The importance of text classification algorithms has increased due to the growing availability of large-scale data. This has led to a greater demand for efficient classification techniques and encoding algorithms. Wor...
详细信息
This work presents the results of the examination of the HeLa cell line exposure on the ELF-EMF (extremely low-frequency electromagnetic field). In particular, the relationship between ELF-EMF exposition time and cell...
详细信息
Variational quantum algorithms require many measurements to train parameters in their circuit to solve a given problem. If we need a highly accurate solution, the further number of measurements increases. However, the...
详细信息
In an era marked by escalating cybersecurity threats,our study addresses the challenge of malware variant detection,a significant concern for amultitude of sectors including petroleum and mining *** paper presents an ...
详细信息
In an era marked by escalating cybersecurity threats,our study addresses the challenge of malware variant detection,a significant concern for amultitude of sectors including petroleum and mining *** paper presents an innovative Application Programmable Interface(API)-based hybrid model designed to enhance the detection performance of malware *** model integrates eXtreme Gradient Boosting(XGBoost)and an Artificial Neural Network(ANN)classifier,offering a potent response to the sophisticated evasion and obfuscation techniques frequently deployed by malware *** model’s design capitalizes on the benefits of both static and dynamic analysis to extract API-based features,providing a holistic and comprehensive view of malware *** these features,we construct two XGBoost predictors,each of which contributes a valuable perspective on the malicious activities under *** outputs of these predictors,interpreted as malicious scores,are then fed into an ANN-based classifier,which processes this data to derive a final *** strength of the proposed model lies in its capacity to leverage behavioral and signature-based features,and most importantly,in its ability to extract and analyze the hidden relations between these two types of *** efficacy of our proposed APIbased hybrid model is evident in its performance *** outperformed other models in our tests,achieving an impressive accuracy of 95%and an F-measure of 93%.This significantly improved the detection performance of malware variants,underscoring the value and potential of our approach in the challenging field of cybersecurity.
Sample adaptive offset (SAO) is applied for reducing sample distortion and attenuating ringing artifacts in both HEVC and VVC standards. The rate-distortion optimization process is used to select the best SAO paramete...
详细信息
Breast cancer ranks as the second most prevalent cancer in women, recognized as one of the most dangerous types of cancer, and is on the rise globally. Regular screenings are essential for early-stage treatment. Digit...
详细信息
Breast cancer ranks as the second most prevalent cancer in women, recognized as one of the most dangerous types of cancer, and is on the rise globally. Regular screenings are essential for early-stage treatment. Digital mammography (DM) is the most recognized and widely used technique for breast cancer screening. Contrast-Enhanced Spectral Mammography (CESM or CM) is used in conjunction with DM to detect and identify hidden abnormalities, particularly in dense breast tissue where DM alone might not be as effective. In this work, we explore the effectiveness of each modality (CM, DM, or both) in detecting breast cancer lesions using deep learning methods. We introduce an architecture for detecting and classifying breast cancer lesions in DM and CM images in Craniocaudal (CC) and Mediolateral Oblique (MLO) views. The proposed architecture (JointNet) consists of a convolution module for extracting local features, a transformer module for extracting long-range features, and a feature fusion layer to fuse the local features, global features, and global features weighted based on the local ones. This significantly enhances the accuracy of classifying DM and CM images into normal or abnormal categories and lesion classification into benign or malignant. Using our architecture as a backbone, three lesion classification pipelines are introduced that utilize attention mechanisms focused on lesion shape, texture, and overall breast texture, examining the critical features for effective lesion classification. The results demonstrate that our proposed methods outperform their components in classifying images as normal or abnormal and mitigate the limitations of independently using the transformer module or the convolution module. An ensemble model is also introduced to explore the effect of each modality and each view to increase our baseline architecture's accuracy. The results demonstrate superior performance compared with other similar works. The best performance on DM images
Recent advances in generative models have revolutionized the technology employed for image synthesis quite significantly, and two paradigms—GANs and diffusion-based models—are leading the pack of innovation. This pa...
详细信息
The paper describes the energy consumption from the battery based on the current measurements for various cases, i.e., speed (PWL adjustment) and loads. The main purpose of the research is to have additional and relia...
详细信息
Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)*** order to provide an efficient connection amo...
详细信息
Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)*** order to provide an efficient connection among IIoT devices,CRNs enhance spectrum utilization by using licensed ***,the routing protocol in these networks is considered one of the main problems due to node mobility and time-variant channel ***,the channel selection for routing protocol is indispensable in CRNs to provide an adequate adaptation to the Primary User(PU)activity and create a robust routing *** study aims to construct a robust routing path by minimizing PU interference and routing delay to maximize throughput within the IIoT ***,a generic routing framework from a cross-layer perspective is investigated that intends to share the information resources by exploiting a recently proposed method,namely,Channel Availability ***,a novel cross-layer-oriented routing protocol is proposed by using a time-variant channel estimation *** protocol combines lower layer(Physical layer and Data Link layer)sensing that is derived from the channel estimation ***,it periodically updates and stores the routing table for optimal route ***,in order to achieve higher throughput and lower delay,a new routing metric is *** evaluate the performance of the proposed protocol,network simulations have been conducted and also compared to the widely used routing protocols,as a *** simulation results of different routing scenarios demonstrate that our proposed solution outperforms the existing protocols in terms of the standard network performance metrics involving packet delivery ratio(with an improved margin of around 5–20%approximately)under varying numbers of PUs and cognitive users in Mobile Cognitive Radio Networks(MCRNs).Moreover,the cross-layer routing protocol successfully achiev
Fe-based nanocrystalline alloys have high magnetic flux density and low loss. So, in this study, the magnetic domain structure of ball-milled magnetic powders of these nanocrystalline alloys was observed using a Kerr ...
详细信息
暂无评论