Cardio Vascular Diseases (CVDs) are the prime reason of death globally. Particularly, the cases of coronary artery disease (CAD) have been rising in the post Covid era, especially amongst middle-aged people. Thus, the...
Cardio Vascular Diseases (CVDs) are the prime reason of death globally. Particularly, the cases of coronary artery disease (CAD) have been rising in the post Covid era, especially amongst middle-aged people. Thus, the before time detection of the disease might evade the growing number of fatalities and morbidities. Two most common and accurate methods used to detect CAD are angiography and electrocardiography (ECG). While the former is invasive and a risky procedure, the latter one although non-invasive lacks correctness. Over a decade, non-invasive Machine Learning (ML) as well as Deep Learning (DL) methods have shaped the healthcare scenario by facilitating early diagnosis of the diseases through the application of various computer based algorithmic models over clinical data and images. A hybrid Convolutional- Extreme Gradient Boosting (Convolutional XGBoost) model has been proposed to accurately detect CAD by outperforming some of the existing methods.
One of the most popularly used features on smart-phones is WhatsApp. It is a free messaging app available for An-droid, IOS, and all other smartphones. A WhatsApp vulnerability is a hole or a weakness in the app, whic...
详细信息
One of the most popularly used features on smart-phones is WhatsApp. It is a free messaging app available for An-droid, IOS, and all other smartphones. A WhatsApp vulnerability is a hole or a weakness in the app, which can be a design flaw or an implementation bug. Through bug, an attacker can enter into the app and cause harm to the database of an application. A database contains private information like backup files, chatting information, contacts, etc. The most dangerous vulnerability in WhatsApp are Authentication, Account Hijacking, and Message Manipulation. In these vulnerabilities, an attacker can manip-ulate the message but not hijack the entire account. There are some basic requirements for a secure and privacy-preserving chat service, database backup, encrypted database, etc. The awareness about the vulnerability of WhatsApp and its security settings in new versions of WhatsApp. Use WhatsApp security features and secure the services of the application. This paper aims to be aware of the risks and vulnerabilities of WhatsApp and use the Threat modeling method to mitigate its vulnerability. It used threat Modelling steps to help organizations to quantify risks and vulnerabilities, ensuring those that need the most attention and resources do so to minimize their attack surface in a purposeful way.
Object detection is an important task in computer vision. In earlier studies, object detection mostly works on single-modal. But recently, in order to improve detection efficiency, researchers start adding more modals...
Object detection is an important task in computer vision. In earlier studies, object detection mostly works on single-modal. But recently, in order to improve detection efficiency, researchers start adding more modals for improving the robustness of detection result. In this paper, we assume that all input modals which can convert to image style are able to complete object detection task through a unified model. We choose YOLOv7 as our baseline model and use RGB and infrared images from the public dataset Camel to test our hypothesis. Based on our experiment results, training RGB and IR images together obtains better performance than training individually, which shows that all image style modalities are possibly handled by a unified model and even achieve better results.
Even while the Internet of Things (IoT) already affects our day-to-day activities, its future relevance and potential for transformation remain untapped. Security issues with present communications technology must be ...
详细信息
The performance of metaheuristic optimization techniques is system-dependent, it is essential to ascertain the suitability of an algorithm before its application. This study surveys the suitability of AVOA in damping ...
详细信息
In accordance with the Sustainable Development Goals, the exponential expansion of machine learning (ML) and artificial intelligence (AI) presents an excellent chance to build more effective tools and solutions and ge...
详细信息
Large language models (LLMs) demonstrate significant potential in advancing medical applications, yet their capabilities in addressing medical ethics challenges remain underexplored. This paper introduces MedEthicEval...
This study aims to present a feasible LFC (Load Frequency Control) model that integrates physical security limitations, namely GRC, GDB, and TD. The presence of this characteristic guarantees that the design is not on...
详细信息
Graph learning plays a pivotal role and has gained significant attention in various application scenarios, from social network analysis to recommendation systems, for its effectiveness in modeling complex data relatio...
详细信息
Our proposed work is a research project that does quantitative analysis of various basic image manipulation techniques as processes for augmentation of image type data on the accuracy of deep learning task of hand-wri...
详细信息
暂无评论