This paper presents a novel approach for generating intricate Batik motifs using a modified Diffusion-Generative Adversarial Network (Diffusion-GAN) augmented with StyleGAN2-Ada. Motivated by the rich cultural heritag...
详细信息
Identifying drug–target interactions (DTIs) is a critical step in both drug repositioning. The labor-intensive, time-consuming, and costly nature of classic DTI laboratory studies makes it imperative to create effici...
详细信息
Demand forecasting has emerged as a crucial element in supply chain management. It is essential to identify anomalous data and continuously improve the forecasting model with new data. However, existing literature fai...
详细信息
During the COVID-19 crisis, the need to stay at home has increased dramatically. In addition, the number of sickpeople, especially elderly persons, has increased exponentially. In such a scenario, home monitoring of p...
详细信息
During the COVID-19 crisis, the need to stay at home has increased dramatically. In addition, the number of sickpeople, especially elderly persons, has increased exponentially. In such a scenario, home monitoring of patientscan ensure remote healthcare at home using advanced technologies such as the Internet of Medical Things (IoMT).The IoMT can monitor and transmit sensitive health data;however, it may be vulnerable to various attacks. In thispaper, an efficient healthcare security system is proposed for IoMT applications. In the proposed system, themedical sensors can transmit sensed encrypted health data via a mobile application to the doctor for ***, three consortium blockchains are constructed for load balancing of transactions and reducing transactionlatency. They store the credentials of system entities, doctors' prescriptions and recommendations according to thedata transmitted via mobile applications, and the medical treatment process. Besides, cancelable biometrics areused for providing authentication and increasing the security of the proposed medical system. The investigationalresults show that the proposed system outperforms existing work where the proposed model consumed lessprocessing time by values of 18%, 22%, and 40%, and less energy for processing a 200 KB file by values of 9%,13%, and 17%. Finally, the proposed model consumed less memory usage by values of 7%, 7%, and 18.75%. Fromthese results, it is clear that the proposed system gives a very reliable and secure performance for efficientlysecuring medical applications.
Recent advancements in deep neural networks (DNNs) have made them indispensable for numerous commercial applications. These include healthcare systems and self-driving cars. Training DNN models typically demands subst...
详细信息
This study addresses the challenge of selecting research topics for undergraduate students, focusing on computerscience, by evaluating a recommendation model based on the k-Nearest Neighbor algorithm (kNN). The objec...
详细信息
In this paper, we propose two self-adaptive extragradient-like algorithms for solving pseudomonotone variational inequalities. We consider two cases: the mapping is Lipschitz continuous (with unknown modulus) and is n...
详细信息
This research work focuses on food recognition, especially, the identification of the ingredients from food images. Here, the developed model includes two stages namely: 1) feature extraction;2) classification. Initia...
详细信息
Recently, deep learning has been widely employed across various domains. The Convolution Neural Network (CNN), a popular deep learning algorithm, has been successfully utilized in object recognition tasks, such as fac...
详细信息
Most Personalized Federated Learning (PFL) algorithms merge the model parameters of each client with other (similar or generic) model parameters to optimize the personalized model (PM). However, the merged model param...
详细信息
暂无评论