The segmentation of magnetic resonance imaging (MRI) is an important task in medical imaging, particularly for brain MRIs, where accurate segmentation of anatomical structures, often challenged by uneven shapes and fu...
详细信息
ISBN:
(数字)9798350387179
ISBN:
(纸本)9798350387186
The segmentation of magnetic resonance imaging (MRI) is an important task in medical imaging, particularly for brain MRIs, where accurate segmentation of anatomical structures, often challenged by uneven shapes and fuzzy boundaries of tumours, is difficult to achieve. Thus, automating reliable segmentation of the region of interest (ROI) is essential in medical imaging. This work introduces an automated approach for brain tumour segmentation, leveraging a Deep Convolutional Neural Network (CNN) with a focus on effectively segmenting brain tumours within T1-weighted contrast-enhanced MRI (CE-MRI) images. The proposed method is first performed on the classified images to localize the tumour regions of interest(ROIs). In the next stage, the algorithm contours the concentrated tumour boundary for the segmentation process, which contains the network and attention module, both spatial and channel. To evaluate the overall system's performance, precision, recall, Jaccard index, and dice similarity coefficient (DSC) were calculated, where we achieved 0.8757, 0.8804, 0.8624, and 0.8995, respectively. Our approach demonstrates promising results compared to previous methods using the same database.
User authentication is one of the critical concerns of information *** tend to use strong textual passwords,but remembering complex passwords is hard as they often write it on a piece of paper or save it in their mobi...
详细信息
User authentication is one of the critical concerns of information *** tend to use strong textual passwords,but remembering complex passwords is hard as they often write it on a piece of paper or save it in their mobile *** passwords are slightly unprotected and are easily *** attacks include dictionary,shoulder surfing,and brute *** passwords overcome the shortcomings of textual passwords and are designed to aid memorability and ease of *** paper proposes a Process-based Pattern Authentication(PPA)system for Internet of Things(IoT)devices that does not require a server to maintain a static password of the login *** server stores user’s information,which they provide at the time of registration,i.e.,the R-code and the symbol,but the P-code,i.e.,the actual password,will change with every login attempt of *** this scheme,users may draw a pattern on the basis of calculation from the P-code and Rcode in the PPA pattern,and can authenticate themselves using their touch dynamic behaviors through Artificial Neural Network(ANN).The ANN is trained on touch behaviors of legitimate users reporting superior performance over the existing *** experimental purposes,PPA is implemented as a prototype on a computer system to carry out experiments for the evaluation in terms of memorability and *** experiments show that the system has an effect of 5.03%of the False Rejection Rate(FRR)and 4.36%of the False Acceptance Rate(FAR),respectively.
High-performance Machine Learning (ML) models are indispensable in cybersecurity due to the need for real-time threat detection, scalability in handling large datasets, and the ability to recognize complex patterns an...
详细信息
ISBN:
(数字)9798350373974
ISBN:
(纸本)9798350373981
High-performance Machine Learning (ML) models are indispensable in cybersecurity due to the need for real-time threat detection, scalability in handling large datasets, and the ability to recognize complex patterns and evolving threats. These models should reduce false positives and negatives, adapt to dynamic environments, and enable automated response mechanisms. This paper introduces an innovative methodology aimed at improving the performance and interpretability of ML models in binary classification, with a distinct emphasis on network intrusion detection. The proposed approach centers on an in-depth analysis of the confusion matrix, utilizing its insights to enhance model performance. We test our methodology on the UNSW-NB15 network intrusion dataset. We managed to improve almost all metrics with an increase in accuracy from 81.92% to 89.6%, recall from 76.42% to 89.22%, and F1 score from 82.51% to 89.76%, with the potential to obtain more improvements.
Recognition and extraction of license plate information from still images or videos are the basis of modern traffic and security systems. Automatic License Plate Recognition (ALPR) is transforming public safety and tr...
详细信息
With the development and progress of electric power technology and information technology, microgrid has become an important and indispensable part of smart grid. The cyber-security of microgrids has a significant imp...
详细信息
In visual place recognition, accurately identifying and matching images of locations under varying environmental conditions and viewpoints remains a significant challenge. In this paper, we introduce a new technique, ...
详细信息
ISBN:
(数字)9798350353006
ISBN:
(纸本)9798350353013
In visual place recognition, accurately identifying and matching images of locations under varying environmental conditions and viewpoints remains a significant challenge. In this paper, we introduce a new technique, called Bag-of-Queries (BoQ), which learns a set of global queries, designed to capture universal place-specific attributes. Unlike existing techniques that employ self-attention and generate the queries directly from the input, BoQ employ distinct learnable global queries, which probe the input features via cross-attention, ensuring consistent information aggregation. In addition, this technique provides an inter-pretable attention mechanism and integrates with both CNN and Vision Transformer backbones. The performance of BoQ is demonstrated through extensive experiments on 14 large-scale benchmarks. It consistently outperforms current state-of-the-art techniques including NetVLAD, MixVPR and EigenPlaces. Moreover, despite being a global re-trieval technique (one-stage), BoQ surpasses two-stage re-trieval methods, such as Patch-NetVLAD, TransVPR and R2Former, all while being orders of magnitude faster and more efficient. The code and model weights are publicly available at https:/***/amaralibey/Bag-of-Queries.
Multi-model data is organised in various mutually interlinked formats and models, often with contradictory features. In addition, its structure may change over time, and its size can grow to the extremes of Big Data. ...
详细信息
With the increasing internet usage, the volume of computerized data in Bangla is also growing exponentially. This vast repository of unstructured web data has various potential applications in Natural Language Process...
详细信息
Street lights currently use more energy than other types of lighting because of an inefficient mechanism that makes the bulbs use a lot of electricity. The suggested approach uses various sensors on intelligent street...
详细信息
Healthcare organisations are being overwhelmed by data, devices and apps, and disjointed multiple cloud services. Well-heeled multicloud can provide a unified cloud model that provides greater control and scalability ...
详细信息
暂无评论