Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (258)
  • Open Access

    ARTICLE

    Image Enhancement Using Adaptive Fractional Order Filter

    Ayesha Heena1,*, Nagashettappa Biradar1, Najmuddin M. Maroof2, Surbhi Bhatia3, Arwa Mashat4, Shakila Basheer5

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1409-1422, 2023, DOI:10.32604/csse.2023.029611 - 03 November 2022

    Abstract Image enhancement is an important preprocessing task as the contrast is low in most of the medical images, Therefore, enhancement becomes the mandatory process before actual image processing should start. This research article proposes an enhancement of the model-based differential operator for the images in general and Echocardiographic images, the proposed operators are based on Grunwald-Letnikov (G-L), Riemann-Liouville (R-L) and Caputo (Li & Xie), which are the definitions of fractional order calculus. In this fractional-order, differentiation is well focused on the enhancement of echocardiographic images. This provoked for developing a non-linear filter mask for image… More >

  • Open Access

    ARTICLE

    An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms

    Muhammad Nadeem1, Ali Arshad2,*, Saman Riaz2, Syeda Wajiha Zahra1, Ashit Kumar Dutta3, Moteeb Al Moteri4, Sultan Almotairi5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4059-4079, 2023, DOI:10.32604/cmc.2023.032882 - 31 October 2022

    Abstract Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form. Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data. This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse. If this algorithm is applied to the cloud network, the attacker will not be able to access the data. To encrypt the data, the values of the bytes have been obtained by converting the plain text to… More >

  • Open Access

    ARTICLE

    Developing a Secure Framework Using Feature Selection and Attack Detection Technique

    Mahima Dahiya*, Nitin Nitin

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4183-4201, 2023, DOI:10.32604/cmc.2023.032430 - 31 October 2022

    Abstract Intrusion detection is critical to guaranteeing the safety of the data in the network. Even though, since Internet commerce has grown at a breakneck pace, network traffic kinds are rising daily, and network behavior characteristics are becoming increasingly complicated, posing significant hurdles to intrusion detection. The challenges in terms of false positives, false negatives, low detection accuracy, high running time, adversarial attacks, uncertain attacks, etc. lead to insecure Intrusion Detection System (IDS). To offset the existing challenge, the work has developed a secure Data Mining Intrusion detection system (DataMIDS) framework using Functional Perturbation (FP) feature… More >

  • Open Access

    ARTICLE

    Data Mining with Comprehensive Oppositional Based Learning for Rainfall Prediction

    Mohammad Alamgeer1, Amal Al-Rasheed2, Ahmad Alhindi3, Manar Ahmed Hamza4,*, Abdelwahed Motwakel4, Mohamed I. Eldesouki5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2725-2738, 2023, DOI:10.32604/cmc.2023.029163 - 31 October 2022

    Abstract Data mining process involves a number of steps from data collection to visualization to identify useful data from massive data set. the same time, the recent advances of machine learning (ML) and deep learning (DL) models can be utilized for effectual rainfall prediction. With this motivation, this article develops a novel comprehensive oppositional moth flame optimization with deep learning for rainfall prediction (COMFO-DLRP) Technique. The proposed CMFO-DLRP model mainly intends to predict the rainfall and thereby determine the environmental changes. Primarily, data pre-processing and correlation matrix (CM) based feature selection processes are carried out. In More >

  • Open Access

    ARTICLE

    Computational Modeling of Reaction-Diffusion COVID-19 Model Having Isolated Compartment

    Muhammad Shoaib Arif1,2,*, Kamaleldin Abodayeh1, Asad Ejaz2

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1719-1743, 2023, DOI:10.32604/cmes.2022.022235 - 27 October 2022

    Abstract Cases of COVID-19 and its variant omicron are raised all across the world. The most lethal form and effect of COVID-19 are the omicron version, which has been reported in tens of thousands of cases daily in numerous nations. Following WHO (World health organization) records on 30 December 2021, the cases of COVID-19 were found to be maximum for which boarding individuals were found 1,524,266, active, recovered, and discharge were found to be 82,402 and 34,258,778, respectively. While there were 160,989 active cases, 33,614,434 cured cases, 456,386 total deaths, and 605,885,769 total samples tested. So… More >

  • Open Access

    ARTICLE

    Topology Optimization of Stiffener Layout Design for Box Type Load-Bearing Component under Thermo-Mechanical Coupling

    Zhaohui Yang1,2,*, Tianhua Xiong1, Fei Du1,*, Baotong Li3

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1701-1718, 2023, DOI:10.32604/cmes.2023.022758 - 27 October 2022

    Abstract The structure optimization design under thermo-mechanical coupling is a difficult problem in the topology optimization field. An adaptive growth algorithm has become a more effective approach for structural topology optimization. This paper proposed a topology optimization method by an adaptive growth algorithm for the stiffener layout design of box type load-bearing components under thermo-mechanical coupling. Based on the stiffness diffusion theory, both the load stiffness matrix and the heat conduction stiffness matrix of the stiffener are spread at the same time to make sure the stiffener grows freely and obtain an optimal stiffener layout design.… More >

  • Open Access

    ARTICLE

    Customer Segment Prediction on Retail Transactional Data Using K-Means and Markov Model

    A. S. Harish*, C. Malathy

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 589-600, 2023, DOI:10.32604/iasc.2023.032030 - 29 September 2022

    Abstract Retailing is a dynamic business domain where commodities and goods are sold in small quantities directly to the customers. It deals with the end user customers of a supply-chain network and therefore has to accommodate the needs and desires of a large group of customers over varied utilities. The volume and volatility of the business makes it one of the prospective fields for analytical study and data modeling. This is also why customer segmentation drives a key role in multiple retail business decisions such as marketing budgeting, customer targeting, customized offers, value proposition etc. The… More >

  • Open Access

    ARTICLE

    Distortion Evaluation of EMP Sensors Using Associated-Hermite Functions

    Rupo Ma1,2,*, Siping Gao3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1093-1105, 2023, DOI:10.32604/cmc.2023.030979 - 22 September 2022

    Abstract Electromagnetic pulse (EMP) is a kind of transient electromagnetic phenomenon with short rise time of the leading edge and wide spectrum, which usually disrupts communications and damages electronic equipment and system. It is challenging for an EMP sensor to measure a wideband electromagnetic pulse without distortion for the whole spectrum. Therefore, analyzing the distortion of EMP measurement is crucial to evaluating the sensor distortion characteristics and correcting the measurement results. Waveform fidelity is usually employed to evaluate the distortion of an antenna. However, this metric depends on specific signal waveforms, thus is unsuitable for evaluating… More >

  • Open Access

    ARTICLE

    Exact Solutions and Finite Time Stability of Linear Conformable Fractional Systems with Pure Delay

    Ahmed M. Elshenhab1,2,*, Xingtao Wang1, Fatemah Mofarreh3, Omar Bazighifan4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 927-940, 2023, DOI:10.32604/cmes.2022.021512 - 31 August 2022

    Abstract We study nonhomogeneous systems of linear conformable fractional differential equations with pure delay. By using new conformable delayed matrix functions and the method of variation, we obtain a representation of their solutions. As an application, we derive a finite time stability result using the representation of solutions and a norm estimation of the conformable delayed matrix functions. The obtained results are new, and they extend and improve some existing ones. Finally, an example is presented to illustrate the validity of our theoretical results. More >

  • Open Access

    ARTICLE

    A Novel Approach for Improving the PQ in SPIM

    P. Jenitha Deepa*, H. Habeebullah Sait

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2703-2715, 2023, DOI:10.32604/iasc.2023.030496 - 17 August 2022

    Abstract Single Phase Induction Motor (SPIM) is widely used in industries at starting stage to provide high starting torque. The objective of the work is to develop a drive for Single Phase Induction Motor that does not use a start or run capacitor. In this work, the researchers present the details about Maximum Power Point Tracking using series-compensated Buck Boost Converter, resonant Direct Current (DC) to Alternate Current (AC) inverter and matrix converter-based drive. The proposed method provides a variable starting torque feature that can be adjusted depending upon machine load to ensure Power Quality (PQ). More >

Displaying 41-50 on page 5 of 258. Per Page