Lightweight cryptography algorithms have concentrated on key generation's randomness, unpredictable nature, and complexity to improve the resistance of ciphers. Therefore, the key is an essential component of ever...
详细信息
Data clustering refers to the process of grouping similar data points based on patterns or characteristics. It finds applications in image analysis, pattern recognition, and data mining. The k-means algorithm is commo...
详细信息
Breast Cancer (BC) remains a significant health challenge for women and is one of the leading causes of mortality worldwide. Accurate diagnosis is critical for successful therapy and increased survival rates. Recent a...
详细信息
The utilization of digital picture search and retrieval has grown substantially in numerous fields for different purposes during the last decade,owing to the continuing advances in image processing and computer vision...
详细信息
The utilization of digital picture search and retrieval has grown substantially in numerous fields for different purposes during the last decade,owing to the continuing advances in image processing and computer vision *** multiple real-life applications,for example,social media,content-based face picture retrieval is a well-invested technique for large-scale databases,where there is a significant necessity for reliable retrieval capabilities enabling quick search in a vast number of *** widely employ faces for recognizing and identifying ***,face recognition through formal or personal pictures is increasingly used in various real-life applications,such as helping crime investigators retrieve matching images from face image databases to identify victims and ***,such face image retrieval becomes more challenging in large-scale databases,where traditional vision-based face analysis requires ample additional storage space than the raw face images already occupied to store extracted lengthy feature vectors and takes much longer to process and match thousands of face *** work mainly contributes to enhancing face image retrieval performance in large-scale databases using hash codes inferred by locality-sensitive hashing(LSH)for facial hard and soft biometrics as(Hard BioHash)and(Soft BioHash),respectively,to be used as a search input for retrieving the top-k matching ***,we propose the multi-biometric score-level fusion of both face hard and soft BioHashes(Hard-Soft BioHash Fusion)for further augmented face image *** experimental outcomes applied on the Labeled Faces in the Wild(LFW)dataset and the related attributes dataset(LFW-attributes),demonstrate that the retrieval performance of the suggested fusion approach(Hard-Soft BioHash Fusion)significantly improved the retrieval performance compared to solely using Hard BioHash or Soft BioHash in isolation,where the suggested method provides an augmented
With the rapid growth of internet usage,a new situation has been created that enables practicing *** has increased over the past decade,and it has the same adverse effects as face-to-face bullying,like anger,sadness,a...
详细信息
With the rapid growth of internet usage,a new situation has been created that enables practicing *** has increased over the past decade,and it has the same adverse effects as face-to-face bullying,like anger,sadness,anxiety,and *** the anonymity people get on the internet,they tend to bemore aggressive and express their emotions freely without considering the effects,which can be a reason for the increase in cyberbullying and it is the main motive behind the current *** study presents a thorough background of cyberbullying and the techniques used to collect,preprocess,and analyze the ***,a comprehensive review of the literature has been conducted to figure out research gaps and effective techniques and practices in cyberbullying detection in various languages,and it was deduced that there is significant room for improvement in the Arabic *** a result,the current study focuses on the investigation of shortlisted machine learning algorithms in natural language processing(NLP)for the classification of Arabic datasets duly collected from Twitter(also known as X).In this regard,support vector machine(SVM),Naive Bayes(NB),Random Forest(RF),Logistic regression(LR),Bootstrap aggregating(Bagging),Gradient Boosting(GBoost),Light Gradient Boosting Machine(LightGBM),Adaptive Boosting(AdaBoost),and eXtreme Gradient Boosting(XGBoost)were shortlisted and investigated due to their effectiveness in the similar ***,the scheme was evaluated by well-known performance measures like accuracy,precision,Recall,and ***,XGBoost exhibited the best performance with 89.95%accuracy,which is promising compared to the state-of-the-art.
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the priv...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the privacy of patients. As medical information becomes more widely available, security measures must be established to protect confidentiality, integrity, and availability. Image steganography was recently proposed as an extra data protection mechanism for medical records. This paper describes a data-hiding approach for DICOM medical pictures. To ensure secrecy, we use Adversarial Neural Cryptography with SHA-256 (ANC-SHA-256) to encrypt and conceal the RGB patient picture within the medical image's Region of Non-Interest (RONI). To ensure anonymity, we use ANC-SHA-256 to encrypt the RGB patient image before embedding. We employ a secure hash method with 256bit (SHA-256) to produce a digital signature from the information linked to the DICOM file to validate the authenticity and integrity of medical pictures. Many tests were conducted to assess visual quality using diverse medical datasets, including MRI, CT, X-ray, and ultrasound cover pictures. The LFW dataset was chosen as a patient hidden picture. The proposed method performs well in visual quality measures including the PSNR average of 67.55, the NCC average of 0.9959, the SSIM average of 0.9887, the UQI average of 0.9859, and the APE average of 3.83. It outperforms the most current techniques in these visual quality measures (PSNR, MSE, and SSIM) across six medical assessment categories. Furthermore, the proposed method offers great visual quality while being resilient to physical adjustments, histogram analysis, and other geometrical threats such as cropping, rotation, and scaling. Finally, it is particularly efficient in telemedicine applications with high achieving security with a ratio of 99% during remote transmission of Electronic Patient Records (EPR) over the Internet, which safeguards the patien
A document layout can be more informative than merely a document’s visual and structural ***,document layout analysis(DLA)is considered a necessary prerequisite for advanced processing and detailed document image ana...
详细信息
A document layout can be more informative than merely a document’s visual and structural ***,document layout analysis(DLA)is considered a necessary prerequisite for advanced processing and detailed document image analysis to be further used in several applications and different *** research extends the traditional approaches of DLA and introduces the concept of semantic document layout analysis(SDLA)by proposing a novel framework for semantic layout analysis and characterization of handwritten *** proposed SDLA approach enables the derivation of implicit information and semantic characteristics,which can be effectively utilized in dozens of practical applications for various purposes,in a way bridging the semantic gap and providingmore understandable high-level document image analysis and more invariant characterization via absolute and relative *** approach is validated and evaluated on a large dataset ofArabic handwrittenmanuscripts comprising complex *** experimental work shows promising results in terms of accurate and effective semantic characteristic-based clustering and retrieval of handwritten *** also indicates the expected efficacy of using the capabilities of the proposed approach in automating and facilitating many functional,reallife tasks such as effort estimation and pricing of transcription or typing of such complex manuscripts.
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut...
详细信息
Facebook,Twitter,Instagram,and other social media have emerged as excellent platforms for interacting with friends and expressing thoughts,posts,comments,images,and videos that express moods,sentiments,and *** this,it...
详细信息
Facebook,Twitter,Instagram,and other social media have emerged as excellent platforms for interacting with friends and expressing thoughts,posts,comments,images,and videos that express moods,sentiments,and *** this,it has become possible to examine user thoughts and feelings in social network data to better understand their perspectives and ***,the analysis of depression based on social media has gained widespread acceptance worldwide,other verticals still have yet to be *** depression analysis uses Twitter data from a publicly available web source in this *** assess the accuracy of depression detection,long-short-term memory(LSTM)and convolution neural network(CNN)techniques were *** method is both efficient and *** simulation results have shown an accuracy of 86.23%,which is reasonable compared to existing methods.
Quantum communication is rapidly developing and is gradually being commercialized due to its technological *** dense communication links among multiple users in a scalable and efficient way is of great significance fo...
详细信息
Quantum communication is rapidly developing and is gradually being commercialized due to its technological *** dense communication links among multiple users in a scalable and efficient way is of great significance for realizing a large-scale quantum communication ***,we propose a novel scheme to construct a fully connected polarizationentangled network,utilizing the engineering of spontaneous four-wave mixings(SFWMs)and a path-polarization *** does not require active optical switches which limit the communication speed,or trusted nodes which lead to potential security *** required frequency channels in the network grow linearly with the number of *** experimentally demonstrate a six-user fully connected network with on-chip SFWM processes motivated by four *** user in the network receives a frequency channel,and all fifteen connections between the users are implemented *** work opens up a promising scheme to efficiently construct fully connected large-scale networks.
暂无评论