Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6,319)
  • Open Access

    ARTICLE

    Enhanced Nature Inspired-Support Vector Machine for Glaucoma Detection

    Jahanzaib Latif1, Shanshan Tu1,*, Chuangbai Xiao1, Anas Bilal2, Sadaqat Ur Rehman3, Zohaib Ahmad4

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1151-1172, 2023, DOI:10.32604/cmc.2023.040152

    Abstract Glaucoma is a progressive eye disease that can lead to blindness if left untreated. Early detection is crucial to prevent vision loss, but current manual scanning methods are expensive, time-consuming, and require specialized expertise. This study presents a novel approach to Glaucoma detection using the Enhanced Grey Wolf Optimized Support Vector Machine (EGWO-SVM) method. The proposed method involves preprocessing steps such as removing image noise using the adaptive median filter (AMF) and feature extraction using the previously processed speeded-up robust feature (SURF), histogram of oriented gradients (HOG), and Global features. The enhanced Grey Wolf Optimization (GWO) technique is then employed… More >

  • Open Access

    ARTICLE

    A Flexible Architecture for Cryptographic Applications: ECC and PRESENT

    Muhammad Rashid1,*, Omar S. Sonbul1, Muhammad Arif2, Furqan Aziz Qureshi3, Saud. S. Alotaibi4, Mohammad H. Sinky1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1009-1025, 2023, DOI:10.32604/cmc.2023.039901

    Abstract This work presents a flexible/unified hardware architecture of Elliptic-curve Cryptography (ECC) and PRESENT for cryptographic applications. The features of the proposed work are (i) computation of only the point multiplication operation of ECC over for a 163-bit key generation, (ii) execution of only the variant of an 80-bit PRESENT block cipher for data encryption & decryption and (iii) execution of point multiplication operation (ECC algorithm) along with the data encryption and decryption (PRESENT algorithm). To establish an area overhead for the flexible design, dedicated hardware architectures of ECC and PRESENT are implemented in the first step, and a sum of… More >

  • Open Access

    ARTICLE

    Deep Transfer Learning Based Detection and Classification of Citrus Plant Diseases

    Shah Faisal1, Kashif Javed1, Sara Ali1, Areej Alasiry2, Mehrez Marzougui2, Muhammad Attique Khan3,*, Jae-Hyuk Cha4,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 895-914, 2023, DOI:10.32604/cmc.2023.039781

    Abstract Citrus fruit crops are among the world’s most important agricultural products, but pests and diseases impact their cultivation, resulting in yield and quality losses. Computer vision and machine learning have been widely used to detect and classify plant diseases over the last decade, allowing for early disease detection and improving agricultural production. This paper presented an automatic system for the early detection and classification of citrus plant diseases based on a deep learning (DL) model, which improved accuracy while decreasing computational complexity. The most recent transfer learning-based models were applied to the Citrus Plant Dataset to improve classification accuracy. Using… More >

  • Open Access

    ARTICLE

    Deletion and Recovery Scheme of Electronic Health Records Based on Medical Certificate Blockchain

    Baowei Wang1,2,*, Neng Wang1, Yuxiao Zhang1, Zenghui Xu1, Junhao Zhang1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 849-859, 2023, DOI:10.32604/cmc.2023.039749

    Abstract The trusted sharing of Electronic Health Records (EHRs) can realize the efficient use of medical data resources. Generally speaking, EHRs are widely used in blockchain-based medical data platforms. EHRs are valuable private assets of patients, and the ownership belongs to patients. While recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals, it does not address the challenge of record sharing when patients revisit doctors. In order to solve this problem, this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate Blockchain. This paper uses cross-chain technology to connect the… More >

  • Open Access

    ARTICLE

    Spatial Correlation Module for Classification of Multi-Label Ocular Diseases Using Color Fundus Images

    Ali Haider Khan1,2,*, Hassaan Malik2, Wajeeha Khalil3, Sayyid Kamran Hussain4, Tayyaba Anees5, Muzammil Hussain2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 133-150, 2023, DOI:10.32604/cmc.2023.039518

    Abstract To prevent irreversible damage to one’s eyesight, ocular diseases (ODs) need to be recognized and treated immediately. Color fundus imaging (CFI) is a screening technology that is both effective and economical. According to CFIs, the early stages of the disease are characterized by a paucity of observable symptoms, which necessitates the prompt creation of automated and robust diagnostic algorithms. The traditional research focuses on image-level diagnostics that attend to the left and right eyes in isolation without making use of pertinent correlation data between the two sets of eyes. In addition, they usually only target one or a few different… More >

  • Open Access

    ARTICLE

    An Improved Fully Automated Breast Cancer Detection and Classification System

    Tawfeeq Shawly1, Ahmed A. Alsheikhy2,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 731-751, 2023, DOI:10.32604/cmc.2023.039433

    Abstract More than 500,000 patients are diagnosed with breast cancer annually. Authorities worldwide reported a death rate of 11.6% in 2018. Breast tumors are considered a fatal disease and primarily affect middle-aged women. Various approaches to identify and classify the disease using different technologies, such as deep learning and image segmentation, have been developed. Some of these methods reach 99% accuracy. However, boosting accuracy remains highly important as patients’ lives depend on early diagnosis and specified treatment plans. This paper presents a fully computerized method to detect and categorize tumor masses in the breast using two deep-learning models and a classifier… More >

  • Open Access

    ARTICLE

    Quantum-Enhanced Blockchain: A Secure and Practical Blockchain Scheme

    Ang Liu1,2, Xiu-Bo Chen1,*, Gang Xu3, Zhuo Wang4, Xuefen Feng5, Huamin Feng6

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 259-277, 2023, DOI:10.32604/cmc.2023.039397

    Abstract The rapid advancement of quantum technology poses significant security risks to blockchain systems. However, quantum technology can also provide solutions for enhancing blockchain security. In this paper, we propose a quantum-enhanced blockchain scheme to achieve a high level of security against quantum computing attacks. We first discuss quantum computing attacks on classic blockchains, including attacks on hash functions, digital signatures, and consensus mechanisms. We then introduce quantum technologies, such as a quantum hash function (QHF), a quantum digital signature (QDS), and proof of authority (PoA) consensus mechanism, into our scheme to improve the security of the blockchain system. Our security… More >

  • Open Access

    ARTICLE

    Characterization of Memory Access in Deep Learning and Its Implications in Memory Management

    Jeongha Lee1, Hyokyung Bahn2,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 607-629, 2023, DOI:10.32604/cmc.2023.039236

    Abstract Due to the recent trend of software intelligence in the Fourth Industrial Revolution, deep learning has become a mainstream workload for modern computer systems. Since the data size of deep learning increasingly grows, managing the limited memory capacity efficiently for deep learning workloads becomes important. In this paper, we analyze memory accesses in deep learning workloads and find out some unique characteristics differentiated from traditional workloads. First, when comparing instruction and data accesses, data access accounts for 96%–99% of total memory accesses in deep learning workloads, which is quite different from traditional workloads. Second, when comparing read and write accesses,… More >

  • Open Access

    ARTICLE

    Application of Blockchain Sharding Technology in Chinese Medicine Traceability System

    Fuan Xiao1, Tong Lai1, Yutong Guan1, Jiaming Hong1, Honglai Zhang1, Guoyu Yang2, Zhengfei Wang1,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 35-48, 2023, DOI:10.32604/cmc.2023.038937

    Abstract Traditional Chinese Medicine (TCM) is one of the most promising programs for disease prevention and treatment. Meanwhile, the quality of TCM has garnered much attention. To ensure the quality of TCM, many works are based on the blockchain scheme to design the traceability scheme of TCM to trace its origin. Although these schemes can ensure the integrity, sharability, credibility, and immutability of TCM more effectively, many problems are exposed with the rapid growth of TCM data in blockchains, such as expensive overhead, performance bottlenecks, and the traditional blockchain architecture is unsuitable for TCM data with dynamic growth. Motivated by the… More >

  • Open Access

    ARTICLE

    Alzheimer’s Disease Stage Classification Using a Deep Transfer Learning and Sparse Auto Encoder Method

    Deepthi K. Oommen*, J. Arunnehru

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 793-811, 2023, DOI:10.32604/cmc.2023.038640

    Abstract Alzheimer’s Disease (AD) is a progressive neurological disease. Early diagnosis of this illness using conventional methods is very challenging. Deep Learning (DL) is one of the finest solutions for improving diagnostic procedures’ performance and forecast accuracy. The disease’s widespread distribution and elevated mortality rate demonstrate its significance in the older-onset and younger-onset age groups. In light of research investigations, it is vital to consider age as one of the key criteria when choosing the subjects. The younger subjects are more susceptible to the perishable side than the older onset. The proposed investigation concentrated on the younger onset. The research used… More >

Displaying 1-10 on page 1 of 6319. Per Page  

Share Link