This is a further development of Vision Transformer Pruning [36] via matrix decomposition. The purpose of the Vision Transformer Pruning is to prune the dimension of the linear projection of the dataset by learning th...
详细信息
Rough set theory is a well-known mathematical framework that can deal with inconsistent data by providing lower and upper approximations of concepts. A prominent property of these approximations is their granular repr...
详细信息
Brain tumor classification is a critical task in medical imaging, where the early and accurate detection of brain tumors is crucial for patient treatment and survival. In recent years, Machine Learning techniques have...
详细信息
The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time ***,recent years,IoMT has rapidly grown in the medicalfield to provide healthcare s...
详细信息
The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time ***,recent years,IoMT has rapidly grown in the medicalfield to provide healthcare services without physical *** the use of sensors,IoMT applications are used in healthcare *** such applications,one of the most important factors is data security,given that its transmission over the network may cause *** data security in IoMT systems,blockchain is used due to its numerous blocks for secure data *** this study,Blockchain-assisted secure data management framework(BSDMF)and Proof of Activity(PoA)protocol using malicious code detection algorithm is used in the proposed data security for the healthcare *** main aim is to enhance the data security over the *** PoA protocol enhances high security of data from the literature *** replacing the malicious node from the block,the PoA can provide high security for medical data in the *** with existing systems shows that the proposed simulation with BSD-Malicious code detection algorithm achieves higher accuracy ratio,precision ratio,security,and efficiency and less response time for Blockchain-enabled healthcare systems.
MatCont is a powerful toolbox for numerical bifurcation analysis focussing on smooth ODEs. A user can study equilibria, periodic and connecting orbits, and their stability and bifurcations. Here, we report on addition...
详细信息
In today's world where technology and mathematics are progressing hand in hand there are so many things to be considered and thought of when it comes to network security. Cryptography plays a prominent and an impo...
详细信息
In this paper, we explore the potential of deep learning techniques in the field of ultra-fast laser processing. More specifically, we trained convolutional neural networks on an in-house dataset with the aim of predi...
详细信息
Angular Minkowski p-distance is a dissimilarity measure that is obtained by replacing Euclidean distance in the definition of cosine dissimilarity with other Minkowski p-distances. Cosine dissimilarity is frequently u...
详细信息
We provide a flexible, open-source framework for hardware acceleration, namely massively-parallel execution on general-purpose graphics processing units (GPUs), applied to the hierarchical Poincaré–Steklov (HPS)...
详细信息
Third-party web cookies are often used for privacy-invasive behavior tracking. Partly due to privacy concerns, browser vendors have started to block all third-party cookies in recent years. To understand the effects o...
详细信息
暂无评论