With the involvement of technology, its negative sides are showing out drastically. As Android is an open-source platform that has nice customization, control and accessibility features cost-effectively, it attracts m...
详细信息
This work presents an accelerator that performs blind deblurring based on the dark channel prior. The alternating minimization algorithm is leveraged for latent image and blur kernel estimation. A 2-D Laplace equation...
详细信息
In the era of rapid technological advancements, data and information have become significant assets that require continuous protection from unauthorized access and malicious attacks. Network Intrusion Detection System...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical tools to thoroughly investigate the dynamics of the chaotic map,which allows us to select optimal parameter configurations for the encryption *** findings indicate that the proposed sine-cosine map is capable of generating a rich variety of chaotic attractors,an essential characteristic for effective *** encryption technique is based on bit-plane decomposition,wherein a plain image is divided into distinct bit *** planes are organized into two matrices:one containing the most significant bit planes and the other housing the least significant *** subsequent phases of chaotic confusion and diffusion utilize these matrices to enhance *** auxiliary matrix is then generated,comprising the combined bit planes that yield the final encrypted *** results demonstrate that our proposed technique achieves a commendable level of security for safeguarding sensitive patient information in medical *** a result,image quality is evaluated using the Structural Similarity Index(SSIM),yielding values close to zero for encrypted images and approaching one for decrypted ***,the entropy values of the encrypted images are near 8,with a Number of Pixel Change Rate(NPCR)and Unified Average Change Intensity(UACI)exceeding 99.50%and 33%,***,quantitative assessments of occlusion attacks,along with comparisons to leading algorithms,validate the integrity and efficacy of our medical image encryption approach.
Knee osteoarthritis (KOA) is a degenerative form of arthritis in the knee joints commonly occurring in old-aged individuals which can cause extreme pain, deterioration of bone joints, joint membranes or ligaments, and...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and *** this paper,the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers(POMH)in which larger tasks are divided into smaller subtasks and processed in parallel,hence expediting task ***,using POMH presents challenges such as breaking tasks into subtasks and scaling these subtasks based on many interdependent factors to ensure that all subtasks of a task finish simultaneously,preventing resource ***,applying matching theory to POMH scenarios results in dynamic preference profiles of helping devices due to changing subtask sizes,resulting in a difficult-to-solve,externalities *** paper introduces a novel many-to-one matching-based algorithm,designed to address the externalities problem and optimize resource allocation within POMH ***,we propose a new time-efficient preference profiling technique that further enhances time optimization in POMH *** performance of the proposed technique is thoroughly evaluated in comparison to alternate baseline schemes,revealing many advantages of the proposed *** simulation findings indisputably show that the proposed matching-based offloading technique outperforms existing methodologies in the literature,yielding a remarkable 52 reduction in task latency,particularly under high workloads.
Now that the population is growing, the expenditure on basic needs of life is also increasing due to a lack of or less availability of resources. The economy consumed electricity is reaching peaks as its main fuel, co...
详细信息
Conventional fuzzy systems(type-1 and type 2)are universal *** goal of this paper is to design and implement a new chaotic fuzzy system(NCFS)based on the Lee oscil-lator for function approximation and chaotic *** inco...
详细信息
Conventional fuzzy systems(type-1 and type 2)are universal *** goal of this paper is to design and implement a new chaotic fuzzy system(NCFS)based on the Lee oscil-lator for function approximation and chaotic *** incorporates fuzzy reasoning of the fuzzy systems,self-adaptation of the neural networks,and chaotic signal generation in a unique *** features enable the structure to handle uncertainties by generating new information or by chaotic search among prior *** fusion of chaotic structure into the neurons of the membership layer of a conventional fuzzy system makes the NCFS more capable of confronting nonlinear *** on the GFA and Stone-Weierstrass theorems,we show that the proposed model has the function approximation *** NCFS perfor-mance is investigated by applying it to the problem of chaotic *** results are demonstrated to ilustrate the concept of function approximation.
Deep learning has significantly advanced image processing in the medical domain, including the analysis of ultrasound (US) fetal images for prediction of fetal growth retardation. Before analysis of fetal images there...
详细信息
This article explores how H ∞ control can improve the stability and responsiveness of a Single Machine Infinite Bus (SMIB) system. Controlling SMIB system is essential for stability maintenance, voltage and frequency...
详细信息
暂无评论