A critical step in medical care is the utilization of MRI imaging to detect brain tumors. The magnetic resonance imaging (MRI) method creates high-resolution images of the brain, making it the perfect medium for findi...
A critical step in medical care is the utilization of MRI imaging to detect brain tumors. The magnetic resonance imaging (MRI) method creates high-resolution images of the brain, making it the perfect medium for finding brain tumors. Planning a treatment strategy and diagnosing cancer can be assisted by the tumor identification and brain MRI scan segmentation. Deep learning has shown promise in several applications for image analysis, including medical image analysis. This study suggests using a pre-trained ResNet50 model in this study to find brain tumors. A deep convolutional neural network architecture called ResNet50 has demonstrated state-of-the-art performance in a variety of computervision tasks. Researchers optimize the ResNet50 model to train it for binary classification of brain tumor vs. healthy brain images using a set of MRI brain scans. The MRI images are pre-processed by being resized to a predetermined size and having the pixel intensities normalized. The pre-trained ResNet50 model’s efficiency on the testing set is assessed using the training set amendments. This work demonstrates the usefulness of using pre-trained deep learning algorithms, like ResNet50, for brain tumor diagnosis and shows that radiologists can accurately identify and diagnose brain tumors with the use of such models.
Fraud is the occurrence of any activity done using misleading, deceptive, or illegal ways which is done by someone to defraud you of your money (or capital), or otherwise jeopardizes financial well-being of you or you...
详细信息
The high-quality images yielded by generative adversarial networks (GANs) have motivated investigations into their application for image editing. However, GANs are often limited in the control they provide for perform...
详细信息
Mobile health (mHealth) has a vital role to play as it can improve communication and enhance the health care processes integration. The Saudi Ministry of Health (SMOH)has announced its initiatives to improve health se...
详细信息
ISBN:
(纸本)9781665449663
Mobile health (mHealth) has a vital role to play as it can improve communication and enhance the health care processes integration. The Saudi Ministry of Health (SMOH)has announced its initiatives to improve health services in the Kingdom of Saudi Arabia (KSA), and one of these initiatives is improving electronic health services. The aim of this research is to identify the most important mHealth services in the SMOH mobile applications. To achieve this aim, the study will admit a quantitative research method and the data will be collected through a questionnaire which will be distributed to patients in selected hospitals, in the (KSA. Recently, the SMOH has developed five mHelath applications in order to provide its mobile health services, however, there are several services which are not offered in these applications including appointment reservation, open and update electronic medical record, patient referee, physician directory, request medical reports and health risk assessments. The study will figure out whether these services are necessary and important for patients in the KSA. As a research implication, the research findings will expand an area of mHealth services in the KSA, which is still empirically not adequately explored. Additionally, the research results might provide valuable insights into the health professional and administrations in other countries.
The pinnacle of transportation is the development of autonomous driving, which, with the help of CAVs and related traffic management systems, can eventually lead to congestion- and accident-free driving. This vision h...
The pinnacle of transportation is the development of autonomous driving, which, with the help of CAVs and related traffic management systems, can eventually lead to congestion- and accident-free driving. This vision has as of late prodded extraordinary examination interest in fields including IoV, LTE-V2X, and 5G. In any case, the huge volume of traffic information that CAVs produce makes issues for both the current organizations and the approaching 5G correspondence organizations. For outside network innovations, the VMBS fills in as both a client hub and an edge processing hub. For CAVs, it fills in as a base station and a data caching hub, melding correspondence and calculation. People offer both the VMBS-empowered handset and figuring for CAVs as well as the VMBS-helped wireless innovation for other wireless gadgets to achieve this. It is underlined and addressed that there are a number of research obstacles and open questions. Last but not least, the results of the simulation show that the planned VMBS-CCNA may significantly enhance throughput, latency, and the average amount of links.
Traditional virtual synchronous control strategies lack the ability to perform Low Voltage Ride Through (LVRT) in the event of a fault in the distribution network. When the original power command value is high, the st...
Traditional virtual synchronous control strategies lack the ability to perform Low Voltage Ride Through (LVRT) in the event of a fault in the distribution network. When the original power command value is high, the steady-state output current may exceed acceptable levels, and the reactive power response time may be sluggish, thereby failing to meet L VRT requirements. This paper suggests an improved L VRT control technology for VSGs using synchronous rotation coordinates. The approach suppresses instantaneous current through virtual impedance and controls output current in sequence. An improved current and power control loop is introduced, allowing the VSG to inject reactive power within a specified time and calculate active and reactive power command values for L VRT requirements. The strategy avoids the impact generated during control mode switching and meets the power grid's LVRT requirements. Simulation results validate the effectiveness of the proposed approach.
The proposed research presents a blockchain-based healthcare system that seeks to address the limitations of current data-sharing methods by providing secure and efficient data transfer, enhancing data privacy and sec...
详细信息
In response to the current difficulty in identifying and predicting cocaine addicted individuals based on brain MRI images, this paper designs a deep learning recognition and prediction model based on convolutional ne...
ISBN:
(纸本)9798400716775
In response to the current difficulty in identifying and predicting cocaine addicted individuals based on brain MRI images, this paper designs a deep learning recognition and prediction model based on convolutional neural networks. 29 cocaine addicted individuals and 24 healthy controls were selected from brain MRI images. After per-forming a series of data preprocessing operations such as skull dissection and data augmentation on brain MRI images, a deep learning model based on convolutional neural networks is constructed to process the processed brain MRI images of cocaine addicted individuals and healthy controls to identify and predict cocaine addicted individuals. The experimental results show that the recognition and prediction accuracy of deep learning models based on convolutional neural networks is 89%. Compared with machine learning models such as SVM and support vector machines, it greatly improves the accuracy of model prediction and can accurately, quickly, and effectively identify and predict cocaine addicted individuals.
The proposed methodology strengthens security and privacy in IoT networks through mutual cryptographic authentication, employing Elliptic Curve Cryptography, Diffe Hellman for key exchange, and encryption methods for ...
The proposed methodology strengthens security and privacy in IoT networks through mutual cryptographic authentication, employing Elliptic Curve Cryptography, Diffe Hellman for key exchange, and encryption methods for robust identity verification. Context awareness, considering factors like device type, communication type, successful transfers, and device behaviour, enhances access control decisions dynamically. This approach bolsters network security, defending against unauthorized access and potential threats. Identity-based access control streamlines access rights management, dynamically setting permissions for scalable network expansion. Combining cryptographic authentication and context sensitivity, this methodology emerges as a potent tool for securing IoT networks, ensuring data integrity, and preserving user privacy. Its versatility makes it applicable across diverse loT scenarios, offering a flexible and scalable access control solution. Overall, devices get authenticated with each other through identity based on clusters formed by context parameters and access rights are set to the cluster head. The cluster head is dynamically updated from time to time considering the context parameters.
Software-Defined Networks (SDNs) decouple the control plane from the data plane of forwarding devices, which can significantly improve network functions, including failure protection. In the current Internet architect...
详细信息
暂无评论