Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (258)
  • Open Access

    ARTICLE

    Liver Tumor Decision Support System on Human Magnetic Resonance Images: A Comparative Study

    Hiam Alquran1,2, Yazan Al-Issa3, Mohammed Alslatie4, Isam Abu-Qasmieh1, Amin Alqudah3, Wan Azani Mustafa5,7,*, Yasmin Mohd Yacob6,7

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1653-1671, 2023, DOI:10.32604/csse.2023.033861 - 09 February 2023

    Abstract Liver cancer is the second leading cause of cancer death worldwide. Early tumor detection may help identify suitable treatment and increase the survival rate. Medical imaging is a non-invasive tool that can help uncover abnormalities in human organs. Magnetic Resonance Imaging (MRI), in particular, uses magnetic fields and radio waves to differentiate internal human organs tissue. However, the interpretation of medical images requires the subjective expertise of a radiologist and oncologist. Thus, building an automated diagnosis computer-based system can help specialists reduce incorrect diagnoses. This paper proposes a hybrid automated system to compare the performance… More >

  • Open Access

    ARTICLE

    A Numerical Investigation Based on Exponential Collocation Method for Nonlinear SITR Model of COVID-19

    Mohammad Aslefallah1, Şuayip Yüzbaşi2, Saeid Abbasbandy1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1687-1706, 2023, DOI:10.32604/cmes.2023.025647 - 06 February 2023

    Abstract In this work, the exponential approximation is used for the numerical simulation of a nonlinear SITR model as a system of differential equations that shows the dynamics of the new coronavirus (COVID-19). The SITR mathematical model is divided into four classes using fractal parameters for COVID-19 dynamics, namely, susceptible (S), infected (I), treatment (T), and recovered (R). The main idea of the presented method is based on the matrix representations of the exponential functions and their derivatives using collocation points. To indicate the usefulness of this method, we employ it in some cases. For error More > Graphic Abstract

    A Numerical Investigation Based on Exponential Collocation Method for Nonlinear SITR Model of COVID-19

  • Open Access

    ARTICLE

    Detecting Double JPEG Compressed Color Images via an Improved Approach

    Xiaojie Zhao1, Xiankui Meng1, Ruyong Ren2, Shaozhang Niu2,*, Zhenguang Gao3

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1765-1781, 2023, DOI:10.32604/cmc.2023.029552 - 06 February 2023

    Abstract Detecting double Joint Photographic Experts Group (JPEG) compression for color images is vital in the field of image forensics. In previous researches, there have been various approaches to detecting double JPEG compression with different quantization matrices. However, the detection of double JPEG color images with the same quantization matrix is still a challenging task. An effective detection approach to extract features is proposed in this paper by combining traditional analysis with Convolutional Neural Networks (CNN). On the one hand, the number of nonzero pixels and the sum of pixel values of color space conversion error… More >

  • Open Access

    ARTICLE

    A Derivative Matrix-Based Covert Communication Method in Blockchain

    Xiang Zhang1, Xiaona Zhang2,4,*, Xiaorui Zhang3,5,6, Wei Sun6,7, Ruohan Meng8, Xingming Sun1

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 225-239, 2023, DOI:10.32604/csse.2023.034915 - 20 January 2023

    Abstract The data in the blockchain cannot be tampered with and the users are anonymous, which enables the blockchain to be a natural carrier for covert communication. However, the existing methods of covert communication in blockchain suffer from the predefined channel structure, the capacity of a single transaction is not high, and the fixed transaction behaviors will lower the concealment of the communication channel. Therefore, this paper proposes a derivation matrix-based covert communication method in blockchain. It uses dual-key to derive two types of blockchain addresses and then constructs an address matrix by dividing addresses into… More >

  • Open Access

    ARTICLE

    2D Minimum Compliance Topology Optimization Based on a Region Partitioning Strategy

    Chong Wang1, Tongxing Zuo1,2, Haitao Han1,2, Qianglong Wang1,2, Han Zhang1, Zhenyu Liu1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 655-683, 2023, DOI:10.32604/cmes.2023.025153 - 05 January 2023

    Abstract This paper presents an extended sequential element rejection and admission (SERA) topology optimization method with a region partitioning strategy. Based on the partitioning of a design domain into solid regions and weak regions, the proposed optimization method sequentially implements finite element analysis (FEA) in these regions. After standard FEA in the solid regions, the boundary displacement of the weak regions is constrained using the numerical solution of the solid regions as Dirichlet boundary conditions. This treatment can alleviate the negative effect of the material interpolation model of the topology optimization method in the weak regions, More > Graphic Abstract

    2D Minimum Compliance Topology Optimization Based on a Region Partitioning Strategy

  • Open Access

    ARTICLE

    An Improved Pairing-Free Ciphertext Policy Framework for IoT

    M. Amirthavalli*, S. Chithra, R. Yugha

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3079-3095, 2023, DOI:10.32604/csse.2023.032486 - 21 December 2022

    Abstract Internet of Things (IoT) enables devices to get connected to the internet. Once they are connected, they behave as smart devices thereby releasing sensitive data periodically. There is a necessity to preserve the confidentiality and integrity of this data during transmission in public communication channels and also permitting only legitimate users to access their data A key challenge of smart networks is to establish a secure end-to-end data communication architecture by addressing the security vulnerabilities of data users and smart devices. The objective of this research work is to create a framework encompassing Ciphertext policy More >

  • Open Access

    ARTICLE

    Multi-label Emotion Classification of COVID–19 Tweets with Deep Learning and Topic Modelling

    K. Anuratha1,*, M. Parvathy2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3005-3021, 2023, DOI:10.32604/csse.2023.031553 - 21 December 2022

    Abstract The COVID-19 pandemic has become one of the severe diseases in recent years. As it majorly affects the common livelihood of people across the universe, it is essential for administrators and healthcare professionals to be aware of the views of the community so as to monitor the severity of the spread of the outbreak. The public opinions are been shared enormously in microblogging media like twitter and is considered as one of the popular sources to collect public opinions in any topic like politics, sports, entertainment etc., This work presents a combination of Intensity Based… More >

  • Open Access

    ARTICLE

    N×N Clos Digital Cross-Connect Switch Using Quantum Dot Cellular Automata (QCA)

    Amita Asthana1,*, Anil Kumar1, Preeta Sharan2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2901-2917, 2023, DOI:10.32604/csse.2023.030548 - 21 December 2022

    Abstract Quantum dot cellular automata (QCA) technology is emerging as a future technology which designs the digital circuits at quantum levels. The technology has gained popularity in terms of designing digital circuits, which occupy very less area and less power dissipation in comparison to the present complementary metal oxide semiconductor (CMOS) technology. For designing the routers at quantum levels with non-blocking capabilities various multi-stage networks have been proposed. This manuscript presents the design of the N×N Clos switch matrix as a multistage interconnecting network using quantum-dot cellular automata technology. The design of the Clos switch matrix… More >

  • Open Access

    ARTICLE

    Prognostic model for prostate cancer based on glycolysis-related genes and non-negative matrix factorization analysis

    ZECHAO LU1,#, FUCAI TANG1,#, HAOBIN ZHOU2,#, ZEGUANG LU3,#, WANYAN CAI4,#, JIAHAO ZHANG5, ZHICHENG TANG6, YONGCHANG LAI1,*, ZHAOHUI HE1,*

    BIOCELL, Vol.47, No.2, pp. 339-350, 2023, DOI:10.32604/biocell.2023.023750 - 18 November 2022

    Abstract Background: Establishing an appropriate prognostic model for PCa is essential for its effective treatment. Glycolysis is a vital energy-harvesting mechanism for tumors. Developing a prognostic model for PCa based on glycolysis-related genes is novel and has great potential. Methods: First, gene expression and clinical data of PCa patients were downloaded from The Cancer Genome Atlas (TCGA) and Gene Expression Omnibus (GEO), and glycolysis-related genes were obtained from the Molecular Signatures Database (MSigDB). Gene enrichment analysis was performed to verify that glycolysis functions were enriched in the genes we obtained, which were used in non-negative matrix factorization… More >

  • Open Access

    ARTICLE

    Attribute Reduction for Information Systems via Strength of Rules and Similarity Matrix

    Mohsen Eid1, Tamer Medhat2,*, Manal E. Ali3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1531-1544, 2023, DOI:10.32604/csse.2023.031745 - 03 November 2022

    Abstract An information system is a type of knowledge representation, and attribute reduction is crucial in big data, machine learning, data mining, and intelligent systems. There are several ways for solving attribute reduction problems, but they all require a common categorization. The selection of features in most scientific studies is a challenge for the researcher. When working with huge datasets, selecting all available attributes is not an option because it frequently complicates the study and decreases performance. On the other side, neglecting some attributes might jeopardize data accuracy. In this case, rough set theory provides a… More >

Displaying 31-40 on page 4 of 258. Per Page