Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (78)
  • Open Access

    ARTICLE

    Nodule Detection Using Local Binary Pattern Features to Enhance Diagnostic Decisions

    Umar Rashid1,2,*, Arfan Jaffar1,2, Muhammad Rashid3, Mohammed S. Alshuhri4, Sheeraz Akram1,4,5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3377-3390, 2024, DOI:10.32604/cmc.2024.046320

    Abstract Pulmonary nodules are small, round, or oval-shaped growths on the lungs. They can be benign (noncancerous) or malignant (cancerous). The size of a nodule can range from a few millimeters to a few centimeters in diameter. Nodules may be found during a chest X-ray or other imaging test for an unrelated health problem. In the proposed methodology pulmonary nodules can be classified into three stages. Firstly, a 2D histogram thresholding technique is used to identify volume segmentation. An ant colony optimization algorithm is used to determine the optimal threshold value. Secondly, geometrical features such as lines, arcs, extended arcs, and… More >

  • Open Access

    ARTICLE

    Fault Monitoring Strategy for PV System Based on I-V Feature Library

    Huaxing Zhao1, Yanbo Che1,*, Gang Wen2, Yijing Chen3

    Energy Engineering, Vol.121, No.3, pp. 643-660, 2024, DOI:10.32604/ee.2023.045204

    Abstract Long-term use in challenging natural conditions is possible for photovoltaic modules, which are extremely prone to failure. Failure to diagnose and address faults in Photovoltaic (PV) power systems in a timely manner can cause permanent damage to PV modules and, in more serious cases, fires. Therefore, research into photovoltaic module defect detection techniques is crucial for the growth of the photovoltaic sector as well as for maintaining national economic prosperity and ensuring public safety. Considering the drawbacks of the current real-time and historical data-based methods for monitoring distributed PV systems, this paper proposes a method for monitoring PV systems at… More >

  • Open Access

    ARTICLE

    Improving Video Watermarking through Galois Field GF(24) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques

    Yasmin Alaa Hassan1,*, Abdul Monem S. Rahma2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1423-1442, 2024, DOI:10.32604/cmc.2023.046149

    Abstract Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content authenticity. This study delves into the integration of Galois Field (GF) multiplication tables, especially GF(24), and their interaction with distinct irreducible polynomials. The primary aim is to enhance watermarking techniques for achieving imperceptibility, robustness, and efficient execution time. The research employs scene selection and adaptive thresholding techniques to streamline the watermarking process. Scene selection is used strategically to embed watermarks in the most vital frames of the video, while adaptive thresholding methods ensure that the watermarking process adheres to imperceptibility criteria, maintaining the video’s visual quality.… More >

  • Open Access

    ARTICLE

    Assessment of the Influence of Tunnel Settlement on Operational Performance of Subway Vehicles

    Gang Niu1,2, Guangwei Zhang1, Zhaoyang Jin1, Wei Zhang3,*, Xiang Liu3

    Structural Durability & Health Monitoring, Vol.18, No.1, pp. 55-71, 2024, DOI:10.32604/sdhm.2023.044832

    Abstract In the realm of subway shield tunnel operations, the impact of tunnel settlement on the operational performance of subway vehicles is a crucial concern. This study introduces an advanced analytical model to investigate rail geometric deformations caused by settlement within a vehicle-track-tunnel coupled system. The model integrates the geometric deformations of the track, attributed to settlement, as track irregularities. A novel “cyclic model” algorithm was employed to enhance computational efficiency without compromising on precision, a claim that was rigorously validated. The model’s capability extends to analyzing the time-history responses of vehicles traversing settlement-affected areas. The research primarily focuses on how… More >

  • Open Access

    ARTICLE

    Gender Differences in the Incidence and Related Factors of Low Social Support among Adolescents with Subthreshold Depression

    Yi Shi, Fangfang Shangguan*, Jing Xiao*

    International Journal of Mental Health Promotion, Vol.25, No.12, pp. 1257-1263, 2023, DOI:10.32604/ijmhp.2023.030516

    Abstract Background: Social support is related to depression, but the gender differences and related factors that contribute to low social support among adolescents with subthreshold depression remain to be elucidated. This study explores the relationship between social support and depression, in addition to the gender difference in the incidence of low social support among adolescents with subthreshold depression and its related factors. Methods: A total of 371 Chinese adolescents with subthreshold depression were recruited. All subjects were rated on the Social Support Scale for Adolescents, the Response Style Scale, the Self-Perception Profile for Children, the Individualism-collectivism scale. Results: Binary logistic regression… More >

  • Open Access

    ARTICLE

    Modified Black Widow Optimization-Based Enhanced Threshold Energy Detection Technique for Spectrum Sensing in Cognitive Radio Networks

    R. Saravanan1,*, R. Muthaiah1, A. Rajesh2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2339-2356, 2024, DOI:10.32604/cmes.2023.030898

    Abstract This study develops an Enhanced Threshold Based Energy Detection approach (ETBED) for spectrum sensing in a cognitive radio network. The threshold identification method is implemented in the received signal at the secondary user based on the square law. The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing. Additionally, the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems. In the dynamic threshold, the signal ratio-based threshold is fixed. The threshold is computed by considering the Modified Black Widow Optimization Algorithm (MBWO). So, the proposed… More > Graphic Abstract

    Modified Black Widow Optimization-Based Enhanced Threshold Energy Detection Technique for Spectrum Sensing in Cognitive Radio Networks

  • Open Access

    ARTICLE

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

    Laila M. Halman, Mohammed J. F. Alenazi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1469-1483, 2024, DOI:10.32604/cmes.2023.028077

    Abstract The healthcare sector holds valuable and sensitive data. The amount of this data and the need to handle, exchange, and protect it, has been increasing at a fast pace. Due to their nature, software-defined networks (SDNs) are widely used in healthcare systems, as they ensure effective resource utilization, safety, great network management, and monitoring. In this sector, due to the value of the data, SDNs face a major challenge posed by a wide range of attacks, such as distributed denial of service (DDoS) and probe attacks. These attacks reduce network performance, causing the degradation of different key performance indicators (KPIs)… More > Graphic Abstract

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

  • Open Access

    ARTICLE

    Alphabet-Level Indian Sign Language Translation to Text Using Hybrid-AO Thresholding with CNN

    Seema Sabharwal1,2,*, Priti Singla1

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2567-2582, 2023, DOI:10.32604/iasc.2023.035497

    Abstract Sign language is used as a communication medium in the field of trade, defence, and in deaf-mute communities worldwide. Over the last few decades, research in the domain of translation of sign language has grown and become more challenging. This necessitates the development of a Sign Language Translation System (SLTS) to provide effective communication in different research domains. In this paper, novel Hybrid Adaptive Gaussian Thresholding with Otsu Algorithm (Hybrid-AO) for image segmentation is proposed for the translation of alphabet-level Indian Sign Language (ISLTS) with a 5-layer Convolution Neural Network (CNN). The focus of this paper is to analyze various… More >

  • Open Access

    ARTICLE

    Associations of Time Spent on Study and Sleep with Anxiety and Depressive Symptoms in Junior High School Students: Report from the Large-Scale Monitoring of Basic Education Data in China

    Hao Yao1, Shuzhen Chen2,*

    International Journal of Mental Health Promotion, Vol.25, No.9, pp. 1053-1065, 2023, DOI:10.32604/ijmhp.2023.028844

    Abstract In the context of the COVID-19 pandemic and under the pressure of high competitiveness for higher education in China, junior high school students’ mental health is facing greater challenges. Understanding the time allocation of study and sleep is necessary for developing effective prevention and treatment programs. Based on a survey of 31,057 junior high school students in 47 junior high schools in Gansu Province, mainland China, the study analyzed the associations of time spent on study and sleep with anxiety and depressive symptoms among junior high school students through chi-square test, ANOVA, logistic regression model and threshold regression model. It… More >

  • Open Access

    ARTICLE

    Blockchain Privacy Protection Based on Post Quantum Threshold Algorithm

    Faguo Wu1,2,3,4,*, Bo Zhou2, Jie Jiang5, Tianyu Lei1, Jiale Song1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 957-973, 2023, DOI:10.32604/cmc.2023.038771

    Abstract With the rapid increase in demand for data trustworthiness and data security, distributed data storage technology represented by blockchain has received unprecedented attention. These technologies have been suggested for various uses because of their remarkable ability to offer decentralization, high autonomy, full process traceability, and tamper resistance. Blockchain enables the exchange of information and value in an untrusted environment. There has been a significant increase in attention to the confidentiality and privacy preservation of blockchain technology. Ensuring data privacy is a critical concern in cryptography, and one of the most important protocols used to achieve this is the secret-sharing method.… More >

Displaying 1-10 on page 1 of 78. Per Page