Chest x-ray studies can be automatically detected and their locations located using artificial intelligence (AI) in healthcare. To detect the location of findings, additional annotation in the form of bounding boxes i...
详细信息
Destructive wildfires are becoming an annual event,similar to climate change,resulting in catastrophes that wreak havoc on both humans and the *** result,however,is disastrous,causing irreversible damage to the *** loc...
详细信息
Destructive wildfires are becoming an annual event,similar to climate change,resulting in catastrophes that wreak havoc on both humans and the *** result,however,is disastrous,causing irreversible damage to the *** location of the incident and the hotspot can sometimes have an impact on earlyfire detection *** the advancement of intelligent sen-sor-based control technologies,the multi-sensor data fusion technique integrates data from multiple sensor *** primary objective to avoid wildfire is to identify the exact location of wildfire occurrence,allowingfire units to respond as soon as *** to predict the occurrence offire in forests,a fast and effective intelligent control system is *** proposed algorithm with decision tree classification determines whetherfire detection parameters are in the acceptable range and further utilizes a fuzzy-based optimization to optimize the complex *** experimental results of the proposed model have a detection rate of ***,providing real-time monitoring of certain environ-mental variables for continuous situational awareness and instant responsiveness.
Using color fundus imaging to identify diabetic retinopathy (DR) is a tough process that requires skilled doctors to comprehend the existence and significance of certain small characteristics. This effort is further c...
详细信息
Managing Electrical Energy has become crucial nowadays where everything we use works on electrical energy. Utilizing energy in an efficient and effective way can save a lot of energy. Reducing unnecessary usage of ele...
详细信息
A complex endocrine disorder that affects fertile women, polycystic ovary syndrome, also known as PCOS, is characterized by an extensive spectrum of symptoms. This work extends previous efforts in PCOS detection and t...
详细信息
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled *** addition,they have been deployed in civilian critical infrastructure *** this environment,real-time and...
详细信息
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled *** addition,they have been deployed in civilian critical infrastructure *** this environment,real-time and massive data is exchanged between the aerial vehicles and the ground control *** on the mission of these aerial vehicles,some of the collected and transmitted data is sensitive and ***,many security protocols have been presented to offer privacy and security ***,majority of these schemes fail to consider attack vectors such as side-channeling,de-synchronization and known secret session temporary information *** last attack can be launched upon adversarial physical capture of these *** addition,some of these protocols deploy computationally intensive asymmetric cryptographic primitives that result in high *** this paper,an authentication protocol based on lightweight quadratic residues and hash functions is *** formal security analysis is executed using the widely deployed random oracle *** addition,informal security analysis is carried out to show its robustness under the Dolev–Yao(DY)and Canetti–Krawczyk(CK)threat *** terms of operational efficiency,it is shown to have relatively lower execution time,communication costs,and incurs the least storage costs among other related ***,the proposed protocol provides a 25%improvement in supported security and privacy features and a 6.52%reduction in storage *** overall,the proposed methodology offers strong security and privacy protection at lower execution time,storage and communication overheads.
Cybercriminals design false webpages in an attempt to trick people into disclosing private information, such as passwords and credit card numbers. Strong cybersecurity measures are desperately needed, as phishing atta...
详细信息
Aquaculture is being used to a greater extent for conservation goals, such as species recovery, habitat restoration, and mitigating the effects of wild capture on harvested species that are vulnerable. Deep Learning (...
详细信息
Network Intrusion Detection System (NIDS) is most momentous safety techniques in mobile networks. Intrusion detection (ID) is significant approach aimed at identifying attacks then applying it on security procedures t...
详细信息
Numerous advancements in image super resolution in recent years have explored different deep learning approaches and frameworks based on Convolution Neural Network (CNN) to achieve enhanced perceptual results. In this...
详细信息
暂无评论