The paper aims to develop an automated breast mass characterization system for assisting the radiologist to analyze the digital mammograms. Mammographic Image Analysis Society (MIAS) database images are used in this s...
详细信息
Wearable technology is expanding rapidly in recent year. It is used in many applications in various domains, including affective computing. Affective computing is all about understanding and responding to human emotio...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image *** with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for *** address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of *** Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or *** Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the *** WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods.
The global food supply heavily relies on fisheries, highlighting the crucial importance of ensuring the safety of fish products. However, the widespread application of antibiotics and the existence of compounds such a...
详细信息
In this paper, we propose a new approach for the Joint Replenishment Problem (JRP) where items are procured from multisupplier. In solution algorithms, Genetic Algorithm (GA) and Simulated Annealing (SA) are cooperati...
详细信息
Cloud technology is a business strategy that aims to provide the necessary material to customers depending on their needs. Individuals and cloud businesses alike have embraced the cloud storage service, which has beco...
详细信息
ISBN:
(纸本)9781665495158
Cloud technology is a business strategy that aims to provide the necessary material to customers depending on their needs. Individuals and cloud businesses alike have embraced the cloud storage service, which has become the most widely used service. The industries outsource their data to cloud storage space to relieve themselves of a load of dealing with redundant data contents. This must be protected to prevent the theft of personal belongings, and privacy must be improved as well. Different research projects have been suggested to ensure the safe management of the information included within the data content. The security of current research projects, on the other hand, still needs improvement. As a result, this method has been suggested to address the security concerns associated with cloud computing. The primary goal of this study effort is to offer a safe environment for cloud users while also increasing the profit of cloud resource providers by managing and securely delivering data contents to the cloud users. The bulk of sectors, including business, finance, the military, and the healthcare industry, do not store data in cloud-based storage systems. This technique is used to attract these kinds of customers. Increasing public acceptance Medical researchers are drawn to cloud computing because it allows them to store their study material in a centralized location and distribute and access it in a more flexible manner. They were collected from numerous individuals who were being evaluated for medical care at the time. Scalable and Enhanced Key Aggregate Cryptosystem is a protected data protection method that provides highly effective security in the health care industry. This approach handles disagreements in the outflow of sensitive information and guarantees the data security deployment of a Cloud-based Intelligent Health Monitoring system for the parties involved in the dispute. Using the suggested method, the encrypted data format of medical and health-care
During the last decade, many researchers have dedicated their efforts to constructing revolutionary machines and to providing them with forms of artificial intelligence to perform some of the most hazardous, risky ...
详细信息
ISBN:
(数字)9781461544050
ISBN:
(纸本)9780792377894;9781461369820
During the last decade, many researchers have dedicated their efforts to constructing revolutionary machines and to providing them with forms of artificial intelligence to perform some of the most hazardous, risky or monotonous tasks historically assigned to human beings. Among those machines, mobile robots are undoubtedly at the cutting edge of current research directions. A rough classification of mobile robots can be considered: on the one hand, mobile robots oriented to human-made indoor environments; on the other hand, mobile robots oriented to unstructured outdoor environments, which could include flying oriented robots, space-oriented robots and underwater robots. The most common motion mechanism for surface mobile robots is the wheel-based mechanism, adapted both to flat surfaces, found in human-made environments, and to rough terrain, found in outdoor environments. However, some researchers have reported successful developments with leg-based mobile robots capable of climbing up stairs, although they require further investigation. The research work presented here focuses on wheel-based mobile robots that navigate in human-made indoor environments.;The main problems described throughout this book are:;The book emphasizes the generality of the solutions proposed to the different problems and their independence with respect to the exteroceptive sensors mounted on the mobile robot. Theoretical results are complemented by real experiments, where the use of multisensor-based approaches is highlighted.
The Huygens' box (HB) method of replacing an arbitrary module inside an electronic apparatus with a set of current sources on a closed surface is discussed. A numerical study is performed, with a typical printed c...
详细信息
This paper presents a fast adaptive iterative algorithm to solve linearly separable classification problems in R". In each iteration, a subset of the sampling data (n-points) is adaptively chosen and a hyperplane...
详细信息
This paper describes a new approach to analyze road images which often contain vehicles and extract license plate (LP) from natural properties by finding vertical and horizontal edges. In this paper, initially, segmen...
详细信息
暂无评论