Telerehabilitation is a cost-effective alternative to in-clinic rehabilitation. Although convenient, it lacks immersive and free-viewpoint patient visualization. Current research explores two solutions to this issue. ...
详细信息
Purpose: This study aims to investigate and compare three nonplanar (NP) slicing algorithms. The algorithms aim to control the layer thickness variation (LTV), which is a common issue in supportless fabrication of fre...
详细信息
Land cover (LC) mapping using satellite imagery is critical for environmental monitoring and management. Deep learning (DL), particularly convolutional neural networks (CNNs) and vision transformers (ViTs), have revol...
详细信息
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context ...
详细信息
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context of IoT fog *** suggested framework,called"BlocFogSec",secures key management and data sharing through blockchain consensus and smart *** existing solutions,BlocFogSec utilizes two types of smart contracts for secure key exchange and data sharing,while employing a consensus protocol to validate transactions and maintain blockchain *** process and store data effectively at the network edge,the framework makes use of fog computing,notably reducing latency and raising *** successfully blocks unauthorized access and data breaches by restricting transactions to authorized *** addition,the framework uses a consensus protocol to validate and add transactions to the blockchain,guaranteeing data accuracy and *** compare BlocFogSec's performance to that of other models,a number of simulations are *** simulation results indicate that BlocFogSec consistently outperforms existing models,such as Security Services for Fog Computing(SSFC)and Blockchain-based Key Management Scheme(BKMS),in terms of throughput(up to 5135 bytes per second),latency(as low as 7 ms),and resource utilization(70%to 92%).The evaluation also takes into account attack defending accuracy(up to 100%),precision(up to 100%),and recall(up to 99.6%),demonstrating BlocFogSec's effectiveness in identifying and preventing potential attacks.
Epileptic seizure detection has been a complex task due to the chaos and non-stationariness observed in the electroencephalogram (EEG) signals. Most existing EEG-based seizure detection algorithms are patient-dependen...
详细信息
Background: Diabetic retinopathy (DR), a diabetes complication, causes blindness by damaging retinal blood vessels. While deep learning has advanced DR diagnosis, many models face issues like inconsistent performance,...
详细信息
Metaheuristics are commonly used in various fields,including real-life problem-solving and engineering appli*** present work introduces a novel metaheuristic algorithm named the Artificial Circulatory System Algorith...
详细信息
Metaheuristics are commonly used in various fields,including real-life problem-solving and engineering appli*** present work introduces a novel metaheuristic algorithm named the Artificial Circulatory System Algorithm(ACSA).The control of the circulatory system inspires it and mimics the behavior of hormonal and neural regulators involved in this *** work initially evaluates the effectiveness of the suggested approach on 16 two-dimensional test functions,identified as classical benchmark *** method was subsequently examined by application to 12 CEC 2022 benchmark problems of different ***,the paper evaluates ACSA in comparison to 64 metaheuristic methods that are derived from different approaches,including evolutionary,human,physics,and ***,a sequence of statistical tests was undertaken to examine the superiority of the suggested algorithm in comparison to the 7 most widely used algorithms in the existing *** results show that the ACSA strategy can quickly reach the global optimum,avoid getting trapped in local optima,and effectively maintain a balance between exploration and *** outperformed 42 algorithms statistically,according to post-hoc *** also outperformed 9 algorithms *** study concludes that ACSA offers competitive solutions in comparison to popüler methods.
A silicon solar cell with a power conversion efficiency (PCE)of 4% was born in Bell Lab in 1954, seven decades ago. Today,silicon solar cells have reached an efficiency above 25%and achieved pervasive commercial succe...
A silicon solar cell with a power conversion efficiency (PCE)of 4% was born in Bell Lab in 1954, seven decades ago. Today,silicon solar cells have reached an efficiency above 25%and achieved pervasive commercial success [1]. In spite of the steady improvement in efficiency, the interest and enthusiasm in search for new materials and innovative device architectures for newgeneration solar cells have never diminished or subsided;
暂无评论