Automated segmentation and classification of biomedical images act as a vital part of the diagnosis of brain tumors(BT).A primary tumor brain analysis suggests a quicker response from treatment that utilizes for impro...
详细信息
Automated segmentation and classification of biomedical images act as a vital part of the diagnosis of brain tumors(BT).A primary tumor brain analysis suggests a quicker response from treatment that utilizes for improving patient survival *** location and classification of BTs from huge medicinal images database,obtained from routine medical tasks with manual processes are a higher cost together in effort and *** automatic recognition,place,and classifier process was desired and *** study introduces anAutomatedDeepResidualU-Net Segmentation with Classification model(ADRU-SCM)for Brain Tumor *** presentedADRUSCM model majorly focuses on the segmentation and classification of *** accomplish this,the presented ADRU-SCM model involves wiener filtering(WF)based preprocessing to eradicate the noise that exists in *** addition,the ADRU-SCM model follows deep residual U-Net segmentation model to determine the affected brain ***,VGG-19 model is exploited as a feature ***,tunicate swarm optimization(TSO)with gated recurrent unit(GRU)model is applied as a classification model and the TSO algorithm effectually tunes *** performance validation of the ADRU-SCM model was tested utilizing FigShare dataset and the outcomes pointed out the better performance of the ADRU-SCM approach on recent approaches.
In the field of cybersecurity, the ongoing issue of phishing attacks is still of utmost concern because it puts both individuals and companies at serious risk. In order to prevent these fraudulent efforts and protect ...
详细信息
Background: User-generated digital content, typically from mobile devices, can be of a personal nature. There have been several instances in which this personal content, including but not limited to, photographs, vide...
详细信息
Background: User-generated digital content, typically from mobile devices, can be of a personal nature. There have been several instances in which this personal content, including but not limited to, photographs, videos, messages and personal information, has been misused by the recipients. The misuse has ranged from violating privacy through unauthorized sharing to manipulating/modifying the original content and finally forgery and fraud. Objectives: The study aims to create an Advanced Secure Messaging Application (ASMA), allowing personal digital content to be shared across mobile devices in a secure, controlled and privacy-preserving manner. The application allows the user to explicitly specify a micro-policy to control the way digital content sent by the user, is consumed, shared or modified by the recipient(s). The users should be able to check the veracity of a shared news item besides controlling group formation and enforcing content sharing guidelines within a group. Methods: A micro-policy based novel mechanism is introduced for exercising fine-grained control over the manner in which digital content generated by users is shared and distributed among their contacts. Fact-checking is supported by cross-checking the message content against credible news sources. Results: Measurements of message throughput show a consistent and manageable overhead, due to a per-message micro-policy travelling with the message data compared to traditional message sharing applications. The high user-ratings received from users in a pilot test establish acceptance of the app and the need for its advanced features. Moreover, the overheads in implementing additional security features are imperceptible at the user level. Conclusion: ASMA is a highly secure and privacy-preserving messaging application, as demonstrated by experimental results and the pilot usability study. It offers novel security and content control features, which are not available in existing mobile messaging appl
The current work introduces an advanced deep learning (DL) approach to perform sentiment analysis on Twitter, focusing on topic-specific contexts. Traditional sentiment analysis models often fall short in accurately i...
详细信息
Internetization has played a massive role in the rapid development and growth of the financial investment industry. Due to the rapid development, there is a demand for more financial knowledge services to help make we...
详细信息
Recommendation systems play a pivotal role in assisting users in fnding items, services, or products that align with their preferences. These systems typically rely on personal parameters, user reviews, or a combinati...
详细信息
The surging popularity of online movie databases has created a challenge for viewers: choosing a film from a massive library can be overwhelming. In this paper, it proposes to design a new hybrid movie recommendation ...
详细信息
In today’s digital age, phishing is a significant threat. It is a clever approach in which propagation of a website is done, and customers are enticed to a false website where customers are asked to enter critical pe...
详细信息
Research in the field of malware detection is currently leaning toward methods based on artificial intelligence algorithms due to the increasing limitations of traditional detection methods and the increasing accuracy...
详细信息
Image deduplication is becoming increasingly important for cloud storage infrastructures to handle the increasing amount of multimedia material. Through increased storage efficiency, effective picture deduplication ma...
详细信息
暂无评论