Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (938)
  • Open Access

    ARTICLE

    Underwater Image Enhancement Using Customized CLAHE and Adaptive Color Correction

    Mousa Alhajlah*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5157-5172, 2023, DOI:10.32604/cmc.2023.033339 - 28 December 2022

    Abstract Underwater images degraded due to low contrast and visibility issues. Therefore, it is important to enhance the images and videos taken in the underwater environment before processing. Enhancement is a way to improve or increase image quality and to improve the contrast of degraded images. The original image or video which is captured through image processing devices needs to improve as there are various issues such as less light available, low resolution, and blurriness in underwater images caused by the normal camera. Various researchers have proposed different solutions to overcome these problems. Dark channel prior… More >

  • Open Access

    ARTICLE

    Enhanced Gorilla Troops Optimizer with Deep Learning Enabled Cybersecurity Threat Detection

    Fatma S. Alrayes1, Najm Alotaibi2, Jaber S. Alzahrani3, Sana Alazwari4, Areej Alhogail5, Ali M. Al-Sharafi6, Mahmoud Othman7, Manar Ahmed Hamza8,*

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3037-3052, 2023, DOI:10.32604/csse.2023.033970 - 21 December 2022

    Abstract Recent developments in computer networks and Internet of Things (IoT) have enabled easy access to data. But the government and business sectors face several difficulties in resolving cybersecurity network issues, like novel attacks, hackers, internet criminals, and so on. Presently, malware attacks and software piracy pose serious risks in compromising the security of IoT. They can steal confidential data which results in financial and reputational losses. The advent of machine learning (ML) and deep learning (DL) models has been employed to accomplish security in the IoT cloud environment. This article presents an Enhanced Artificial Gorilla… More >

  • Open Access

    ARTICLE

    Software Defect Prediction Based Ensemble Approach

    J. Harikiran1,*, B. Sai Chandana1, B. Srinivasarao1, B. Raviteja2, Tatireddy Subba Reddy3

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2313-2331, 2023, DOI:10.32604/csse.2023.029689 - 21 December 2022

    Abstract Software systems have grown significantly and in complexity. As a result of these qualities, preventing software faults is extremely difficult. Software defect prediction (SDP) can assist developers in finding potential bugs and reducing maintenance costs. When it comes to lowering software costs and assuring software quality, SDP plays a critical role in software development. As a result, automatically forecasting the number of errors in software modules is important, and it may assist developers in allocating limited resources more efficiently. Several methods for detecting and addressing such flaws at a low cost have been offered. These… More >

  • Open Access

    ARTICLE

    Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks

    R. Sabitha1,*, C. Gokul Prasad2, S. Karthik1

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2795-2810, 2023, DOI:10.32604/csse.2023.026465 - 21 December 2022

    Abstract In recent scenario of Wireless Sensor Networks (WSNs), there are many application developed for handling sensitive and private data such as military information, surveillance data, tracking, etc. Hence, the sensor nodes of WSNs are distributed in an intimidating region, which is non-rigid to attacks. The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats. In traditional models, the solution has been made for defending the networks, only to specific attacks. However, in real-time applications, the kind of attack that is launched by the adversary is not… More >

  • Open Access

    ARTICLE

    Synergistic Modification of PVC with Nitrogen-Containing Heterocycle and Tung-Oil Based Derivative for Enhanced Heat Stabilization and Plasticization Behavior

    Mei Wang1, Xinzhu Fan1, Quan Bu1, Puyou Jia2,3,*, Shouqi Yuan4

    Journal of Renewable Materials, Vol.11, No.4, pp. 2015-2031, 2023, DOI:10.32604/jrm.2023.026063 - 01 December 2022

    Abstract The additives present in polyvinyl chloride (PVC) materials are the major source of organic by-products during PVC degradation. The thermal stabilizer and plasticizer are the main additives that endow PVC with the required properties during its processing. However, these two additives easily migrate when samples are obtained by physical mixing of the additives with PVC. This causes the reduction of PVC sample efficacy and the increase in the formation of organic by-products in the radiolysis process. In this work, two kinds of grafted PVC samples (tung-oil derivative grafted PVC and Atz grafted PVC, abbreviated as P-GT4More > Graphic Abstract

    Synergistic Modification of PVC with Nitrogen-Containing Heterocycle and Tung-Oil Based Derivative for Enhanced Heat Stabilization and Plasticization Behavior

  • Open Access

    ARTICLE

    Using Hybrid Penalty and Gated Linear Units to Improve Wasserstein Generative Adversarial Networks for Single-Channel Speech Enhancement

    Xiaojun Zhu1,2,3, Heming Huang1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.3, pp. 2155-2172, 2023, DOI:10.32604/cmes.2023.021453 - 23 November 2022

    Abstract Recently, speech enhancement methods based on Generative Adversarial Networks have achieved good performance in time-domain noisy signals. However, the training of Generative Adversarial Networks has such problems as convergence difficulty, model collapse, etc. In this work, an end-to-end speech enhancement model based on Wasserstein Generative Adversarial Networks is proposed, and some improvements have been made in order to get faster convergence speed and better generated speech quality. Specifically, in the generator coding part, each convolution layer adopts different convolution kernel sizes to conduct convolution operations for obtaining speech coding information from multiple scales; a gated More >

  • Open Access

    ARTICLE

    The antioxidant trolox inhibits aging and enhances prostaglandin E-2 secretion in mesenchymal stem cells

    XIAOXU ZHANG1,2, LIN ZHANG1, LIN DU3, HUIYAN SUN4, XIA ZHAO2, YANG SUN1, WEI WANG2,*, LISHENG WANG1,3,*

    BIOCELL, Vol.47, No.2, pp. 385-392, 2023, DOI:10.32604/biocell.2023.025203 - 18 November 2022

    Abstract Mesenchymal stem cells (MSCs) have been widely used in regenerative medicine and clinical therapy due to their capabilities of proliferation, differentiation, and immune regulation. However, during in vitro expansion, MSCs are prone to aging, which largely limits their application. Prostaglandin E-2 (PGE-2) is a key effector secreted by MSCs to exert immunomodulatory effects. By screening the compound library for PGE-2 secretion, the antioxidant trolox was verified as a stimulator of MSCs to secrete PGE-2. The effect of antioxidant trolox on biological characteristics of MSCS, including aging, proliferation, and gene expression, was examined. The results demonstrated that More >

  • Open Access

    ARTICLE

    An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS

    Hoonyong Park1, TaeGuen Kim1, Daniel Gerbi Duguma1, Jiyoon Kim2, Ilsun You2,*, Willy Susilo3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1145-1165, 2023, DOI:10.32604/csse.2023.032044 - 03 November 2022

    Abstract Network operators are attempting many innovations and changes in 5G using self-organizing networks (SON). The SON operates on the measurement reports (MR), which are obtained from user equipment (UE) and secured against malware and userspace programs. However, the synchronization signal block that the UE relies on to measure the wireless environment configured by a base station is not authenticated. As a result, the UE will likely gauge the wrong wireless environment configured by a false base station (FBS) and transmit the corresponding MR to the serving base station, which poisons the data used for 5G… More >

  • Open Access

    ARTICLE

    Image Enhancement Using Adaptive Fractional Order Filter

    Ayesha Heena1,*, Nagashettappa Biradar1, Najmuddin M. Maroof2, Surbhi Bhatia3, Arwa Mashat4, Shakila Basheer5

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1409-1422, 2023, DOI:10.32604/csse.2023.029611 - 03 November 2022

    Abstract Image enhancement is an important preprocessing task as the contrast is low in most of the medical images, Therefore, enhancement becomes the mandatory process before actual image processing should start. This research article proposes an enhancement of the model-based differential operator for the images in general and Echocardiographic images, the proposed operators are based on Grunwald-Letnikov (G-L), Riemann-Liouville (R-L) and Caputo (Li & Xie), which are the definitions of fractional order calculus. In this fractional-order, differentiation is well focused on the enhancement of echocardiographic images. This provoked for developing a non-linear filter mask for image… More >

  • Open Access

    ARTICLE

    Improved Model for Genetic Algorithm-Based Accurate Lung Cancer Segmentation and Classification

    K. Jagadeesh1,*, A. Rajendran2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2017-2032, 2023, DOI:10.32604/csse.2023.029169 - 03 November 2022

    Abstract Lung Cancer is one of the hazardous diseases that have to be detected in earlier stages for providing better treatment and clinical support to patients. For lung cancer diagnosis, the computed tomography (CT) scan images are to be processed with image processing techniques and effective classification process is required for appropriate cancer diagnosis. In present scenario of medical data processing, the cancer detection process is very time consuming and exactitude. For that, this paper develops an improved model for lung cancer segmentation and classification using genetic algorithm. In the model, the input CT images are More >

Displaying 521-530 on page 53 of 938. Per Page