Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (75)
  • Open Access

    ARTICLE

    An Improved Encoder-Decoder CNN with Region-Based Filtering for Vibrant Colorization

    Mrityunjoy Gain1, Md Arifur Rahman1, Rameswar Debnath1, Mrim M. Alnfiai2, Abdullah Sheikh3, Mehedi Masud3, Anupam Kumar Bairagi1,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1059-1077, 2023, DOI:10.32604/csse.2023.034809 - 20 January 2023

    Abstract Colorization is the practice of adding appropriate chromatic values to monochrome photographs or videos. A real-valued luminance image can be mapped to a three-dimensional color image. However, it is a severely ill-defined problem and not has a single solution. In this paper, an encoder-decoder Convolutional Neural Network (CNN) model is used for colorizing gray images where the encoder is a Densely Connected Convolutional Network (DenseNet) and the decoder is a conventional CNN. The DenseNet extracts image features from gray images and the conventional CNN outputs a * b * color channels. Due to a large number of desaturated… More >

  • Open Access

    ARTICLE

    Micro Calcification Detection in Mammogram Images Using Contiguous Convolutional Neural Network Algorithm

    P. Gomathi1,*, C. Muniraj2, P. S. Periasamy3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1887-1899, 2023, DOI:10.32604/csse.2023.028808 - 03 November 2022

    Abstract The mortality rate decreases as the early detection of Breast Cancer (BC) methods are emerging very fast, and when the starting stage of BC is detected, it is curable. The early detection of the disease depends on the image processing techniques, and it is used to identify the disease easily and accurately, especially the micro calcifications are visible on mammography when they are 0.1 mm or bigger, and cancer cells are about 0.03 mm, which is crucial for identifying in the BC area. To achieve this micro calcification in the BC images, it is necessary… More >

  • Open Access

    ARTICLE

    Robust Vehicle Detection Based on Improved You Look Only Once

    Sunil Kumar1, Manisha Jailia1, Sudeep Varshney2, Nitish Pathak3, Shabana Urooj4,*, Nouf Abd Elmunim4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3561-3577, 2023, DOI:10.32604/cmc.2023.029999 - 31 October 2022

    Abstract Vehicle detection is still challenging for intelligent transportation systems (ITS) to achieve satisfactory performance. The existing methods based on one stage and two-stage have intrinsic weakness in obtaining high vehicle detection performance. Due to advancements in detection technology, deep learning-based methods for vehicle detection have become more popular because of their higher detection accuracy and speed than the existing algorithms. This paper presents a robust vehicle detection technique based on Improved You Look Only Once (RVD-YOLOv5) to enhance vehicle detection accuracy. The proposed method works in three phases; in the first phase, the K-means algorithm… More >

  • Open Access

    ARTICLE

    Customer Segment Prediction on Retail Transactional Data Using K-Means and Markov Model

    A. S. Harish*, C. Malathy

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 589-600, 2023, DOI:10.32604/iasc.2023.032030 - 29 September 2022

    Abstract Retailing is a dynamic business domain where commodities and goods are sold in small quantities directly to the customers. It deals with the end user customers of a supply-chain network and therefore has to accommodate the needs and desires of a large group of customers over varied utilities. The volume and volatility of the business makes it one of the prospective fields for analytical study and data modeling. This is also why customer segmentation drives a key role in multiple retail business decisions such as marketing budgeting, customer targeting, customized offers, value proposition etc. The… More >

  • Open Access

    ARTICLE

    Enhanced Detection of Cerebral Atherosclerosis Using Hybrid Algorithm of Image Segmentation

    Shakunthala Masi*, Helenprabha Kuttiappan

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 733-744, 2023, DOI:10.32604/iasc.2023.025919 - 29 September 2022

    Abstract In medical science for envisaging human body’s phenomenal structure a major part has been driven by image processing techniques. Major objective of this work is to detect of cerebral atherosclerosis for image segmentation application. Detection of some abnormal structures in human body has become a difficult task to complete with some simple images. For expounding and distinguishing neural architecture of human brain in an effective manner, MRI (Magnetic Resonance Imaging) is one of the most suitable and significant technique. Here we work on detection of Cerebral Atherosclerosis from MRI images of patients. Cerebral Atherosclerosis is… More >

  • Open Access

    ARTICLE

    Detection Collision Flows in SDN Based 5G Using Machine Learning Algorithms

    Aqsa Aqdus1, Rashid Amin1,*, Sadia Ramzan1, Sultan S. Alshamrani2, Abdullah Alshehri3, El-Sayed M. El-kenawy4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1413-1435, 2023, DOI:10.32604/cmc.2023.031719 - 22 September 2022

    Abstract The rapid advancement of wireless communication is forming a hyper-connected 5G network in which billions of linked devices generate massive amounts of data. The traffic control and data forwarding functions are decoupled in software-defined networking (SDN) and allow the network to be programmable. Each switch in SDN keeps track of forwarding information in a flow table. The SDN switches must search the flow table for the flow rules that match the packets to handle the incoming packets. Due to the obvious vast quantity of data in data centres, the capacity of the flow table restricts… More >

  • Open Access

    ARTICLE

    Joint Energy Predication and Gathering Data in Wireless Rechargeable Sensor Network

    I. Vallirathi1,*, S. Ebenezer Juliet2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2349-2360, 2023, DOI:10.32604/csse.2023.024864 - 01 August 2022

    Abstract Wireless Sensor Network (WSNs) is an infrastructure-less wireless network deployed in an increasing number of wireless sensors in an ad-hoc manner. As the sensor nodes could be powered using batteries, the development of WSN energy constraints is considered to be a key issue. In wireless sensor networks (WSNs), wireless mobile chargers (MCs) conquer such issues mainly, energy shortages. The proposed work is to produce an energy-efficient recharge method for Wireless Rechargeable Sensor Network (WRSN), which results in a longer lifespan of the network by reducing charging delay and maintaining the residual energy of the sensor. In… More >

  • Open Access

    ARTICLE

    Evaluating Partitioning Based Clustering Methods for Extended Non-negative Matrix Factorization (NMF)

    Neetika Bhandari1,*, Payal Pahwa2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2043-2055, 2023, DOI:10.32604/iasc.2023.028368 - 19 July 2022

    Abstract Data is humongous today because of the extensive use of World Wide Web, Social Media and Intelligent Systems. This data can be very important and useful if it is harnessed carefully and correctly. Useful information can be extracted from this massive data using the Data Mining process. The information extracted can be used to make vital decisions in various industries. Clustering is a very popular Data Mining method which divides the data points into different groups such that all similar data points form a part of the same group. Clustering methods are of various types. More >

  • Open Access

    ARTICLE

    Association Rule Mining Frequent-Pattern-Based Intrusion Detection in Network

    S. Sivanantham1,*, V. Mohanraj2, Y. Suresh2, J. Senthilkumar2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1617-1631, 2023, DOI:10.32604/csse.2023.025893 - 15 June 2022

    Abstract In the network security system, intrusion detection plays a significant role. The network security system detects the malicious actions in the network and also conforms the availability, integrity and confidentiality of data information resources. Intrusion identification system can easily detect the false positive alerts. If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks. Many research works have been done. The issues in the existing algorithms are more memory space and need more time to execute the transactions of More >

  • Open Access

    ARTICLE

    P-ROCK: A Sustainable Clustering Algorithm for Large Categorical Datasets

    Ayman Altameem1, Ramesh Chandra Poonia2, Ankit Kumar3, Linesh Raja4, Abdul Khader Jilani Saudagar5,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 553-566, 2023, DOI:10.32604/iasc.2023.027579 - 06 June 2022

    Abstract Data clustering is crucial when it comes to data processing and analytics. The new clustering method overcomes the challenge of evaluating and extracting data from big data. Numerical or categorical data can be grouped. Existing clustering methods favor numerical data clustering and ignore categorical data clustering. Until recently, the only way to cluster categorical data was to convert it to a numeric representation and then cluster it using current numeric clustering methods. However, these algorithms could not use the concept of categorical data for clustering. Following that, suggestions for expanding traditional categorical data processing methods… More >

Displaying 11-20 on page 2 of 75. Per Page