The kidney is an important organ of humans to purify the *** healthy function of the kidney is always essential to balance the salt,potassium and pH levels in the ***,the failure of kidneys happens easily to human bei...
详细信息
The kidney is an important organ of humans to purify the *** healthy function of the kidney is always essential to balance the salt,potassium and pH levels in the ***,the failure of kidneys happens easily to human beings due to their lifestyle,eating habits and diabetes *** pre-diction of kidney stones is compulsory for timely *** processing-based diagnosis approaches provide a greater success rate than other detection *** this work,proposed a kidney stone classification method based on optimized Transfer Learning(TL).The Deep Convolutional Neural Network(DCNN)models of DenseNet169,MobileNetv2 and GoogleNet applied for clas-sifi*** combined classification results are processed by ensemble learning to increase classification *** hyperparameters of the DCNN model are adjusted by the metaheuristic algorithm of Gorilla Troops Optimizer(GTO).The proposed TL model outperforms in terms of all the parameters compared to other DCNN models.
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
Remote driving, an emergent technology enabling remote operations of vehicles, presents a significant challenge in transmitting large volumes of image data to a central server. This requirement outpaces the capacity o...
详细信息
Remote driving, an emergent technology enabling remote operations of vehicles, presents a significant challenge in transmitting large volumes of image data to a central server. This requirement outpaces the capacity of traditional communication methods. To tackle this, we propose a novel framework using semantic communications, through a region of interest semantic segmentation method, to reduce the communication costs by transmitting meaningful semantic information rather than bit-wise data. To solve the knowledge base inconsistencies inherent in semantic communications, we introduce a blockchain-based edge-assisted system for managing diverse and geographically varied semantic segmentation knowledge bases. This system not only ensures the security of data through the tamper-resistant nature of blockchain but also leverages edge computing for efficient management. Additionally, the implementation of blockchain sharding handles differentiated knowledge bases for various tasks, thus boosting overall blockchain efficiency. Experimental results show a great reduction in latency by sharding and an increase in model accuracy, confirming our framework's effectiveness.
Visual Feature Learning (VFL) is a critical area of research in computer vision that involves the automatic extraction of features and patterns from images and videos. The applications of VFL are vast, including objec...
详细信息
Depth perception affects 2D image brightness, color, texture, and motion. In addition to stereoscopic vision, depth range, displaying size, 3D visualization, naturalness, and visual comfort can reconstruct 3D depth in...
详细信息
Word spotting of Gujarati handwritten documents is a highly challenging task due to the complexity of the handwritten text in the Gujarati language. This paper presents a novel approach to word spotting, which include...
详细信息
CoVID-19 has been linked to long-term consequences on several human body organs, including lung ailments, kidney malfunctions, heart dysrhythmia, alterations in brain nutrient levels, psychological difficulties, abrup...
详细信息
Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based *** consuming time and resources,intrusive traffic hampers the efficient operation of network *** effective st...
详细信息
Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based *** consuming time and resources,intrusive traffic hampers the efficient operation of network *** effective strategy for preventing,detecting,and mitigating intrusion incidents will increase productivity.A crucial element of secure network traffic is Intrusion Detection System(IDS).An IDS system may be host-based or network-based to monitor intrusive network *** unusual internet traffic has become a severe security risk for intelligent *** systems are negatively impacted by several attacks,which are slowing *** addition,networked communication anomalies and breaches must be detected using Machine Learning(ML).This paper uses the NSL-KDD data set to propose a novel IDS based on Artificial Neural Networks(ANNs).As a result,the ML model generalizes sufficiently to perform well on untried *** NSL-KDD dataset shall be utilized for both training and *** this paper,we present a custom ANN model architecture using the Keras open-source software *** specific arrangement of nodes and layers,along with the activation functions,enhances the model’s ability to capture intricate patterns in network *** performance of the ANN is carefully tested and evaluated,resulting in the identification of a maximum detection accuracy of 97.5%.We thoroughly compared our suggested model to industry-recognized benchmark methods,such as decision classifier combinations and ML classifiers like k-Nearest Neighbors(KNN),Deep Learning(DL),Support Vector Machine(SVM),Long Short-Term Memory(LSTM),Deep Neural Network(DNN),and *** is encouraging to see that our model consistently outperformed each of these tried-and-true techniques in all *** result underlines the effectiveness of the suggested methodology by demonstrating the ANN’s capacity to accurately assess the effectiveness of the developed strategy
In contemporary times, there has been a notable shift among youth and young adults towards prioritizing their health, encompassing both physical and mental well-being. Recognizing this trend, innovative solutions have...
详细信息
Artificial Intelligence, including machine learning and deep convolutional neural networks (DCNNs), relies on complex algorithms and neural networks to process and analyze data. DCNNs for visual recognition often requ...
详细信息
暂无评论