In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of P...
详细信息
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of PC,portable networks,spine of internet,networks engaged with advanced mechanics,power generation interconnection,bio-informatics and substance intensify *** number that can be entirely calculated by a graph is called graph *** mathematical graph invariants have been portrayed and utilized for connection investigation during the latest twenty ***,no trustworthy evaluation has been embraced to pick,how much these invariants are associated with a network graph or subatomic *** this paper,it will discuss three unmistakable varieties of bridge networks with an incredible capacity of assumption in the field of computerscience,chemistry,physics,drug industry,informatics and arithmetic in setting with physical and manufactured developments and networks,since Contraharmonic-quadratic invariants(CQIs)are recently presented and have different figure qualities for different varieties of bridge graphs or *** study settled the geography of bridge graphs/networks of three novel sorts with two kinds of CQI and Quadratic-Contraharmonic Indices(QCIs).The deduced results can be used for the modeling of the above-mentioned networks.
In our study,we present a novel method for automating the segmentation and classification of bone marrow images to distinguish between normal and Acute Lymphoblastic Leukaemia(ALL).Built upon existing segmentation tec...
详细信息
In our study,we present a novel method for automating the segmentation and classification of bone marrow images to distinguish between normal and Acute Lymphoblastic Leukaemia(ALL).Built upon existing segmentation techniques,our approach enhances the dual threshold segmentation process,optimizing the isolation of nucleus and cytoplasm *** is achieved by adapting threshold values based on image characteristics,resulting in superior segmentation outcomes compared to previous *** address challenges,such as noise and incomplete white blood cells,we employ mathematical morphology and median filtering *** methods effectively denoise the images and remove incomplete cells,leading to cleaner and more precise ***,we propose a unique feature extraction method using a hybrid discrete wavelet transform,capturing both spatial and frequency *** allows for the extraction of highly discriminative features from segmented images,enhancing the reliability of *** classification purposes,we utilize an improved Adaptive Neuro-Fuzzy Inference System(ANFIS)that leverages the extracted *** enhanced classification algorithm surpasses traditional methods,ensuring accurate identification of acute lymphoblastic *** innovation lies in the comprehensive integration of segmentation techniques,advanced denoising methods,novel feature extraction,and improved *** extensive evaluation on bone marrow samples from the Acute Lymphoblastic Leukemia Image DataBase(ALL-IDB)for Image Processing database using MATLAB 10.0,our method demonstrates outstanding classification *** segmentation accuracy for various cell types,including Band cells(96%),Metamyelocyte(99%),Myeloblast(96%),***(97%),***(97%),and Neutrophil cells(98%),further underscores the potential of our approach as a high-quality tool for ALL diagnosis.
Intelligent Transportation Systems (ITS) generate massive amounts of Big Data through both sensory and non-sensory platforms. The data support batch processing as well as stream processing, which are essential for rel...
详细信息
Intelligent Transportation Systems (ITS) generate massive amounts of Big Data through both sensory and non-sensory platforms. The data support batch processing as well as stream processing, which are essential for reliable operations on the roads and connected vehicles in ITS. Despite the immense potential of Big Data intelligence in ITS, autonomous vehicles are largely confined to testing and trial phases. The research community is working tirelessly to improve the reliability of ITS by designing new protocols, standards, and connectivity paradigms. In the recent past, several surveys have been conducted that focus on Big Data Intelligence for ITS, yet none of them have comprehensively addressed the fundamental challenges hindering the widespread adoption of autonomous vehicles on the roads. Our survey aims to help readers better understand the technological advancements by delving deep into Big Data architecture, focusing on data acquisition, data storage, and data visualization. We reviewed sensory and non-sensory platforms for data acquisition, data storage repositories for archival and retrieval of large datasets, and data visualization for presenting the processed data in an interactive and comprehensible format. To this end, we discussed the current research progress by comprehensively covering the literature and highlighting challenges that urgently require the attention of the research community. Based on the concluding remarks, we argued that these challenges hinder the widespread presence of autonomous vehicles on the roads. Understanding these challenges is important for a more informed discussion on the future of self-driven technology. Moreover, we acknowledge that these challenges not only affect individual layers but also impact the functionality of subsequent layers. Finally, we outline our future work that explores how resolving these challenges could enable the realization of innovations such as smart charging systems on the roads and data centers
作者:
Meegada, RadhikaBhuyan, Hemanta Kumar
Department of Computer Science Engineering Andhra Pradesh Guntur India
Department of Information Technology and Computer Applications Andhra Pradesh Guntur India
The mortality of Breast cancer patients is issued based on lack of identification and treatment, and mammography is a useful tool for early screening. Deep learning-based computer-aided diagnosis (CAD) of mammography ...
详细信息
The Content Based Image Retrieval (CBIR) is basically used to extract images from the collection of images using several image matching and extraction methods. As it is now with the advancement and ongoing consistent ...
详细信息
Automatic Speech Recognition (ASR) has been the regnant research area in the domain of Natural Language Processing for the last few decades. Past years’ advancement provides progress in this area of research. The acc...
详细信息
Healthcare systems around the world have faced challenges due to the Coronavirus disease (COVID-19) epidemic, which has taken resources and attention away from long-term diseases like liver cancer. To identify the eff...
详细信息
Energy efficiency has emerged as a critical concern in Wireless Sensor Networks (WSN). Sensor nodes deplete their energy faster and die earlier making whole network unstable due to poor clustering in the network. Ther...
详细信息
Agriculture is often known as the art and science of nurturing soil. It involves preparing plants and animals for use in products. Agriculture is the process of growing crops and rearing animals for human consumption,...
详细信息
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are ha...
详细信息
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are handy to use,but they are susceptible to stolen smart card attacks and few other notable security *** prefer to use Web applications that guarantee for security against several security attacks,especially insider attacks,which is *** of several existing schemes prove the security pitfalls of the protocols from preventing security attacks,specifically insider *** paper introduces LAPUP:a novel lightweight authentication protocol using physically unclonable function(PUF)to prevent security attacks,principally insider *** PUFs are used to generate the security keys,challenge-response pair(CRP)and hardware signature for designing the *** transmitted messages are shared as hash values and encrypted by the keys generated by *** messages are devoid of all possible attacks executed by any attacker,including insider *** is also free from stolen verifier attacks,as the databases are secured by using the hardware signature generated by *** analysis of the protocol exhibits the strength of LAPUP in preventing insider attacks and its resistance against several other security *** evaluation results of the communication and computation costs of LAPUP clearly shows that it achieves better performance than existing protocols,despite providing enhanced security.
暂无评论