Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (16)
  • Open Access

    ARTICLE

    Application of the Deep Convolutional Neural Network for the Classification of Auto Immune Diseases

    Fayaz Muhammad1, Jahangir Khan1, Asad Ullah1, Fasee Ullah1, Razaullah Khan2, Inayat Khan2, Mohammed ElAffendi3, Gauhar Ali3,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 647-664, 2023, DOI:10.32604/cmc.2023.038748

    Abstract IIF (Indirect Immune Florescence) has gained much attention recently due to its importance in medical sciences. The primary purpose of this work is to highlight a step-by-step methodology for detecting autoimmune diseases. The use of IIF for detecting autoimmune diseases is widespread in different medical areas. Nearly 80 different types of autoimmune diseases have existed in various body parts. The IIF has been used for image classification in both ways, manually and by using the Computer-Aided Detection (CAD) system. The data scientists conducted various research works using an automatic CAD system with low accuracy. The diseases in the human body… More >

  • Open Access

    ARTICLE

    A New Method for Image Tamper Detection Based on an Improved U-Net

    Jie Zhang, Jianxun Zhang*, Bowen Li, Jie Cao, Yifan Guo

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2883-2895, 2023, DOI:10.32604/iasc.2023.039805

    Abstract With the improvement of image editing technology, the threshold of image tampering technology decreases, which leads to a decrease in the authenticity of image content. This has also driven research on image forgery detection techniques. In this paper, a U-Net with multiple sensory field feature extraction (MSCU-Net) for image forgery detection is proposed. The proposed MSCU-Net is an end-to-end image essential attribute segmentation network that can perform image forgery detection without any pre-processing or post-processing. MSCU-Net replaces the single-scale convolution module in the original network with an improved multiple perceptual field convolution module so that the decoder can synthesize the… More >

  • Open Access

    ARTICLE

    A Multi-Stream Scrambling and DNA Encoding Method Based Image Encryption

    Nashat Salih Abdulkarim Alsandi1, Dilovan Asaad Zebari2,*, Adel Al-Zebari3, Falah Y. H. Ahmed4, Mazin Abed Mohammed5, Marwan Albahar6, Abdulaziz Ali Albahr7,8

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1321-1347, 2023, DOI:10.32604/csse.2023.038089

    Abstract Information security has emerged as a key problem in encryption because of the rapid evolution of the internet and networks. Thus, the progress of image encryption techniques is becoming an increasingly serious issue and considerable problem. Small space of the key, encryption-based low confidentiality, low key sensitivity, and easily exploitable existing image encryption techniques integrating chaotic system and DNA computing are purposing the main problems to propose a new encryption technique in this study. In our proposed scheme, a three-dimensional Chen’s map and a one-dimensional Logistic map are employed to construct a double-layer image encryption scheme. In the confusion stage,… More >

  • Open Access

    ARTICLE

    Dual Image Cryptosystem Using Henon Map and Discrete Fourier Transform

    Hesham Alhumyani*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2933-2945, 2023, DOI:10.32604/iasc.2023.034689

    Abstract This paper introduces an efficient image cryptography system. The proposed image cryptography system is based on employing the two-dimensional (2D) chaotic henon map (CHM) in the Discrete Fourier Transform (DFT). The proposed DFT-based CHM image cryptography has two procedures which are the encryption and decryption procedures. In the proposed DFT-based CHM image cryptography, the confusion is employed using the CHM while the diffusion is realized using the DFT. So, the proposed DFT-based CHM image cryptography achieves both confusion and diffusion characteristics. The encryption procedure starts by applying the DFT on the image then the DFT transformed image is scrambled using… More >

  • Open Access

    ARTICLE

    A Novel Lightweight Image Encryption Scheme

    Rawia Abdulla Mohammed1,*, Maisa’a Abid Ali Khodher1, Ashwak Alabaichi2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2137-2153, 2023, DOI:10.32604/cmc.2023.036861

    Abstract Encryption algorithms are one of the methods to protect data during its transmission through an unsafe transmission medium. But encryption methods need a lot of time during encryption and decryption, so it is necessary to find encryption algorithms that consume little time while preserving the security of the data. In this paper, more than one algorithm was combined to obtain high security with a short implementation time. A chaotic system, DNA computing, and Salsa20 were combined. A proposed 5D chaos system was used to generate more robust keys in a Salsa algorithm and DNA computing. Also, the confusion is performed… More >

  • Open Access

    ARTICLE

    Classification of Nonlinear Confusion Component Using Hybrid Multi-Criteria Decision Making

    Nabilah Abughazalah1, Iqra Ishaque2, Majid Khan2,*, Ammar S. Alanazi3, Iqtadar Hussain4,5

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1451-1463, 2023, DOI:10.32604/iasc.2023.031855

    Abstract In today’s digital world, the most inevitable challenge is the protection of digital information. Due to the weak confidentiality preserving techniques, the existing world is facing several digital information breaches. To make our digital data indecipherable to the unauthorized person, a technique for finding a cryptographically strong Substitution box (S-box) have presented. An S-box with sound cryptographic assets such as nonlinearity (NL), strict avalanche criterion (SAC), bit independence criteria (BIC), bit independence criteria of nonlinearity (BIC-NL), Bit independence criteria of Strict avalanche criteria (BIC-SAC), and Input/output XOR is considered as the robust S-box. The Decision-Making Trial and Evaluation Laboratory (DEMATEL)… More >

  • Open Access

    ARTICLE

    Vibration-Based Fault Diagnosis Study on a Hydraulic Brake System Using Fuzzy Logic with Histogram Features

    Alamelu Manghai T Marimuthu1, Jegadeeshwaran Rakkiyannan2,*, Lakshmipathi Jakkamputi1, Sugumaran Vaithiyanathan1, Sakthivel Gnanasekaran2

    Structural Durability & Health Monitoring, Vol.16, No.4, pp. 383-396, 2022, DOI:10.32604/sdhm.2022.011396

    Abstract The requirement of fault diagnosis in the field of automobiles is growing higher day by day. The reliability of human resources for the fault diagnosis is uncertain. Brakes are one of the major critical components in automobiles that require closer and active observation. This research work demonstrates a fault diagnosis technique for monitoring the hydraulic brake system using vibration analysis. Vibration signals of a rotating element contain dynamic information about its health condition. Hence, the vibration signals were used for the brake fault diagnosis study. The study was carried out on a brake fault diagnosis experimental setup. The vibration signals… More >

  • Open Access

    ARTICLE

    Novel Scheme for Robust Confusion Component Selection Based on Pythagorean Fuzzy Set

    Nabilah Abughazalah1, Mohsin Iqbal2, Majid Khan3,*, Iqtadar Hussain4,5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6523-6534, 2023, DOI:10.32604/cmc.2022.031859

    Abstract The substitution box, often known as an S-box, is a nonlinear component that is a part of several block ciphers. Its purpose is to protect cryptographic algorithms from a variety of cryptanalytic assaults. A MultiCriteria Decision Making (MCDM) problem has a complex selection procedure because of having many options and criteria to choose from. Because of this, statistical methods are necessary to assess the performance score of each S-box and decide which option is the best one available based on this score. Using the Pythagorean Fuzzy-based Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) method, the major… More >

  • Open Access

    ARTICLE

    Predictive-Analysis-based Machine Learning Model for Fraud Detection with Boosting Classifiers

    M. Valavan, S. Rita*

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 231-245, 2023, DOI:10.32604/csse.2023.026508

    Abstract Fraud detection for credit/debit card, loan defaulters and similar types is achievable with the assistance of Machine Learning (ML) algorithms as they are well capable of learning from previous fraud trends or historical data and spot them in current or future transactions. Fraudulent cases are scant in the comparison of non-fraudulent observations, almost in all the datasets. In such cases detecting fraudulent transaction are quite difficult. The most effective way to prevent loan default is to identify non-performing loans as soon as possible. Machine learning algorithms are coming into sight as adept at handling such data with enough computing influence.… More >

  • Open Access

    ARTICLE

    Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore Software Maintenance

    Atif Ikram1,2,*, Masita Abdul Jalil1, Amir Bin Ngah1, Nadeem Iqbal2, Nazri Kama4, Azri Azmi4, Ahmad Salman Khan3, Yasir Mahmood3,4, Assad Alzayed5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3827-3845, 2022, DOI:10.32604/cmc.2022.029609

    Abstract Properly created and securely communicated, non-disclosure agreement (NDA) can resolve most of the common disputes related to outsourcing of offshore software maintenance (OSMO). Occasionally, these NDAs are in the form of images. Since the work is done offshore, these agreements or images must be shared through the Internet or stored over the cloud. The breach of privacy, on the other hand, is a potential threat for the image owners as both the Internet and cloud servers are not void of danger. This article proposes a novel algorithm for securing the NDAs in the form of images. As an agreement is… More >

Displaying 1-10 on page 1 of 16. Per Page