This piece talks about research that has been done on sending signals over sensor radio networks and making sure that links are safe. Connections and sharing info must be effective in a world that is always changing. ...
详细信息
In the edge computing system, split learning (SL) is an emerging distributed learning approach that allows mobile users (MUs) and edge nodes (ENs) to train the model together without sharing the raw data of the MU. Al...
详细信息
In dentistry, machine learning approaches play a significant role in the early detection and diagnosis of oral cysts. When planning accurate medical treatment, oral and maxillofacial surgeons can benefit from preopera...
详细信息
The article described the car road detection system. This type of system, also known as green carpet or free space system, is part of an advanced driver assistance system (ADAS). The proposed system works by using the...
详细信息
The identification of DNA binding proteins(DNABPs)is considered a major challenge in genome annotation because they are linked to several important applied and research applications of cellular functions e.g.,in the s...
详细信息
The identification of DNA binding proteins(DNABPs)is considered a major challenge in genome annotation because they are linked to several important applied and research applications of cellular functions e.g.,in the study of the biological,biophysical,and biochemical effects of antibiotics,drugs,and steroids on *** paper presents an efficient approach for DNABPs identification based on deep transfer learning,named“DTLM-DBP.”Two transfer learning methods are used in the identification *** first is based on the pre-trained deep learning model as a feature’s extractor and *** different pre-trained Convolutional Neural Networks(CNN),AlexNet 8 and VGG 16,are tested and *** second method uses the deep learning model as a feature’s extractor only and two different classifiers for the identification *** classifiers,Support Vector Machine(SVM)and Random Forest(RF),are tested and *** proposed approach is tested using different DNA proteins *** performance of the identification process is evaluated in terms of identification accuracy,sensitivity,specificity and MCC,with four available DNA proteins datasets:PDB1075,PDB186,PDNA-543,and *** results show that the RF classifier,with VGG-Net pre-trained deep transfer learning features,gives the highest ***-DBP was compared with other published methods and it provides a considerable improvement in the performance of DNABPs identification.
Recently, cross-modal hashing has attracted much attention in large-scale image retrieval scenarios. However, most existing methods ignore the potential higher-order relationships and label semantic information betwee...
详细信息
A common and dangerous type of cancer that affects millions of people each year is known as Skin Cancer. Skin cancer, like melanoma, is difficult to identify because of its resemblance with benign moles. Melanoma earl...
详细信息
ISBN:
(数字)9798350353839
ISBN:
(纸本)9798350353846
A common and dangerous type of cancer that affects millions of people each year is known as Skin Cancer. Skin cancer, like melanoma, is difficult to identify because of its resemblance with benign moles. Melanoma early detection is very necessary as it increases the chances of survival. With technological advancement, AI has emerged as a powerful technique in the medical field. Machine- deep learning and neural networks have shown promising results in automating skin cancer detection using dermoscopy images. This paper proposes an efficient skin cancer detection technique through dermoscopy images using Hybrid Deep Feature Extraction. A publicly available dataset is used in this paper. Data preprocessing technique: Morphological closing and gamma correction are applied to it. Then, feature extraction with handcraft methods HOG, LBP, and automated methods DenseNet201 and ResNet50 will be performed on the preprocessed dataset. All the extracted features from these algorithms are concatenated into a single array. Different feature extraction combinations are tested with SVM, Random Forest, Artificial Neural Network, XGBoost, and LightGBM classifiers. After classification, the results are measured using the performance evaluation metrics: accuracy, precision, recall, and F1 score. All models give efficient results, but the classifier ANN with the feature extraction combination HOG and DenseNet201 are giving the best result with the highest accuracy, recall, precision, and F1-score as 0.988, 0.988, 0.988, and 0.988, respectively.
Advanced identity mechanisms are essential for secure client-identifiable proof in the unambiguously computerized world. Because the board frameworks rely on aggregated databases, fraud, data breaches, and unauthorize...
详细信息
ISBN:
(数字)9798331523923
ISBN:
(纸本)9798331523930
Advanced identity mechanisms are essential for secure client-identifiable proof in the unambiguously computerized world. Because the board frameworks rely on aggregated databases, fraud, data breaches, and unauthorized access are significant security risks. By providing a decentralized, immutable structure, blockchain technology advances security and protection. Through Self-Sovereign Identity, blockchain gives people authority over their own data. While also improving confirmation and check mechanisms. The potential of blockchain-based Identity, this article examines the board frameworks, focusing on five essential components: authentication, privacy, trust, integrity, and simplicity. It examines how interoperability, flexibility, and collaboration with outdated frameworks prevent decentralized IDMS being more widely used. The study also covers customer satisfaction, legal concerns, and potential future developments, such as Web 3.0, security enhancements, and integration with decentralized money. By addressing these problems and looking into new possibilities, blockchain-based IDMS may be able to reform advanced identity across the entire board.
Telecommunication security is a broad and important field at present. Various models of security have been developed that aim to provide secure communication between the parties. Security sought by the protocol can be...
详细信息
Numerous news media outlets cover incidents in which trained personnel or combatants are injured or perish while defusing bombs. The military robot that conducts intelligence operations. While it has been beneficial t...
详细信息
暂无评论