Deep neural networks (DNN) have reached impressive performance in computer vision, making them a natural choice for object detection problems in automated driving. However, DNNs used for object detection are known to ...
详细信息
This paper investigates use meta-heuristic to solve curve fitting problems in Optical-Diffraction Based Image Depth Reconstruction. We aim to accurately establish a relationship curve between object distance and diffr...
详细信息
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate wi...
详细信息
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate with each *** one party refuses to do so,the channel is unstable.A stable channel is thus *** nodes may show uncooperative behavior,they may have a negative impact on the stability of such *** order to address this issue,this work proposes a dynamic evolutionary game model based on node *** model considers various defense strategies'cost and attack success ratio under *** can dynamically adjust their strategies according to the behavior of attackers to achieve their effective *** equilibrium stability of the proposed model can be *** proposed model can be applied to general channel *** is compared with two state-of-the-art blockchain channels:Lightning network and Spirit *** experimental results show that the proposed model can be used to improve a channel's stability and keep it in a good cooperative stable *** its use enables a blockchain to enjoy higher transaction success ratio and lower transaction transmission delay than the use of its two peers.
作者:
Bakr, Hend A.Salama, Ahmed M.Fares, AhmedZaky, Ahmed B.Cairo University
Biomedical Engineering Program Faculty of Engineering Giza Egypt Benha University
Computer Systems Engineering Program Faculty of Engineering at Shoubra Banha Egypt
Computer science and information technology Programs Alexandria Egypt Benha University
On leave from Computer Systems Engineering Program Faculty of Engineering at Shoubra Egypt
Physician scheduling is a critical task that impacts the quality of patient care, staff satisfaction, and operational efficiency in healthcare institutions. The traditional approach to physician scheduling is manual a...
详细信息
One of the greatest developments in computerscience is undoubtedly quantum computing. It has demonstrated to give various benefits over the classical algorithms, particularly in the significant reduction of processin...
详细信息
The external attention mechanism offers a promising approach to enhance image anomaly detection (Hayakawa et al., in: IMPROVE, pp. 100-–110, 2023). Nevertheless, the effectiveness of this method is contingent upon th...
详细信息
This note shows two design examples of PID con-Trollers, whose state variables estimate the selected state vari-Ables of the controlled plant systems, for LTI Parametrically Dependent (LTIPD) systems. The authors have...
详细信息
COVID-19 is a respiratory disease for which reverse transcription-polymerase chain reaction (RT-PCR) is the standard detection method. This study introduces a hybrid deep learning approach to support the diagnosis of ...
详细信息
Major Depressive Disorder (MDD) is a leading cause of disability globally and a major cause of suicide deaths. Improving our understanding of MDD is expected to inspire better objective diagnostic and treatment tools ...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the priv...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the privacy of patients. As medical information becomes more widely available, security measures must be established to protect confidentiality, integrity, and availability. Image steganography was recently proposed as an extra data protection mechanism for medical records. This paper describes a data-hiding approach for DICOM medical pictures. To ensure secrecy, we use Adversarial Neural Cryptography with SHA-256 (ANC-SHA-256) to encrypt and conceal the RGB patient picture within the medical image's Region of Non-Interest (RONI). To ensure anonymity, we use ANC-SHA-256 to encrypt the RGB patient image before embedding. We employ a secure hash method with 256bit (SHA-256) to produce a digital signature from the information linked to the DICOM file to validate the authenticity and integrity of medical pictures. Many tests were conducted to assess visual quality using diverse medical datasets, including MRI, CT, X-ray, and ultrasound cover pictures. The LFW dataset was chosen as a patient hidden picture. The proposed method performs well in visual quality measures including the PSNR average of 67.55, the NCC average of 0.9959, the SSIM average of 0.9887, the UQI average of 0.9859, and the APE average of 3.83. It outperforms the most current techniques in these visual quality measures (PSNR, MSE, and SSIM) across six medical assessment categories. Furthermore, the proposed method offers great visual quality while being resilient to physical adjustments, histogram analysis, and other geometrical threats such as cropping, rotation, and scaling. Finally, it is particularly efficient in telemedicine applications with high achieving security with a ratio of 99% during remote transmission of Electronic Patient Records (EPR) over the Internet, which safeguards the patien
暂无评论