The size of the medical information system is growing gradually. Due to this, traditional data analysis for extracting helpful information for any disease has become inefficient in providing accurate real-time valid i...
详细信息
Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to *** ensures with high probability that decoded message is either completely unrela...
详细信息
Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to *** ensures with high probability that decoded message is either completely unrelated or the original one,when tampering has no ***,standard version of non-malleable codes provide security against one time tampering *** ciphers are successfully employed in the construction of non-malleable *** construction fails to provide security when an adversary tampers the codeword more than *** non-malleable codes further allow an attacker to tamper the message for polynomial number of *** this work,we propose continuous version of non-malleable codes from block ciphers in split-state *** construction provides security against polynomial number of tampering attacks and it preserves *** the tam-pering experiment triggers self-destruct,the security of continuously non-malleable code reduces to security of the underlying leakage resilient storage.
Purpose:Assistive technology has been developed to assist the visually impaired individuals in their social *** designed to enhance communication skills,facilitate social engagement and improve the overall quality of ...
详细信息
Purpose:Assistive technology has been developed to assist the visually impaired individuals in their social *** designed to enhance communication skills,facilitate social engagement and improve the overall quality of life,conversational assistive technologies include speech recognition APIs,text-to-speech APIs and various communication tools that are *** real-time *** natural language processing(NLP)and machine learning algorithms,the technology analyzes spoken language and provides appropriate responses,offering an immersive experience through voice commands,audio feedback and vibration ***/methodology/approach:These technologies have demonstrated their ability to promote self-confidence and self-reliance in visually impaired individuals during social ***,they promise to improve social competence and foster better *** short,assistive technology in conversation stands as a promising tool that empowers the visually impaired individuals,elevating the quality of their social ***:The main benefit of assistive communication technology is that it will help visually impaired people overcome communication barriers in social *** technology helps them communicate effectively with acquaintances,family,co-workers and even strangers in public *** enabling smoother and more natural communication,it works to reduce feelings of isolation and increase overall quality of ***/value:Research findings include successful activity recognition,aligning with activities on which the VGG-16 model was trained,such as hugging,shaking hands,talking,walking,waving and *** originality of this study lies in its approach to address the challenges faced by the visually impaired individuals in their social interactions through modern *** adds to the body of knowledge in the area of assistive technologies,which contribute to the empowerment and social in
Medical imaging, a cornerstone of disease diagnosis and treatment planning, faces the hurdles of subjective interpretation and reliance on specialized expertise. Deep learning algorithms show improvements in automatin...
详细信息
Adversarial attack is a method used to deceive machine learning models, which offers a technique to test the robustness of the given model, and it is vital to balance robustness with accuracy. Artificial intelligence ...
详细信息
Nowadays, Cloud Computing has attracted a lot of interest from both individual users and organization. However, cloud computing applications face certain security issues, such as data integrity, user privacy, and serv...
详细信息
In this paper,we propose a hybrid decode-and-forward and soft information relaying(HDFSIR)strategy to mitigate error propagation in coded cooperative *** the HDFSIR approach,the relay operates in decode-and-forward(DF...
详细信息
In this paper,we propose a hybrid decode-and-forward and soft information relaying(HDFSIR)strategy to mitigate error propagation in coded cooperative *** the HDFSIR approach,the relay operates in decode-and-forward(DF)mode when it successfully decodes the received message;otherwise,it switches to soft information relaying(SIR)*** benefits of the DF and SIR forwarding strategies are combined to achieve better performance than deploying the DF or SIR strategy ***-form expressions for the outage probability and symbol error rate(SER)are derived for coded cooperative communication with HDFSIR and energy-harvesting ***,we introduce a novel normalized log-likelihood-ratio based soft estimation symbol(NL-SES)mapping technique,which enhances soft symbol accuracy for higher-order modulation,and propose a model characterizing the relationship between the estimated complex soft symbol and the actual high-order modulated ***-more,the hybrid DF-SIR strategy is extended to a distributed Alamouti space-time-coded cooperative *** evaluate the~performance of the proposed HDFSIR strategy,we implement extensive Monte Carlo simulations under varying channel *** demonstrate significant improvements with the hybrid technique outperforming individual DF and SIR strategies in both conventional and distributed Alamouti space-time coded cooperative ***,at a SER of 10^(-3),the proposed NL-SES mapping demonstrated a 3.5 dB performance gain over the conventional averaging one,highlighting its superior accuracy in estimating soft symbols for quadrature phase-shift keying modulation.
The Internet of things(IoT)is a wireless network designed to perform specific tasks and plays a crucial role in various fields such as environmental monitoring,surveillance,and *** address the limitations imposed by i...
详细信息
The Internet of things(IoT)is a wireless network designed to perform specific tasks and plays a crucial role in various fields such as environmental monitoring,surveillance,and *** address the limitations imposed by inadequate resources,energy,and network scalability,this type of network relies heavily on data aggregation and clustering *** various conventional studies have aimed to enhance the lifespan of a network through robust systems,they do not always provide optimal efficiency for real-time *** paper presents an approach based on state-of-the-art machine-learning *** this study,we employed a novel approach that combines an extended version of principal component analysis(PCA)and a reinforcement learning algorithm to achieve efficient clustering and data *** primary objectives of this study are to enhance the service life of a network,reduce energy usage,and improve data aggregation *** evaluated the proposed methodology using data collected from sensors deployed in agricultural fields for crop *** proposed approach(PQL)was compared to previous studies that utilized adaptive Q-learning(AQL)and regional energy-aware clustering(REAC).Our study outperformed in terms of both network longevity and energy consumption and established a fault-tolerant network.
Image caption-generating systems aim to deliver accurate, coherent, and useful captions. This includes identifying the scene, items, relationships, and attributes of the image's objects. Due to constraints in usin...
详细信息
The procedure of segmenting a brain tumour is an essential step in the field of medical image processing. In order to improve the efficacy of disease treatment choices and the likelihood of patient survival, the timel...
详细信息
暂无评论