Breast cancer is one of the most important diseases that lead to death, according to the reports of the World Health Organization. Reports also indicated that breast cancer affects women more than men. Late or wrong d...
详细信息
Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical *** this system,service providers consider user authentication as a critical *** ...
详细信息
Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical *** this system,service providers consider user authentication as a critical *** address this crucial requirement,various types of validation and key agreement protocols have been *** main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has *** paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an efficient and robust lightweight authentication and key agreement *** secureness of the proposed protocol undergoes an informal analysis,whose findings show that different security features are provided,including perfect forward secrecy and a resistance to DoS ***,it is simulated and formally analyzed using Scyther *** results indicate the protocol’s robustness,both in perfect forward security and against various *** addition,the proposed protocol was compared with those of other related protocols in term of time complexity and communication *** time complexity of the proposed protocol only involves time of performing a hash function Th,i.e.,:O(12Th).Average time required for executing the authentication is 0.006 seconds;with number of bit exchange is 704,both values are the lowest among the other *** results of the comparison point to a superior performance by the proposed protocol.
Data breaches, identity theft, and the lack of user control within traditional digital identity management systems, it begs a more secure and decentralized alternative. In this study we propose a blockchain based digi...
详细信息
ISBN:
(数字)9798331509675
ISBN:
(纸本)9798331509682
Data breaches, identity theft, and the lack of user control within traditional digital identity management systems, it begs a more secure and decentralized alternative. In this study we propose a blockchain based digital identity management framework that implements privacy, security and transparency by employing distributed ledger technology. To provide tamper proof identity storage and automated verification, the proposed model uses cryptographic hashing and smart contracts. The use of a novel token-based access mechanism enables users to safely share their identity data with third parties, while keeping sensitive information out of sight. Security metrics are enhanced by 30% for data integrity with 45% reduction in unauthorized access attempts all through simulations. The framework also achieves improved efficiency reducing identity verification time by 40 percent compared to traditional systems. It offers a promising approach to address important vulnerabilities in centralized identity management in line with the development of marketable and user-friendly digital identity solutions.
In this post, we discuss how to boost quality when faced with high loads and rapid diminishing. In order to improve bandwidth utilization and delay efficiency, a methodology was presented in the Transactions of the IE...
In this post, we discuss how to boost quality when faced with high loads and rapid diminishing. In order to improve bandwidth utilization and delay efficiency, a methodology was presented in the Transactions of the IEEE Conference on Connectivity (ICC), that employed either a sensible path or a relayed path depending on rate comparability. Unfortunately, since direct route or intermediary path dependability are less reliable amid dimming circumstances, speed decreases. was demonstrated to outperform due to higher communication stability offered by the secondary relay line in terms of typical capacity and latency metrics. Despite being superior to the direct way, only utilises the broadcast path as a supplementary alternative path, thus it is unable to benefit significantly from the relay method's 4 percentage. The collaborating Proposed method we progress in this editorial, called extremely rapid relay-based conscientious, researchers estimate the transceiver ratio of the starting point, reroute, and citation links and seems to be using broadcaster remains a central to consistently select between the relay path and the successful and prosperous for feedback and control and delay achievements.
Recently, Automatic Speech Recognition (ASR) technology is widely used for communication convenience in converting speech to text. Initial surveys reveal that existing studies on ASR, both in Thai and foreign language...
详细信息
ISBN:
(数字)9798331543952
ISBN:
(纸本)9798331543969
Recently, Automatic Speech Recognition (ASR) technology is widely used for communication convenience in converting speech to text. Initial surveys reveal that existing studies on ASR, both in Thai and foreign languages, focus on contemporary language communication, lacking support for specialized vocabulary. Thai Traditional Medicine (TTM) contain ancient medical terminology recorded in various media such as palm leaves, parchment, notebooks, and inscriptions. Centuries of textual preservation have led to text degradation. Given the suitability of ASR study to accommodate medical terminology and ancient languages, it is proposed to apply it to convert original Thai Traditional Medicine texts into contemporary language, aiding experts in reading and interpreting them. ASR involves converting speech signals into text. In this paper, we propose an end-to-end speech recognition approach for Thai Traditional Medical texts leveraging self-supervised learning (SSL) to overcome the limitations of limited labeled data. We utilize a transformer-based model pre-trained (XLSR-Wav2Vec) on unlabeled TTM texts speech data using SSL techniques and fine-tune it with a small dataset of labeled TTM texts audio-text pairs. Due to the absence of a Thai Traditional Medicine vocabulary repository, a dataset comprising text and speech is developed, consisting of 1,800 training sentences and 200 test sentences randomly selected from recordings of 10 Thai Traditional Medicine experts. Offline evaluation methods are employed, resulting in improved accuracy rates. Future efforts will focus on expanding the speech dataset to enhance recognition accuracy further. This study lays the groundwork for efficiently extracting knowledge from Thai Traditional Medicine prescriptions, ensuring the preservation of this valuable heritage for future generations.
The human body is not able to detect whether the air is polluted or not, which is why it is important to have a device that can measure the air quality, both in the closed environment and in nature. Thus, air pollutio...
详细信息
This paper has an overview on study of traffic capacity of Mobile network parameter that affect the network utilization and network experience in Mobile network era., This capacity study & analytics provide a conc...
详细信息
ISBN:
(数字)9798350387490
ISBN:
(纸本)9798350387506
This paper has an overview on study of traffic capacity of Mobile network parameter that affect the network utilization and network experience in Mobile network era., This capacity study & analytics provide a conception of how the various networks function, capacity parameters & constraints of different domain of Mobile Network like RAN (Radio access Network),CN (Core Network), IP & TX (Internet Protocol & Transport Network) & their associated capacity parameter have correlations in network utilization. It also has the access of Mobile Network KPIs detail, for readers to easily retrieve a variety of capacity parameters for effective capacity management. In order to manage end to end capacity requirement in telecom domain & can help for solving capacity problem with the help of various network parameters. These various capacity parameters can be used to generate systematic, rule-based decision which are standardized, more flexible, and faster to take decision on capacity expansion well in advance through the parametric behaviour. furthermore, the review concludes the published work their gaps and future work in the direction of improving Mobile network capacity management.
When it comes to maximizing the effectiveness of a business and promoting professional growth, employee performance prediction is an extremely important factor. This research article investigates the use of machine le...
详细信息
Here we present a rigorous study for the different integrated photonic platforms that can be used for on-chip refractive index (RI) sensing. The study includes the widespread silicon photonics platform, the silicon ni...
详细信息
ISBN:
(数字)9798350366365
ISBN:
(纸本)9798350366372
Here we present a rigorous study for the different integrated photonic platforms that can be used for on-chip refractive index (RI) sensing. The study includes the widespread silicon photonics platform, the silicon nitride platform and the silica platform. We compare these three platforms according to five parameters that determine the performance and reliability of the RI sensor. Finally, we conclude with the optimum platform for on-chip RI sensing according to the available technology and the aimed application.
In this paper, a semantic information retrieval framework is presented to improve the precision of search results by concentrating on the context of concepts is presented. Instead of the keyword matching technique, th...
详细信息
ISBN:
(数字)9798331543952
ISBN:
(纸本)9798331543969
In this paper, a semantic information retrieval framework is presented to improve the precision of search results by concentrating on the context of concepts is presented. Instead of the keyword matching technique, the graph theory is used for leveraging the relationships and meanings of search terms. Information is represented as a knowledge graph for semantic searching performed by the inference engine and results are passed to the NLP technique for interpreting entity, relationship and property to their relevancy query. In the current system, we focused on healthcare system to helping the foundation recommendations of Thai Traditional Medicine. Once Thai Traditional Medicine contains a numerous of words which have the same meaning, the traditional keyword based cannot retrieve all relevant document. In our proposed semantic architecture, the query is performed an context-based understanding for retrieving all relevant document, therefore, it can retrieve the same number of documents for the queries which have the same meaning.
暂无评论