Segmenting a breast ultrasound image is still challenging due to the presence of speckle noise,dependency on the operator,and the variation of image *** paper presents the UltraSegNet architecture that addresses these...
详细信息
Segmenting a breast ultrasound image is still challenging due to the presence of speckle noise,dependency on the operator,and the variation of image *** paper presents the UltraSegNet architecture that addresses these challenges through three key technical innovations:This work adds three things:(1)a changed ResNet-50 backbone with sequential 3×3 convolutions to keep fine anatomical details that are needed for finding lesion boundaries;(2)a computationally efficient regional attention mechanism that works on high-resolution features without using a transformer’s extra memory;and(3)an adaptive feature fusion strategy that changes local and global featuresbasedonhowthe image isbeing *** evaluation on two distinct datasets demonstrates UltraSegNet’s superior performance:On the BUSI dataset,it obtains a precision of 0.915,a recall of 0.908,and an F1 score of *** the UDAIT dataset,it achieves robust performance across the board,with a precision of 0.901 and recall of ***,these improvements are achieved at clinically feasible computation times,taking 235 ms per image on standard GPU ***,UltraSegNet does amazingly well on difficult small lesions(less than 10 mm),achieving a detection accuracy of *** is a huge improvement over traditional methods that have a hard time with small-scale features,as standard models can only achieve 0.63–0.71 *** improvement in small lesion detection is particularly crucial for early-stage breast cancer *** from this work demonstrate that UltraSegNet can be practically deployable in clinical workflows to improve breast cancer screening accuracy.
To address the limitations of existing time-frequency analysis (TFA) techniques, including low time-frequency resolution and fixed window parameters when analyzing strongly time-varying signals, this study proposes an...
详细信息
The rapid proliferation of Internet of Things (IoT) devices has led to a substantial increase in network packet traffic, raising significant privacy concerns. Although traffic encryption is employed to protect the pri...
详细信息
The rapid proliferation of Internet of Things (IoT) devices has led to a substantial increase in network packet traffic, raising significant privacy concerns. Although traffic encryption is employed to protect the privacy of IoT devices, attackers can still leverage Machine Learning (ML) and Deep Learning (DL) techniques to classify device types by analyzing packet characteristics, such as size and timing. The main challenges in the state of the art are the lack of effective methods for exposing privacy violations in encrypted IoT traffic, and the absence of robust defense mechanisms to mitigate privacy breaches caused by network traffic analysis. Considering these challenges, this study presents two key contributions: (i) a novel vector-based classification method that enhances device-type identification from encrypted IoT traffic using advanced ML and DL techniques, and (ii) a robust defense mechanism based on Differential Privacy (DP) and advanced padding techniques against traffic analysis attacks. Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. The results demonstrate that the proposed vector-based classification method significantly improves the attacker’s classification accuracy, even when privacy-preserving techniques, such as padding, are used to obscure device-type classification. For this purpose, the study evaluates eXtreme Gradient Boosting (XGBoost), Long Short-Term Memory (LSTM), and Gated Recurrent Unit (GRU) for IoT traffic classification, achieving an accuracy rate of 99.61% with XGBoost, 96.74% with LSTM, and 96.94% with GRU. Additionally, the Decision Tree (DT), Random Forest (RF), k-Nearest Neighbors (kNN), and GRU classification algorithms are also evaluated and compared with the XGBoost and LSTM classifiers for the proposed attack model. As a defense mechanism, DP is applied using the Fourier Perturbation Algorithm (FPA) to optimize padd
Physical, linear/nonlinear optical, dielectric characteristics, and γ-ray-buildup factors of nanocomposites (NCs) sheets of PVC doped with x(Pb0.5Ni0.5Fe2O4) spinel nanoferrites: x = 0–10 wt% and named as PVC/P...
详细信息
The paper describes and analyzes an Average Schwarz Method with spectrally enriched coarse space for a reduced Hsieh-Clough-Tocher (RHCT) finite element discretization of a 4th-order elliptic multiscale problem. The d...
详细信息
This study presents experimental results showing that weak, extremely low frequency electromagnetic (EM) fields influence the growth rates of HT-1080 fibrosarcoma cells in vitro and offers a theoretical explanation fo...
详细信息
The research topic of Path planning is extremely challenging area of concentration within the field of mobile robots. However, path planning algorithms for mobile robot tasks are contingent upon the environment and it...
详细信息
Nowadays, high energy amount is being wasted by computing servers and personal electronic devices, which produce a high amount of carbon dioxide. Thus, it is required to decrease energy usage and pollution. Many appli...
详细信息
Due to the complexity, challenge, and fast growth of stock markets, they encourage more efficient use of financial resources and the expansion of macroeconomics. Tesla and Apple stock prices fluctuate constantly due t...
详细信息
In this paper, the Hausdorff Fractal Fokas-Lenells (HFFL) equation with full nonlinearity is investigated. The travelling wave reduction technique is utilized to transform the HFFL equation into an ordinary differenti...
详细信息
暂无评论