Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Edge Detection of COVID-19 CT Image Based on GF_SSR, Improved Multiscale Morphology, and Adaptive Threshold

    Shouming Hou1, Chaolan Jia1, Kai Li1, Liya Fan2, Jincheng Guo3,*, Mackenzie Brown4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 81-94, 2022, DOI:10.32604/cmes.2022.019006

    Abstract Edge detection is an effective method for image segmentation and feature extraction. Therefore, extracting weak edges with the inhomogeneous gray of Corona Virus Disease 2019 (COVID-19) CT images is extremely important. Multiscale morphology has been widely used in the edge detection of medical images due to its excellent boundary detection accuracy. In this paper, we propose a weak edge detection method based on Gaussian filtering and singlescale Retinex (GF_SSR), and improved multiscale morphology and adaptive threshold binarization (IMSM_ATB). As all the CT images have noise, we propose to remove image noise by Gaussian filtering. The edge of CT images is… More >

  • Open Access

    ARTICLE

    A Fast Element-Free Galerkin Method for 3D Elasticity Problems

    Zhijuan Meng1, Yanan Fang1, Yumin Cheng2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 55-79, 2022, DOI:10.32604/cmes.2022.019828

    Abstract In this paper, a fast element-free Galerkin (FEFG) method for three-dimensional (3D) elasticity problems is established. The FEFG method is a combination of the improved element-free Galerkin (IEFG) method and the dimension splitting method (DSM). By using the DSM, a 3D problem is converted to a series of 2D ones, and the IEFG method with a weighted orthogonal function as the basis function and the cubic spline function as the weight function is applied to simulate these 2D problems. The essential boundary conditions are treated by the penalty method. The splitting direction uses the finite difference method (FDM), which can… More >

  • Open Access

    ARTICLE

    Discrete Element Simulations of Ice Load and Mooring Force on Moored Structure in Level Ice

    Hongri Zhu, Shunying Ji*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 5-21, 2022, DOI:10.32604/cmes.2022.019991

    Abstract Moored structures are suitable for operations in ice-covered regions owing to their security and efficiency. This paper aims to present a new method for simulating the ice load and mooring force on the moored structure during ice-structure interaction with a spherical Discrete Element Method (DEM). In this method, the level ice and mooring lines consist of bonded sphere elements arranged in different patterns. The level ice model has been widely validated in simulation of the ice load of fixed structures. In the mooring line simulation, a string of spherical elements was jointed with the parallel bond model to simulate the… More >

  • Open Access

    ARTICLE

    A Steganography Based on Optimal Multi-Threshold Block Labeling

    Shuying Xu1, Chin-Chen Chang1, Ji-Hwei Horng2,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 721-739, 2023, DOI:10.32604/csse.2023.026046

    Abstract Hiding secret data in digital images is one of the major research fields in information security. Recently, reversible data hiding in encrypted images has attracted extensive attention due to the emergence of cloud services. This paper proposes a novel reversible data hiding method in encrypted images based on an optimal multi-threshold block labeling technique (OMTBL-RDHEI). In our scheme, the content owner encrypts the cover image with block permutation, pixel permutation, and stream cipher, which preserve the in-block correlation of pixel values. After uploading to the cloud service, the data hider applies the prediction error rearrangement (PER), the optimal threshold selection… More >

  • Open Access

    ARTICLE

    Combining Entropy Optimization and Sobel Operator for Medical Image Fusion

    Nguyen Tu Trung1,*, Tran Thi Ngan1, Tran Manh Tuan1, To Huu Nguyen2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 535-544, 2023, DOI:10.32604/csse.2023.026011

    Abstract Fusing medical images is a topic of interest in processing medical images. This is achieved to through fusing information from multimodality images for the purpose of increasing the clinical diagnosis accuracy. This fusion aims to improve the image quality and preserve the specific features. The methods of medical image fusion generally use knowledge in many different fields such as clinical medicine, computer vision, digital imaging, machine learning, pattern recognition to fuse different medical images. There are two main approaches in fusing image, including spatial domain approach and transform domain approachs. This paper proposes a new algorithm to fusion multimodal images.… More >

  • Open Access

    ARTICLE

    A Deep Learning Based Approach for Context-Aware Multi-Criteria Recommender Systems

    Son-Lam VU, Quang-Hung LE*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 471-483, 2023, DOI:10.32604/csse.2023.025897

    Abstract Recommender systems are similar to an information filtering system that helps identify items that best satisfy the users’ demands based on their preference profiles. Context-aware recommender systems (CARSs) and multi-criteria recommender systems (MCRSs) are extensions of traditional recommender systems. CARSs have integrated additional contextual information such as time, place, and so on for providing better recommendations. However, the majority of CARSs use ratings as a unique criterion for building communities. Meanwhile, MCRSs utilize user preferences in multiple criteria to better generate recommendations. Up to now, how to exploit context in MCRSs is still an open issue. This paper proposes a… More >

  • Open Access

    ARTICLE

    A Smart Room to Promote Autonomy of Disabled People due to Stroke

    Moeiz Miraoui1,2,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 677-692, 2023, DOI:10.32604/csse.2023.025799

    Abstract A cerebral vascular accident, known as common language stroke, is one of the main causes of mortality and remains the primary cause of acquired disabilities in adults. Those disabled people spend most of their time at home in their living rooms. In most cases, appliances of a living room (TV, light, cooler/heater, window blinds, etc.) are generally controlled by direct manipulation of a set of remote controls. Handling many remote controls can be disturbing and inappropriate for these people. In addition, in many cases these people could be alone at home and must open the door for visitors after their… More >

  • Open Access

    ARTICLE

    Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique

    Fawaz Alassery1, Ahmed Alzahrani2, Asif Irshad Khan2, Kanika Sharma3, Masood Ahmad4, Raees Ahmad Khan4,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 859-872, 2023, DOI:10.32604/csse.2023.025796

    Abstract In recent years, it has been observed that the disclosure of information increases the risk of terrorism. Without restricting the accessibility of information, providing security is difficult. So, there is a demand for time to fill the gap between security and accessibility of information. In fact, security tools should be usable for improving the security as well as the accessibility of information. Though security and accessibility are not directly influenced, some of their factors are indirectly influenced by each other. Attributes play an important role in bridging the gap between security and accessibility. In this paper, we identify the key… More >

  • Open Access

    ARTICLE

    Novel Sensing Hole Recovery with Expanded Relay Node Capability

    Moonseong Kim1, Woochan Lee2,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 663-675, 2023, DOI:10.32604/csse.2023.025615

    Abstract The occurrence of ‘sensing holes’ not only hinders seamless data collection but also leads to misinterpretation of information in certain areas under extensive data analysis. In order to overcome this, various sensor relocation strategies have been proposed, but the existing relocation strategies revealed problems such as the ping-pong, shaded area, network disconnection, etc. This paper conducted research on relocation protocols in a distributed environment that is very suitable for real-world situations and efficiently recovering the problem of sensing holes. First, a simulation was performed on the distribution of the shaded area for data collection, which is a problem with the… More >

  • Open Access

    ARTICLE

    Breast Calcifications and Histopathological Analysis on Tumour Detection by CNN

    D. Banumathy1,*, Osamah Ibrahim Khalaf2, Carlos Andrés Tavera Romero3, P. Vishnu Raja4, Dilip Kumar Sharma5

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 595-612, 2023, DOI:10.32604/csse.2023.025611

    Abstract The most salient argument that needs to be addressed universally is Early Breast Cancer Detection (EBCD), which helps people live longer lives. The Computer-Aided Detection (CADs)/Computer-Aided Diagnosis (CADx) system is indeed a software automation tool developed to assist the health professions in Breast Cancer Detection and Diagnosis (BCDD) and minimise mortality by the use of medical histopathological image classification in much less time. This paper purposes of examining the accuracy of the Convolutional Neural Network (CNN), which can be used to perceive breast malignancies for initial breast cancer detection to determine which strategy is efficient for the early identification of… More >

Displaying 7781-7790 on page 779 of 22225. Per Page