作者:
Anwar, AymanKhalifa, YassinLucatorto, ErinCoyle, James L.Sejdic, ErvinUniversity of Toronto
Faculty of Applied Science & Engineering Department of Electrical and Computer Engineering TorontoON Canada University of Pittsburgh
Center for Research Computing and Information Technology Analytics PittsburghPA United States Cairo University
Faculty of Engineering Systems and Biomedical Engineering Department Giza Egypt University of Pittsburgh
School of Health and Rehabilitation Sciences Department of Communication Science and Disorders PittsburghPA United States University of Toronto
North York General Hospital Faculty of Applied Science & Engineering Department of Electrical and Computer Engineering TorontoON Canada
Swallowing assessment is a crucial task to reveal swallowing abnormalities. There are multiple modalities to analyze swallowing kinematics, such as videofluoroscopic swallow studies (VFSS), which is the gold standard ...
详细信息
The public’s health is seriously at risk from the coronavirus pandemic. Millions of people have already died as a result of this devastating illness, which affects countless people daily worldwide. Unfortunately, no ...
详细信息
Recently,Internet of Medical Things(IoMT)has gained considerable attention to provide improved healthcare services to *** earlier diag-nosis of brain tumor(BT)using medical imaging becomes an essential task,auto-mated...
详细信息
Recently,Internet of Medical Things(IoMT)has gained considerable attention to provide improved healthcare services to *** earlier diag-nosis of brain tumor(BT)using medical imaging becomes an essential task,auto-mated IoMT and cloud enabled BT diagnosis model can be devised using recent deep learning *** this motivation,this paper introduces a novel IoMT and cloud enabled BT diagnosis model,named *** IoMTC-HDBT model comprises the data acquisition process by the use of IoMT devices which captures the magnetic resonance imaging(MRI)brain images and transmit them to the cloud ***,adaptive windowfiltering(AWF)based image preprocessing is used to remove *** addition,the cloud server executes the disease diagnosis model which includes the sparrow search algorithm(SSA)with GoogleNet(SSA-GN)*** IoMTC-HDBT model applies functional link neural network(FLNN),which has the ability to detect and classify the MRI brain images as normal or ***finds useful to generate the reports instantly for patients located in remote *** validation of the IoMTC-HDBT model takes place against BRATS2015 Challenge dataset and the experimental analysis is car-ried out interms of sensitivity,accuracy,and specifi*** experimentation out-come pointed out the betterment of the proposed model with the accuracy of 0.984.
Interest in supporting Federated Learning (FL) using blockchains has grown significantly in recent years. However, restricting access to the trained models only to actively participating nodes remains a challenge even...
详细信息
This research presents AMRes (Adaptive Windowed Convolutional Neural Network and Multiple Residual Network), a novel method that demonstrates remarkable resilience against overfitting, even in scenarios with limited t...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security ***,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of *** decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing *** this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their ***,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security ***,we discuss the challenges posed by BGP security problems and outline prospects for future research.
There are many practical uses for facial verification and recognition jobs. In this study, we look into the developments and difficulties faced in facial recognition technologies, especially in the application of Siam...
详细信息
The mislabeling of mangoes in local Pakistani markets unfairly impacts buyers, who frequently end up paying a premium for a cheaper type of mango fruit. To address this issue, our study employs advanced deep learning ...
详细信息
Segmentation of brain tumors aids in diagnosing the disease early, planning treatment, and monitoring its progression in medical image analysis. Automation is necessary to eliminate the time and variability associated...
详细信息
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication *** this paper,a text zero...
详细信息
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication *** this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism,based on hidden Markov model,is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed *** researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English ***,he extracts the features of the interrelationship among the contexts of the text,utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any *** has been implemented using PHP with VS code *** robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and *** SFASCDW was found to be effective and could be applicable in detecting any possible tampering.
暂无评论