The segmentation of head and neck(H&N)tumors in dual Positron Emission Tomography/Computed Tomogra-phy(PET/CT)imaging is a critical task in medical imaging,providing essential information for diagnosis,treatment p...
详细信息
The segmentation of head and neck(H&N)tumors in dual Positron Emission Tomography/Computed Tomogra-phy(PET/CT)imaging is a critical task in medical imaging,providing essential information for diagnosis,treatment planning,and outcome *** by the need for more accurate and robust segmentation methods,this study addresses key research gaps in the application of deep learning techniques to multimodal medical ***,it investigates the limitations of existing 2D and 3D models in capturing complex tumor structures and proposes an innovative 2.5D UNet Transformer model as a *** primary research questions guiding this study are:(1)How can the integration of convolutional neural networks(CNNs)and transformer networks enhance segmentation accuracy in dual PET/CT imaging?(2)What are the comparative advantages of 2D,2.5D,and 3D model configurations in this context?To answer these questions,we aimed to develop and evaluate advanced deep-learning models that leverage the strengths of both CNNs and *** proposed methodology involved a comprehensive preprocessing pipeline,including normalization,contrast enhancement,and resampling,followed by segmentation using 2D,2.5D,and 3D UNet Transformer *** models were trained and tested on three diverse datasets:HeckTor2022,AutoPET2023,and *** was assessed using metrics such as Dice Similarity Coefficient,Jaccard Index,Average Surface Distance(ASD),and Relative Absolute Volume Difference(RAVD).The findings demonstrate that the 2.5D UNet Transformer model consistently outperformed the 2D and 3D models across most metrics,achieving the highest Dice and Jaccard values,indicating superior segmentation *** instance,on the HeckTor2022 dataset,the 2.5D model achieved a Dice score of 81.777 and a Jaccard index of 0.705,surpassing other model *** 3D model showed strong boundary delineation performance but exhibited variability across datasets,while the
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential sec...
详细信息
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential security risks that need to be carefully evaluated and addressed. In this survey, we provide an overview of the current state of research on security of using ChatGPT, with aspects of bias, disinformation, ethics, misuse,attacks and privacy. We review and discuss the literature on these topics and highlight open research questions and future *** this survey, we aim to contribute to the academic discourse on AI security, enriching the understanding of potential risks and mitigations. We anticipate that this survey will be valuable for various stakeholders involved in AI development and usage, including AI researchers, developers, policy makers, and end-users.
State-space graphs and automata serve as fundamental tools for modeling and analyzing the behavior of computational systems. Recurrent neural networks (RNNs) and language models are deeply intertwined, as RNNS provide...
详细信息
Video Summarization is one of the most important processes in multimedia applications. It is the process of taking a few segments of each scene to create a video summary that describes the story of an entire video in ...
详细信息
In the contemporary era of technological advancement,smartphones have become an indispensable part of individuals’daily lives,exerting a pervasive *** paper presents an innovative approach to passenger countingonbuse...
详细信息
In the contemporary era of technological advancement,smartphones have become an indispensable part of individuals’daily lives,exerting a pervasive *** paper presents an innovative approach to passenger countingonbuses throughthe analysis ofWi-Fi signals emanating frompassengers’mobile *** study seeks to scrutinize the reliability of digital Wi-Fi environments in predicting bus occupancy levels,thereby addressing a crucial aspect of public *** proposed system comprises three crucial elements:Signal capture,data filtration,and the calculation and estimation of passenger *** pivotal findings reveal that the system demonstrates commendable accuracy in estimating passenger counts undermoderate-crowding conditions,with an average deviation of 20%from the ground truth and an accuracy rate ranging from 90%to 100%.This underscores its efficacy in scenarios characterized by moderate levels of ***,in densely crowded conditions,the system exhibits a tendency to overestimate passenger numbers,occasionally doubling the actual *** acknowledging the need for further research to enhance accuracy in crowded conditions,this study presents a pioneering avenue to address a significant concern in public *** implications of the findings are poised to contribute substantially to the enhancement of bus operations and service quality.
Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common *** ofmedical images is very important to secure patient *** these images consumes a lot of time onedge computing;theref...
详细信息
Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common *** ofmedical images is very important to secure patient *** these images consumes a lot of time onedge computing;therefore,theuse of anauto-encoder for compressionbefore encodingwill solve such a *** this paper,we use an auto-encoder to compress amedical image before encryption,and an encryption output(vector)is sent out over the *** the other hand,a decoder was used to reproduce the original image back after the vector was received and *** convolutional neural networks were conducted to evaluate our proposed approach:The first one is the auto-encoder,which is utilized to compress and encrypt the images,and the other assesses the classification accuracy of the image after decryption and *** hyperparameters of the encoder were tested,followed by the classification of the image to verify that no critical information was lost,to test the encryption and encoding *** this approach,sixteen hyperparameter permutations are utilized,but this research discusses three main cases in *** first case shows that the combination of Mean Square Logarithmic Error(MSLE),ADAgrad,two layers for the auto-encoder,and ReLU had the best auto-encoder results with a Mean Absolute Error(MAE)=0.221 after 50 epochs and 75%classification with the best result for the classification *** second case shows the reflection of auto-encoder results on the classification results which is a combination ofMean Square Error(MSE),RMSprop,three layers for the auto-encoder,and ReLU,which had the best classification accuracy of 65%,the auto-encoder gives MAE=0.31 after 50 *** third case is the worst,which is the combination of the hinge,RMSprop,three layers for the auto-encoder,and ReLU,providing accuracy of 20%and MAE=0.485.
During the COVID-19 crisis, the need to stay at home has increased dramatically. In addition, the number of sickpeople, especially elderly persons, has increased exponentially. In such a scenario, home monitoring of p...
详细信息
During the COVID-19 crisis, the need to stay at home has increased dramatically. In addition, the number of sickpeople, especially elderly persons, has increased exponentially. In such a scenario, home monitoring of patientscan ensure remote healthcare at home using advanced technologies such as the Internet of Medical Things (IoMT).The IoMT can monitor and transmit sensitive health data;however, it may be vulnerable to various attacks. In thispaper, an efficient healthcare security system is proposed for IoMT applications. In the proposed system, themedical sensors can transmit sensed encrypted health data via a mobile application to the doctor for ***, three consortium blockchains are constructed for load balancing of transactions and reducing transactionlatency. They store the credentials of system entities, doctors' prescriptions and recommendations according to thedata transmitted via mobile applications, and the medical treatment process. Besides, cancelable biometrics areused for providing authentication and increasing the security of the proposed medical system. The investigationalresults show that the proposed system outperforms existing work where the proposed model consumed lessprocessing time by values of 18%, 22%, and 40%, and less energy for processing a 200 KB file by values of 9%,13%, and 17%. Finally, the proposed model consumed less memory usage by values of 7%, 7%, and 18.75%. Fromthese results, it is clear that the proposed system gives a very reliable and secure performance for efficientlysecuring medical applications.
Fog Computing(FC)provides processing and storage resources at the edge of the Internet of Things(IoT).By doing so,FC can help reduce latency and improve reliability of IoT *** energy consumption of servers and computi...
详细信息
Fog Computing(FC)provides processing and storage resources at the edge of the Internet of Things(IoT).By doing so,FC can help reduce latency and improve reliability of IoT *** energy consumption of servers and computing resources is one of the factors that directly affect conservation costs in fog *** consumption can be reduced by efficacious scheduling methods so that tasks are offloaded on the best possible *** deal with this problem,a binary model based on the combination of the Krill Herd Algorithm(KHA)and the Artificial Hummingbird Algorithm(AHA)is introduced as Binary KHA-AHA(BAHA-KHA).KHA is used to improve ***,the BAHA-KHA local optimal problem for task scheduling in FC environments is solved using the dynamic voltage and frequency scaling(DVFS)*** Heterogeneous Earliest Finish Time(HEFT)method is used to discover the order of task flow *** goal of the BAHA-KHA model is to minimize the number of resources,the communication between dependent tasks,and reduce energy *** this paper,the FC environment is considered to address the workflow scheduling issue to reduce energy consumption and minimize makespan on fog *** results were tested on five different workflows(Montage,CyberShake,LIGO,SIPHT,and Epigenomics).The evaluations show that the BAHA-KHA model has the best performance in comparison with the AHA,KHA,PSO and GA *** BAHA-KHA model has reduced the makespan rate by about 18%and the energy consumption by about 24%in comparison with *** is a preview of subscription content,log in via an institution to check access.
The smart world under Industry 4.0 is witnessing a notable spurt in sleep disorders and sleep-related issues in patients. Artificial intelligence and IoT are taking a giant leap in connecting sleep patients remotely w...
详细信息
Skin cancer presents in various forms, including squamous cell carcinoma (SCC), basal cell carcinoma (BCC), and melanoma. Established risk factors include ultraviolet (UV) radiation exposure from solar or artificial s...
详细信息
暂无评论