Agriculture encompasses a way of life and a profession for the general population. Most global traditions and cultures revolve around agriculture. With the help of advanced farming, agriculture may become more profita...
详细信息
The achievement of cloud environment is determined by the efficiency of its load balancing with proper allocation of resources. The proactive forecasting of future workload, accompanied by the allocation of resources,...
详细信息
Lung cancer is a prevalent and deadly disease worldwide, necessitating accurate and timely detection methods for effective treatment. Deep learning-based approaches have emerged as promising solutions for automated me...
详细信息
Cancers have emerged as a significant concern due to their impact on public health and society. The examination and interpretation of tissue sections stained with Hematoxylin and Eosin (H&E) play a crucial role in...
详细信息
Cancers have emerged as a significant concern due to their impact on public health and society. The examination and interpretation of tissue sections stained with Hematoxylin and Eosin (H&E) play a crucial role in disease assessment, particularly in cases like gastric cancer. Microsatellite instability (MSI) is suggested to contribute to the carcinogenesis of specific gastrointestinal tumors. However, due to the nonspecific morphology observed in H&E-stained tissue sections, MSI determination often requires costly evaluations through various molecular studies and immunohistochemistry methods in specialized molecular pathology laboratories. Despite the high cost, international guidelines recommend MSI testing for gastrointestinal cancers. Thus, there is a pressing need for a new diagnostic modality with lower costs and widespread applicability for MSI detection. This study aims to detect MSI directly from H&E histology slides in gastric cancer, providing a cost-effective alternative. The performance of well-known deep convolutional neural networks (DCNNs) and a proposed architecture are compared. Medical image datasets are typically smaller than benchmark datasets like ImageNet, necessitating the use of off-the-shelf DCNN architectures developed for large datasets through techniques such as transfer learning. Designing an architecture proportional to a custom dataset can be tedious and may not yield desirable results. In this work, we propose an automatic method to extract a lightweight and efficient architecture from a given heavy architecture (e.g., well-known off-the-shelf DCNNs) proportional to a specific dataset. To predict MSI instability, we extracted the MicroNet architecture from the Xception network using the proposed method and compared its performance with other well-known architectures. The models were trained using tiles extracted from whole-slide images, and two evaluation strategies, tile-based and whole-slide image (WSI)-based, were employed and comp
Chronic diseases like chronic respiratory diseases, diabetes, heart disease (HD) and cancer are the important causes of mortality globally. The diagnosis of Heart-related diseases with a variety of symptoms or charact...
详细信息
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, f...
详细信息
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, fingerprintsand faces have been widely used for person identification, which has the risk of information leakage as a resultof reproducing fingers or faces by taking a snapshot. Recently, people have focused on creating an identifiablepattern, which will not be reproducible falsely by capturing psychological and behavioral information of a personusing vision and sensor-based techniques. In existing studies, most of the researchers used very complex patternsin this direction, which need special training and attention to remember the patterns and failed to capturethe psychological and behavioral information of a person properly. To overcome these problems, this researchdevised a novel dynamic hand gesture-based person identification system using a Leap Motion sensor. Thisstudy developed two hand gesture-based pattern datasets for performing the experiments, which contained morethan 500 samples, collected from 25 subjects. Various static and dynamic features were extracted from the handgeometry. Randomforest was used to measure feature importance using the Gini Index. Finally, the support vectormachinewas implemented for person identification and evaluate its performance using identification accuracy. Theexperimental results showed that the proposed system produced an identification accuracy of 99.8% for arbitraryhand gesture-based patterns and 99.6% for the same dynamic hand gesture-based patterns. This result indicatedthat the proposed system can be used for person identification in the field of security.
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c...
详细信息
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication channels, semi-trusted RoadSide Unit (RSU), and collusion between vehicles and the RSU may lead to leakage of model parameters. Moreover, when aggregating data, since different vehicles usually have different computing resources, vehicles with relatively insufficient computing resources will affect the data aggregation efficiency. Therefore, in order to solve the privacy leakage problem and improve the data aggregation efficiency, this paper proposes a privacy-preserving data aggregation protocol for IoV with FL. Firstly, the protocol is designed based on methods such as shamir secret sharing scheme, pallier homomorphic encryption scheme and blinding factor protection, which can guarantee the privacy of model parameters. Secondly, the protocol improves the data aggregation efficiency by setting dynamic training time windows. Thirdly, the protocol reduces the frequent participations of Trusted Authority (TA) by optimizing the fault-tolerance mechanism. Finally, the security analysis proves that the proposed protocol is secure, and the performance analysis results also show that the proposed protocol has high computation and communication efficiency. IEEE
Alzheimer’s disease(AD)is a significant challenge in modern healthcare,with early detection and accurate staging remaining critical priorities for effective *** Deep Learning(DL)approaches have shown promise in AD di...
详细信息
Alzheimer’s disease(AD)is a significant challenge in modern healthcare,with early detection and accurate staging remaining critical priorities for effective *** Deep Learning(DL)approaches have shown promise in AD diagnosis,existing methods often struggle with the issues of precision,interpretability,and class *** study presents a novel framework that integrates DL with several eXplainable Artificial Intelligence(XAI)techniques,in particular attention mechanisms,Gradient-Weighted Class Activation Mapping(Grad-CAM),and Local Interpretable Model-Agnostic Explanations(LIME),to improve bothmodel interpretability and feature *** study evaluates four different DL architectures(ResMLP,VGG16,Xception,and Convolutional Neural Network(CNN)with attention mechanism)on a balanced dataset of 3714 MRI brain scans from patients aged 70 and *** proposed CNN with attention model achieved superior performance,demonstrating 99.18%accuracy on the primary dataset and 96.64% accuracy on the ADNI dataset,significantly advancing the state-of-the-art in AD *** ability of the framework to provide comprehensive,interpretable results through multiple visualization techniques while maintaining high classification accuracy represents a significant advancement in the computational diagnosis of AD,potentially enabling more accurate and earlier intervention in clinical settings.
The healthcare sector holds valuable and sensitive *** amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast *** to their nature,software-defined networks(SDNs)are widely use...
详细信息
The healthcare sector holds valuable and sensitive *** amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast *** to their nature,software-defined networks(SDNs)are widely used in healthcare systems,as they ensure effective resource utilization,safety,great network management,and *** this sector,due to the value of thedata,SDNs faceamajor challengeposed byawide range of attacks,such as distributed denial of service(DDoS)and probe *** attacks reduce network performance,causing the degradation of different key performance indicators(KPIs)or,in the worst cases,a network failure which can threaten human *** can be significant,especially with the current expansion of portable healthcare that supports mobile and wireless devices for what is called mobile health,or *** this study,we examine the effectiveness of using SDNs for defense against DDoS,as well as their effects on different network KPIs under various *** propose a threshold-based DDoS classifier(TBDC)technique to classify DDoS attacks in healthcare SDNs,aiming to block traffic considered a hazard in the form of a DDoS *** then evaluate the accuracy and performance of the proposed TBDC *** technique shows outstanding performance,increasing the mean throughput by 190.3%,reducing the mean delay by 95%,and reducing packet loss by 99.7%relative to normal,with DDoS attack traffic.
Polyp is an earlier stage of cancer development in gastro-intestinal tract. Despite the fact that numerous techniques for automatic segmentation and detection of polyps have been developed, it still remains an open pr...
详细信息
暂无评论