Pneumonia is recognized as a highly infectious disease, which spreads rapidly among infants. According to UNICEF, 16% of all infant fatalities under the age of 5 were attributed to pneumonia in 2016. Due to less numbe...
Pneumonia is recognized as a highly infectious disease, which spreads rapidly among infants. According to UNICEF, 16% of all infant fatalities under the age of 5 were attributed to pneumonia in 2016. Due to less number and availability of doctors in India makes it a more vulnerable disease. The ultimate motive of this research paper is to utilize a Chest X-ray image to assess whether that individual has symptoms of pneumonia or normal. The reason why Convolution Neural Network (CNN) is utilized in this project is because of its robust processing abilities that make it well-suited for both image classification and image processing job. Several researchers in this wide domain use CNN, which is a quick and well-liked image processing and classification technology. This model will help in analyzing whether the person has pneumonia or not. In this model, we must provide the X-Ray images and it will predict whether he/she is normal or has pneumonia. It will reduce the dependency on the medical staff and results will be produced quickly. Furthermore, it can generate more accurate outcomes than the human eye, which may miss small details in an X-ray. The Chest X-Rays Images have been taken from Kaggle because it has a large dataset and is being divided into two types i.e., Pneumonia and Normal. The dataset comprises over 17,000 Chest X-rays depicting both healthy and pneumonia-infected lungs. The overall accuracy of this model is 88.62%
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the priv...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the privacy of patients. As medical information becomes more widely available, security measures must be established to protect confidentiality, integrity, and availability. Image steganography was recently proposed as an extra data protection mechanism for medical records. This paper describes a data-hiding approach for DICOM medical pictures. To ensure secrecy, we use Adversarial Neural Cryptography with SHA-256 (ANC-SHA-256) to encrypt and conceal the RGB patient picture within the medical image's Region of Non-Interest (RONI). To ensure anonymity, we use ANC-SHA-256 to encrypt the RGB patient image before embedding. We employ a secure hash method with 256bit (SHA-256) to produce a digital signature from the information linked to the DICOM file to validate the authenticity and integrity of medical pictures. Many tests were conducted to assess visual quality using diverse medical datasets, including MRI, CT, X-ray, and ultrasound cover pictures. The LFW dataset was chosen as a patient hidden picture. The proposed method performs well in visual quality measures including the PSNR average of 67.55, the NCC average of 0.9959, the SSIM average of 0.9887, the UQI average of 0.9859, and the APE average of 3.83. It outperforms the most current techniques in these visual quality measures (PSNR, MSE, and SSIM) across six medical assessment categories. Furthermore, the proposed method offers great visual quality while being resilient to physical adjustments, histogram analysis, and other geometrical threats such as cropping, rotation, and scaling. Finally, it is particularly efficient in telemedicine applications with high achieving security with a ratio of 99% during remote transmission of Electronic Patient Records (EPR) over the Internet, which safeguards the patien
Generative adversarial networks (GANs) have gained popularity for their ability to synthesize images from random inputs in deep learning models. One of the notable applications of this technology is the creation of re...
详细信息
Across a wide range of sectors, blockchain technology has emerged as a game-changing option for secure data storage. This research dives into the mechanisms that enable blockchain to protect data integrity and immutab...
详细信息
ISBN:
(纸本)9798350369960
Across a wide range of sectors, blockchain technology has emerged as a game-changing option for secure data storage. This research dives into the mechanisms that enable blockchain to protect data integrity and immutability. This research investigates how blockchain technology reduces the chances of data tampering and unauthorized adjustments by examining its underlying concepts and features, such as decentralization, cryptography, consensus procedures, and immutability. Blockchain networks are decentralized, so they don't rely on any one entity to function. This eliminates one potential point of failure or manipulation. data is protected from tampering and disclosure thanks to the use of hash functions and digital signatures, two examples of strong cryptographic algorithms. By confirming and agreeing on transactions, consensus methods like Proof of Work (PoW) and Proof of Stake (PoS) keep the blockchain ledger up-to-date and accurate. By linking blocks together and recording timestamps, blockchain makes it practically impossible to alter data after it has been recorded. The distributed ledger's availability to the public and ease of use encourage accountability and deter dishonest participants. Smart contracts eliminate the need for third parties by automating operations based on predetermined rules that cannot be altered after they have been created. This study also delves into blockchain fork resistance, incentives for truthful involvement, and other network security measures. It also covers the security implications of both permissioned and permissionless blockchains. Blockchain technology provides strong security procedures, but it has several drawbacks that must be taken into account. These include issues with scalability and the possibility of security flaws in smart contracts. Therefore, securing security and performance requires cautiously considering particular use case needs and picking the right blockchain platform and configuration. For blockchain networ
People with limited vision, impaired sight, or visual impairment cannot see or recognize people, objects, words, or letters. Offer visually challenged people a camera-based detection system so they can read names of t...
详细信息
This paper describes the design and fabrication of a system that can analyze the human exhaled breath volatile organic compounds (VOCs). The expelled breath contains several VOCs in addition to nitrogen, oxygen, carbo...
详细信息
Today's world revolves around Web 3.0 technology to form a decentralized network as it addresses issues such as privacy, connection, and security that were at stake in Web 2.0. This paper proposes a system that ca...
详细信息
The advancement of software-defined networks (SDNs) plays a major role in the next generation of networks. It has laid its root in the cloud, data center, and the Internet of things. SDN separates the data and control...
详细信息
With the development of artificial intelligence, advancements in navigation systems for self-driving cars have become a new direction over the last decade. The inclusion of AI-driven actuators in autonomous vehicles h...
详细信息
Supervised classification models have proved their significance in research and are utilized in many key areas. However, there are some limitations for these methods. In supervised learning, adequate labelled training...
详细信息
暂无评论