Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (96)
  • Open Access

    ARTICLE

    Adaptive Sub-Threshold Voltage Level Control for Voltage Deviate-Domino Circuits

    C. Arun Prasath1,*, C. Gowri Shankar2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1767-1781, 2023, DOI:10.32604/iasc.2023.028758 - 19 July 2022

    Abstract Leakage power and propagation delay are two significant issues found in sub-micron technology-based Complementary Metal-Oxide-Semiconductor (CMOS)-based Very Large-Scale Integration (VLSI) circuit designs. Positive Channel Metal Oxide Semiconductor (PMOS) has been replaced by Negative Channel Metal Oxide Semiconductor (NMOS) in recent years, with low dimension-switching changes in order to shape the mirror of voltage comparator. NMOS is used to reduce stacking leakage as well as total exchange. Domino Logic Circuit is a powerful and versatile digital programmer that gained popularity in recent years. In this study regarding Adaptive Sub Threshold Voltage Level Control Problem, the researchers… More >

  • Open Access

    ARTICLE

    Fin Field Effect Transistor with Active 4-Bit Arithmetic Operations in 22 nm Technology

    S. Senthilmurugan1,*, K. Gunaseelan2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1323-1336, 2023, DOI:10.32604/iasc.2023.027650 - 19 July 2022

    Abstract A design of a high-speed multi-core processor with compact size is a trending approach in the Integrated Circuits (ICs) fabrication industries. Because whenever device size comes down into narrow, designers facing many power density issues should be reduced by scaling threshold voltage and supply voltage. Initially, Complementary Metal Oxide Semiconductor (CMOS) technology supports power saving up to 32 nm gate length, but further scaling causes short severe channel effects such as threshold voltage swing, mobility degradation, and more leakage power (less than 32) at gate length. Hence, it directly affects the arithmetic logic unit (ALU),… More >

  • Open Access

    ARTICLE

    Detection and Classification of Hemorrhages in Retinal Images

    Ghassan Ahmed Ali1, Thamer Mitib Ahmad Al Sariera2,*, Muhammad Akram1, Adel Sulaiman1, Fekry Olayah1

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1601-1616, 2023, DOI:10.32604/csse.2023.026119 - 15 June 2022

    Abstract Damage of the blood vessels in retina due to diabetes is called diabetic retinopathy (DR). Hemorrhages is the first clinically visible symptoms of DR. This paper presents a new technique to extract and classify the hemorrhages in fundus images. The normal objects such as blood vessels, fovea and optic disc inside retinal images are masked to distinguish them from hemorrhages. For masking blood vessels, thresholding that separates blood vessels and background intensity followed by a new filter to extract the border of vessels based on orientations of vessels are used. For masking optic disc, the… More >

  • Open Access

    ARTICLE

    Cervical Cancer Detection Based on Novel Decision Tree Approach

    S. R. Sylaja Vallee Narayan1,*, R. Jemila Rose2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1025-1038, 2023, DOI:10.32604/csse.2023.022564 - 15 June 2022

    Abstract Cervical cancer is a disease that develops in the cervix’s tissue. Cervical cancer mortality is being reduced due to the growth of screening programmers. Cervical cancer screening is a big issue because the majority of cervical cancer screening treatments are invasive. Hence, there is apprehension about standard screening procedures, as well as the time it takes to learn the results. There are different methods for detecting problems in the cervix using Pap (Papanicolaou-stained) test, colposcopy, Computed Tomography (CT), Magnetic Resonance Image (MRI) and ultrasound. To obtain a clear sketch of the infected regions, using a… More >

  • Open Access

    ARTICLE

    A Steganography Based on Optimal Multi-Threshold Block Labeling

    Shuying Xu1, Chin-Chen Chang1, Ji-Hwei Horng2,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 721-739, 2023, DOI:10.32604/csse.2023.026046 - 01 June 2022

    Abstract Hiding secret data in digital images is one of the major research fields in information security. Recently, reversible data hiding in encrypted images has attracted extensive attention due to the emergence of cloud services. This paper proposes a novel reversible data hiding method in encrypted images based on an optimal multi-threshold block labeling technique (OMTBL-RDHEI). In our scheme, the content owner encrypts the cover image with block permutation, pixel permutation, and stream cipher, which preserve the in-block correlation of pixel values. After uploading to the cloud service, the data hider applies the prediction error rearrangement… More >

  • Open Access

    ARTICLE

    Improved-Equalized Cluster Head Election Routing Protocol for Wireless Sensor Networks

    Muhammad Shahzeb Ali1, Ali Alqahtani2,*, Ansar Munir Shah1, Adel Rajab2, Mahmood Ul Hassan3, Asadullah Shaikh2, Khairan Rajab2, Basit Shahzad4

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 845-858, 2023, DOI:10.32604/csse.2023.025449 - 01 June 2022

    Abstract Throughout the use of the small battery-operated sensor nodes encourage us to develop an energy-efficient routing protocol for wireless sensor networks (WSNs). The development of an energy-efficient routing protocol is a mainly adopted technique to enhance the lifetime of WSN. Many routing protocols are available, but the issue is still alive. Clustering is one of the most important techniques in the existing routing protocols. In the clustering-based model, the important thing is the selection of the cluster heads. In this paper, we have proposed a scheme that uses the bubble sort algorithm for cluster head More >

  • Open Access

    ARTICLE

    Iris Recognition Based on Multilevel Thresholding Technique and Modified Fuzzy c-Means Algorithm

    Slim Ben Chaabane1,2,*, Rafika Harrabi1,2, Anas Bushnag1, Hassene Seddik2

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 201-214, 2022, DOI:10.32604/jai.2022.032850 - 25 May 2023

    Abstract Biometrics represents the technology for measuring the characteristics of the human body. Biometric authentication currently allows for secure, easy, and fast access by recognizing a person based on facial, voice, and fingerprint traits. Iris authentication is one of the essential biometric methods for identifying a person. This authentication type has become popular in research and practical applications. Unlike the face and hands, the iris is an internal organ, protected and therefore less likely to be damaged. However, the number of helpful information collected from the iris is much greater than the other biometric human organs.… More >

  • Open Access

    ARTICLE

    A Sea Ice Recognition Algorithm in Bohai Based on Random Forest

    Tao Li1, Di Wu1, Rui Han2, Jinyue Xia3, Yongjun Ren4,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3721-3739, 2022, DOI:10.32604/cmc.2022.029619 - 16 June 2022

    Abstract As an important maritime hub, Bohai Sea Bay provides great convenience for shipping and suffers from sea ice disasters of different severity every winter, which greatly affects the socio-economic and development of the region. Therefore, this paper uses FY-4A (a weather satellite) data to study sea ice in the Bohai Sea. After processing the data for land removal and cloud detection, it combines multi-channel threshold method and adaptive threshold algorithm to realize the recognition of Bohai Sea ice under clear sky conditions. The random forests classification algorithm is introduced in sea ice identification, which can More >

  • Open Access

    ARTICLE

    Edge Detection of COVID-19 CT Image Based on GF_SSR, Improved Multiscale Morphology, and Adaptive Threshold

    Shouming Hou1, Chaolan Jia1, Kai Li1, Liya Fan2, Jincheng Guo3,*, Mackenzie Brown4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 81-94, 2022, DOI:10.32604/cmes.2022.019006 - 02 June 2022

    Abstract Edge detection is an effective method for image segmentation and feature extraction. Therefore, extracting weak edges with the inhomogeneous gray of Corona Virus Disease 2019 (COVID-19) CT images is extremely important. Multiscale morphology has been widely used in the edge detection of medical images due to its excellent boundary detection accuracy. In this paper, we propose a weak edge detection method based on Gaussian filtering and singlescale Retinex (GF_SSR), and improved multiscale morphology and adaptive threshold binarization (IMSM_ATB). As all the CT images have noise, we propose to remove image noise by Gaussian filtering. The… More >

  • Open Access

    ARTICLE

    Study of Denoising in the Electricity Anti-Stealing Detection Based on VMD-WTD Combination

    Huakun Que1, Guolong Lin2, Wenchong Guo1, Xiaofeng Feng1, Zetao Jiang1, Yunfei Cao2,*, Jinmin Fan2, Zhixian Ni3

    Energy Engineering, Vol.119, No.4, pp. 1453-1466, 2022, DOI:10.32604/ee.2022.018448 - 23 May 2022

    Abstract In order to solve the failure of electricity anti-stealing detection device triggered by the noise mixed in high-frequency electricity stealing signals, a denoising method based on variational mode decomposition (VMD) and wavelet threshold denoising (WTD) was applied to extract the effective high-frequency electricity stealing signals. First, the signal polluted by noise was pre-decomposed using the VMD algorithm, the instantaneous frequency means of each pre-decomposed components was analyzed, so as to determine the optimal K value. The optimal K value was used to decompose the polluted signal into K intrinsic mode components, and the sensitive mode More > Graphic Abstract

    Study of Denoising in the Electricity Anti-Stealing Detection Based on VMD-WTD Combination

Displaying 41-50 on page 5 of 96. Per Page