In neurosurgery to remove brain tumors, DICOM data, a medical imaging standard, is generated preoperatively using CT and MRI. This data is used for surgical planning. However, brain deformation problems, known as brai...
详细信息
Seamless communication between authorities, people, and smart devices is crucial in today's globally interconnected world. Unprecedented demands on software design result from the advent of ubiquitous connectivity...
详细信息
The ever-increasing demand for higher and higher 5G wireless communication system performance has a direct impact on the design of highly efficient RF blocks, in which mixers play a key role. In fact, with the exponen...
详细信息
Ischemic heart disease(IHD)is one of the leading causes of death ***,different geographic regions show different variations of the risk factors of this disease based on the different lifestyles of *** study examines t...
详细信息
Ischemic heart disease(IHD)is one of the leading causes of death ***,different geographic regions show different variations of the risk factors of this disease based on the different lifestyles of *** study examines the current IHD condition in southern Bangladesh,a Southeast Asian middle-income *** main approach to this research is an Al-based proposal of a reduced set of the greatest impact clinical traits that may cause *** approach attempts to reduce IHD morbidity and mortality by early detection of risk factors using the reduced set of clinical ***,diagnostic,and symptomatic features were considered for analysing this clinical *** pre-processing utilizes several machine learning techniques to select significant features and make meaningful interpretations.A proposed voting mechanism ranked the selected 138 features by their impact *** this regard,diverse patterns in correlations with variables,including age,sex,career,family history,obesity,etc.,were calculated and explained in terms of voting *** the 138 risk factors,three labels were categorized:high-risk,medium-risk,and low-risk features;19 features were regarded as high,25 were medium,and 94 were considered low impactful *** research's technological methodology and practical goals provide an innovative and resilient framework for addressing IHD,especially in less developed cities and townships of Bangladesh,where the general population's socioeconomic conditions are often *** data collection,pre-processing,and use of this study's complete and comprehensive IHD patient dataset is another innovative *** believe that other relevant research initiatives will benefit from this work.
The arithmetic and logic unit (ALU) is a key element of complex circuits and an intrinsic part of the most widely recognized complex circuits in digital signal processing. Also, recent attention has been brought to re...
详细信息
Neurodegenerative disorders such as dementia and Alzheimer’s disease (AD) have adversely devastated the health and well-being of the older community. Given that early detection might help prevent or delay cognitive d...
详细信息
A new meaningful image encryption algorithm based on compressive sensing(CS)and integer wavelet transformation(IWT)is proposed in this *** of all,the initial values of chaotic system are encrypted by RSA algorithm,and...
详细信息
A new meaningful image encryption algorithm based on compressive sensing(CS)and integer wavelet transformation(IWT)is proposed in this *** of all,the initial values of chaotic system are encrypted by RSA algorithm,and then they are open as public *** make the chaotic sequence more random,a mathematical model is constructed to improve the random ***,the plain image is compressed and encrypted to obtain the secret ***,the secret image is inserted with numbers zero to extend its size same to the plain *** applying IWT to the carrier image and discrete wavelet transformation(DWT)to the inserted image,the secret image is embedded into the carrier ***,a meaningful carrier image embedded with secret plain image can be obtained by inverse ***,the measurement matrix is built by both chaotic system and Hadamard matrix,which not only retains the characteristics of Hadamard matrix,but also has the property of control and synchronization of chaotic ***,information entropy of the plain image is employed to produce the initial conditions of chaotic *** a result,the proposed algorithm can resist known-plaintext attack(KPA)and chosen-plaintext attack(CPA).By the help of asymmetric cipher algorithm RSA,no extra transmission is needed in the *** simulations show that the normalized correlation(NC)values between the host image and the cipher image are *** is to say,the proposed encryption algorithm is imperceptible and has good hiding effect.
In the rapidly evolving field of healthcare, accurate clinical predictions are paramount for effective disease management and treatment planning. This paper introduces a novel ensemble machine learning model that util...
详细信息
Software cost estimation is a crucial aspect of software project management,significantly impacting productivity and *** research investigates the impact of various feature selection techniques on software cost estima...
详细信息
Software cost estimation is a crucial aspect of software project management,significantly impacting productivity and *** research investigates the impact of various feature selection techniques on software cost estimation accuracy using the CoCoMo NASA dataset,which comprises data from 93 unique software projects with 24 *** applying multiple machine learning algorithms alongside three feature selection methods,this study aims to reduce data redundancy and enhance model *** findings reveal that the principal component analysis(PCA)-based feature selection technique achieved the highest performance,underscoring the importance of optimal feature selection in improving software cost estimation *** is demonstrated that our proposed method outperforms the existing method while achieving the highest precision,accuracy,and recall rates.
In the era of autonomous vehicles (AVs), ensuring the safety and security of the system is an ongoing challenge, particularly when faced with increasingly cyber-Attacks such as GPS spoofing and man-in-The-middle. This...
详细信息
暂无评论