In the era of widespread Internet use and extensive social media interaction, the digital realm is accumulating vast amounts of unstructured text data. This unstructured data often contain undesirable information, nec...
详细信息
This study focuses on behavior patterns, which are characteristic actions common to groups or communities, to promote intercultural understanding. Understanding greeting gestures is crucial for comprehending social re...
详细信息
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ...
详细信息
We introduce a novel differentially private algorithm for online federated learning that employs temporally correlated noise to enhance utility while ensuring privacy of continuously released models. To address challe...
详细信息
The purpose of this work is to present the numerical solutions of the nonlinear mathematical Leptospirosis disease (LD) model using the computational performances of the artificial neural networks (ANNs) along with th...
详细信息
The quality of development documents written in natural language is basically ensured by developer’s review with quite a few man-hours. Natural language processing (NLP) tools can partially automate the time-consumin...
详细信息
Cardiovascular problems have become the predominant cause of death worldwide and a rise in the number of patients has been observed ***,electrocardiogram(ECG)data is analyzed by medical experts to determine the cardia...
详细信息
Cardiovascular problems have become the predominant cause of death worldwide and a rise in the number of patients has been observed ***,electrocardiogram(ECG)data is analyzed by medical experts to determine the cardiac abnormality,which is *** addition,the diagnosis requires experienced medical experts and is ***,automated identification of cardiovascular disease using ECGs is a challenging problem and state-of-the-art performance has been attained by complex deep learning *** study proposes a simple multilayer perceptron(MLP)model for heart disease prediction to reduce computational *** dataset containing averaged signals with window size 10 is used as an *** competing deep learning and machine learning models are used for comparison.K-fold cross-validation is used to validate the *** outcomes reveal that the MLP-based architecture can produce better outcomes than existing approaches with a 94.40%accuracy *** findings of this study show that the proposed system achieves high performance indicating that it has the potential for deployment in a real-world,practical medical environment.
作者:
Hama, HiroyukiSato, ToshinoriFukuoka University
Graduate School of Engineering Department of Electronics Engineering and Computer Science Fukuoka Japan Fukuoka University
Faculty of Engineering Department of Electronics Engineering and Computer Science Fukuoka Japan
Edge devices used in healthcare require high energy efficiency due to battery operation and replacement challenges. Approximate computing is effective in reducing energy consumption for applications tolerant to errors...
详细信息
A substitution box(S-Box)is a crucial component of contemporary cryptosystems that provide data protection in block *** the moment,chaotic maps are being created and extensively used to generate these SBoxes as a chao...
详细信息
A substitution box(S-Box)is a crucial component of contemporary cryptosystems that provide data protection in block *** the moment,chaotic maps are being created and extensively used to generate these SBoxes as a chaotic map assists in providing disorder and resistance to combat cryptanalytical *** this paper,the construction of a dynamic S-Box using a cipher key is proposed using a novel chaotic map and an innovative tweaking *** projected chaotic map and the proposed tweak approach are presented for the first time and the use of parameters in their workingmakes both of these dynamic in *** tweak approach employs cubic polynomials while permuting the values of an initial S-Box to enhance its cryptographic *** of the parameters are provided using the cipher key and a small variation in values of these parameters results in a completely different unique *** analysis and exploration confirmed that the projected chaoticmap exhibits a significant amount of chaotic *** security assessment in terms of bijectivity,nonlinearity,bits independence,strict avalanche,linear approximation probability,and differential probability criteria are utilized to critically investigate the effectiveness of the proposed S-Box against several *** proposed S-Box’s cryptographic performance is comparable to those of recently projected S-Boxes for its adaption in real-world security *** comparative scrutiny pacifies the genuine potential of the proposed S-Box in terms of its applicability for data security.
Peer and self-assessment open opportunities to scale assessments in online classrooms. This article reports our experiences of using AsPeer-peer assessment system, with two iterations of a university online class. We ...
详细信息
暂无评论