEN ZHAO1,#; XIAOLIN LI2; ZHIYONG ZHU1

    BIOCELL, Vol.46, No.7, pp. 1651-1659, 2022, DOI:10.32604/biocell.2022.018559

    Abstract The pathogenesis of high altitude-related gastric mucosal injury remains poorly understood, this study aimed to investigate the role of autophagy in hypoxia-induced apoptosis of rat gastric mucosal cells. Rats were randomized into four groups which were maintained at an altitude of 400 m (P) or received no treatment (H), autophagy inducer rapamycin (H+AI) or autophagy inhibitor 3-MA (H+AB) at an altitude of 4,300 m for 1, 7, 14 and 21 days, respectively, and the morphology, ultrastructure, autophagy, and apoptosis of gastric mucosal tissues were examined. Gastric mucosal epithelial cells CC-R039 were cultured under conditions of normoxia, 2% O2 (hypoxia), or… More >

  • Open Access

    ARTICLE

    Incredible VLSI Design for MIMO System Using SEC-QPSK Detection

    L. Vasanth*, N. J. R. Muniraj

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 955-966, 2022, DOI:10.32604/iasc.2022.022979

    Abstract Multiple Input Multiple Output (MIMO) is an advanced communication technology that is often used for secure data transfer for military and other applications while transmitting data with high error and noise. To address this issue, a step-by-step hybrid Quadrature Phase Shift Keying (QPSK) modulation scheme in the MIMO system for a complex Very Large-Scale Integration (VLSI) format is recommended. When compared to Binary Phase Shift Keying (BPSK), this approach provides twice the data rate while using half the bandwidth. The complexity is lowered through multiplication and addition, as well as error and noise reduction in data transport, and MIMO detection… More >

  • Open Access

    ARTICLE

    Research on Phase-Shifted Full-Bridge Circuit Based on Frequency and Phase-Shift Synthesis Modulation Strategy

    Mingda Jiang1, Yanbo Che1, Hongfeng Li1,*, Muhammad Ishaq1, Chao Xing1,2

    Energy Engineering, Vol.119, No.2, pp. 699-721, 2022, DOI:10.32604/ee.2022.017556

    Abstract The full-bridge converters usually use transformer leakage inductance and parallel resonant capacitors to achieve smooth current commutation and soft switching functions, which can easily cause problems such as energy leakage and significant duty cycle loss. This paper designs a novel full-bridge zero-current (FB-ZCS) converter with series resonant capacitors and proposes a frequency and phase-shift synthesis modulation (FPSSM) control strategy based on this topology. Compared with the traditional parallel resonant capacitor circuit, the passive components used are significantly reduced, the structure is simple, and there is only a slight energy loss. By controlling the charging time of the capacitor, it can… More >

  • Open Access

    ARTICLE

    Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model

    Khalid A. El Drandaly1, Walid Khedr1, Islam S. Mohamed1, Ayman Mohamed Mostafa2,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5253-5270, 2022, DOI:10.32604/cmc.2022.023684

    Abstract Information security is one of the most important methods of protecting the confidentiality and privacy of internet users. The greater the volume of data, the more the need to increase the security methods for protecting data from intruders. This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness. Protection of digital content is a major issue in maintaining the privacy and secrecy of data. Toward this end, digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark in an efficient manner. Recent… More >

  • Open Access

    ARTICLE

    Contrast Enhancement Based Image Detection Using Edge Preserved Key Pixel Point Filtering

    Balakrishnan Natarajan1,*, Pushpalatha Krishnan2

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 423-438, 2022, DOI:10.32604/csse.2022.022376

    Abstract In existing methods for segmented images, either edge point extraction or preservation of edges, compromising contrast images is so sensitive to noise. The Degeneration Threshold Image Detection (DTID) framework has been proposed to improve the contrast of edge filtered images. Initially, DTID uses a Rapid Bilateral Filtering process for filtering edges of contrast images. This filter decomposes input images into base layers in the DTID framework. With minimal filtering time, Rapid Bilateral Filtering handles high dynamic contrast images for smoothening edge preservation. In the DTID framework, Rapid Bilateral Filtering with Shift-Invariant Base Pass Domain Filter is insensitive to noise. This… More >

  • Open Access

    ARTICLE

    Identification of Denatured Biological Tissues Based on Improved Variational Mode Decomposition and Autoregressive Model during HIFU Treatment

    Bei Liu1, Xian Zhang2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1547-1563, 2022, DOI:10.32604/cmes.2022.018130

    Abstract During high-intensity focused ultrasound (HIFU) treatment, the accurate identification of denatured biological tissue is an important practical problem. In this paper, a novel method based on the improved variational mode decomposition (IVMD) and autoregressive (AR) model was proposed, which identified denatured biological tissue according to the characteristics of ultrasonic scattered echo signals during HIFU treatment. Firstly, the IVMD method was proposed to solve the problem that the VMD reconstruction signal still has noise due to the limited number of intrinsic mode functions (IMF). The ultrasonic scattered echo signals were reconstructed by the IVMD to achieve denoising. Then, the AR model… More >

  • Open Access

    ARTICLE

    Research on the Intelligent Control Strategy of the Fuel Cell Phase-Shifting Full-Bridge Power Electronics DC-DC Converter

    Lei Zhang1, Yinlong Yuan1,*, Yihe Sun2, Yun Cheng1, Dian Wu1, Lei Ren1

    Energy Engineering, Vol.119, No.1, pp. 387-405, 2022, DOI:10.32604/EE.2022.017463

    Abstract With the aggravation of energy problems, the development and utilization of new energy has become the focus of all countries. As an effective new energy, the fuel cell has attracted the attention of scholars. However, due to the particularity of proton exchange membrane fuel cell (PEMFC), the performance of traditional PI controlled phase-shifted full-bridge power electronics DC-DC converter cannot meet the needs of practical application. In order to further improve the dynamic performance of the converter, this paper first introduces several main topologies of the current mainstream front-end DC-DC converter, and analyzes their performance in the fuel cell system. Then,… More >

  • Open Access

    ARTICLE

    Scrambling Based Riffle Shift on Stego-Image to Channelize the Ensured Data

    R. Bala Krishnan1, M. M. Anishin Raj2, N. Rajesh Kumar1, B. Karthikeyan3, G. Manikandan3,*, N. R. Raajan4

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 221-235, 2022, DOI:10.32604/iasc.2022.021775

    Abstract In recent years information hiding has got much attention as it acts as an alternate option for secured communication. The Secret content would get imbedded with the image using various possible image embodiment techniques, in which the Least Significant Bit (LSB) substitution is one of the preferred content embodiment strategy; however, asserting the quality and the originality of the content embedded image (stego) is yet a grievous concern in the field of Information Security. In this article, a proficient Scrambling Based Haar Wavelet Transform (SBHWT) approach has been sought to ensure the novelty of the stego-image that supports the safe… More >

Displaying 21-30 on page 3 of 62. Per Page