Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (82)
  • Open Access

    ARTICLE

    Robust Frequency Estimation Under Additive Symmetric α-Stable Gaussian Mixture Noise

    Peng Wang1, Yulu Tian2, Bolong Men1,*, Hailong Song1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 83-95, 2023, DOI:10.32604/iasc.2023.027602

    Abstract Here the estimating problem of a single sinusoidal signal in the additive symmetric α-stable Gaussian (ASαSG) noise is investigated. The ASαSG noise here is expressed as the additive of a Gaussian noise and a symmetric α-stable distributed variable. As the probability density function (PDF) of the ASαSG is complicated, traditional estimators cannot provide optimum estimates. Based on the Metropolis-Hastings (M-H) sampling scheme, a robust frequency estimator is proposed for ASαSG noise. Moreover, to accelerate the convergence rate of the developed algorithm, a new criterion of reconstructing the proposal covariance is derived, whose main idea is updating the proposal variance using… More >

  • Open Access

    ARTICLE

    Real and Altered Fingerprint Classification Based on Various Features and Classifiers

    Saif Saad Hameed, Ismail Taha Ahmed*, Omar Munthir Al Okashi

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 327-340, 2023, DOI:10.32604/cmc.2023.031622

    Abstract Biometric recognition refers to the identification of individuals through their unique behavioral features (e.g., fingerprint, face, and iris). We need distinguishing characteristics to identify people, such as fingerprints, which are world-renowned as the most reliable method to identify people. The recognition of fingerprints has become a standard procedure in forensics, and different techniques are available for this purpose. Most current techniques lack interest in image enhancement and rely on high-dimensional features to generate classification models. Therefore, we proposed an effective fingerprint classification method for classifying the fingerprint image as authentic or altered since criminals and hackers routinely change their fingerprints… More >

  • Open Access

    ARTICLE

    Data Mining Approach Based on Hierarchical Gaussian Mixture Representation Model

    Hanan A. Hosni Mahmoud1,*, Alaaeldin M. Hafez2, Fahd Althukair3

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3727-3741, 2023, DOI:10.32604/iasc.2023.031442

    Abstract Infinite Gaussian mixture process is a model that computes the Gaussian mixture parameters with order. This process is a probability density distribution with adequate training data that can converge to the input density curve. In this paper, we propose a data mining model namely Beta hierarchical distribution that can solve axial data modeling. A novel hierarchical Two-Hyper-Parameter Poisson stochastic process is developed to solve grouped data modelling. The solution uses data mining techniques to link datum in groups by linking their components. The learning techniques are novel presentations of Gaussian modelling that use prior knowledge of the representation hyper-parameters and… More >

  • Open Access

    ARTICLE

    A Parallel Computing Schema Based on IGA

    Jinggang Deng1,2, Bingquan Zuo1,2,*, Huixin Luo1,2, Weikang Xie1,2, Jiashu Yang1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.3, pp. 965-990, 2022, DOI:10.32604/cmes.2022.020631

    Abstract In this paper, a new computation scheme based on parallelization is proposed for Isogeometric analysis. The parallel computing is introduced to the whole progress of Isogeometric analysis. Firstly, with the help of the “tensorproduct” and “iso-parametric” feature, all the Gaussian integral points in particular element can be mapped to a global matrix using a transformation matrix that varies from element. Then the derivatives of Gauss integral points are computed in parallel, the results of which can be stored in a global matrix. And a middle layer is constructed to assemble the final stiffness matrices in parallel. The numerical example results… More >

  • Open Access

    ARTICLE

    Gaussian Optimized Deep Learning-based Belief Classification Model for Breast Cancer Detection

    Areej A. Malibari1, Marwa Obayya2, Mohamed K. Nour3, Amal S. Mehanna4, Manar Ahmed Hamza5,*, Abu Sarwar Zamani5, Ishfaq Yaseen5, Abdelwahed Motwakel5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4123-4138, 2022, DOI:10.32604/cmc.2022.030492

    Abstract With the rapid increase of new cases with an increased mortality rate, cancer is considered the second and most deadly disease globally. Breast cancer is the most widely affected cancer worldwide, with an increased death rate percentage. Due to radiologists’ processing of mammogram images, many computer-aided diagnoses have been developed to detect breast cancer. Early detection of breast cancer will reduce the death rate worldwide. The early diagnosis of breast cancer using the developed computer-aided diagnosis (CAD) systems still needed to be enhanced by incorporating innovative deep learning technologies to improve the accuracy and sensitivity of the detection system with… More >

  • Open Access

    ARTICLE

    Binary Tomography Reconstruction with Limited-Data by a Convex Level-Set Method

    Haytham A. Ali1,2,*, Hiroyuki Kudo1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3741-3756, 2022, DOI:10.32604/cmc.2022.029394

    Abstract This paper proposes a new level-set-based shape recovery approach that can be applied to a wide range of binary tomography reconstructions. In this technique, we derive generic evolution equations for shape reconstruction in terms of the underlying level-set parameters. We show that using the appropriate basis function to parameterize the level-set function results in an optimization problem with a small number of parameters, which overcomes many of the problems associated with the traditional level-set approach. More concretely, in this paper, we use Gaussian functions as a basis function placed at sparse grid points to represent the parametric level-set function and… More >

  • Open Access

    ARTICLE

    Deep CNN Model for Multimodal Medical Image Denoising

    Walid El-Shafai1,2, Amira A. Mahmoud1, Anas M. Ali1,3, El-Sayed M. El-Rabaie1, Taha E. Taha1, Osama F. Zahran1, Adel S. El-Fishawy1, Naglaa F. Soliman4, Amel A. Alhussan5,*, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3795-3814, 2022, DOI:10.32604/cmc.2022.029134

    Abstract In the literature, numerous techniques have been employed to decrease noise in medical image modalities, including X-Ray (XR), Ultrasonic (Us), Computed Tomography (CT), Magnetic Resonance Imaging (MRI), and Positron Emission Tomography (PET). These techniques are organized into two main classes: the Multiple Image (MI) and the Single Image (SI) techniques. In the MI techniques, images usually obtained for the same area scanned from different points of view are used. A single image is used in the entire procedure in the SI techniques. SI denoising techniques can be carried out both in a transform or spatial domain. This paper is concerned… More >

  • Open Access

    ARTICLE

    Optimal IoT Based Improved Deep Learning Model for Medical Image Classification

    Prasanalakshmi Balaji1,*, B. Sri Revathi2, Praveetha Gobinathan3, Shermin Shamsudheen3, Thavavel Vaiyapuri4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2275-2291, 2022, DOI:10.32604/cmc.2022.028560

    Abstract Recently medical image classification plays a vital role in medical image retrieval and computer-aided diagnosis system. Despite deep learning has proved to be superior to previous approaches that depend on handcrafted features; it remains difficult to implement because of the high intra-class variance and inter-class similarity generated by the wide range of imaging modalities and clinical diseases. The Internet of Things (IoT) in healthcare systems is quickly becoming a viable alternative for delivering high-quality medical treatment in today’s e-healthcare systems. In recent years, the Internet of Things (IoT) has been identified as one of the most interesting research subjects in… More >

  • Open Access

    ARTICLE

    RBMDO Using Gaussian Mixture Model-Based Second-Order Mean-Value Saddlepoint Approximation

    Debiao Meng1,2,3, Shiyuan Yang1, Tao Lin4,5,*, Jiapeng Wang1, Hengfei Yang1, Zhiyuan Lv1

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.2, pp. 553-568, 2022, DOI:10.32604/cmes.2022.020756

    Abstract Actual engineering systems will be inevitably affected by uncertain factors. Thus, the Reliability-Based Multidisciplinary Design Optimization (RBMDO) has become a hotspot for recent research and application in complex engineering system design. The Second-Order/First-Order Mean-Value Saddlepoint Approximate (SOMVSA/FOMVSA) are two popular reliability analysis strategies that are widely used in RBMDO. However, the SOMVSA method can only be used efficiently when the distribution of input variables is Gaussian distribution, which significantly limits its application. In this study, the Gaussian Mixture Model-based Second-Order Mean-Value Saddlepoint Approximation (GMM-SOMVSA) is introduced to tackle above problem. It is integrated with the Collaborative Optimization (CO) method to… More >

  • Open Access

    ARTICLE

    Implicit Continuous User Authentication for Mobile Devices based on Deep Reinforcement Learning

    Christy James Jose1,*, M. S. Rajasree2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1357-1372, 2023, DOI:10.32604/csse.2023.025672

    Abstract The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like, fingerprint or face. Implicit continuous authentication initiating to be loftier to conventional authentication mechanisms by continuously confirming users’ identities on continuing basis and mark the instant at which an illegitimate hacker grasps dominance of the session. However, divergent issues remain unaddressed. This research aims to investigate the power of Deep Reinforcement Learning technique to implicit continuous authentication for mobile devices using a method called, Gaussian Weighted Cauchy Kriging-based Continuous Czekanowski’s (GWCK-CC). First, a Gaussian Weighted… More >

Displaying 21-30 on page 3 of 82. Per Page