Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many *** modern-day applications,patient data usually holds clinical imagery,records,and other medical ***,the Internet of Medi...
详细信息
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many *** modern-day applications,patient data usually holds clinical imagery,records,and other medical ***,the Internet of Medical Things(IoMT),equipped with cloud computing,has come out to be a beneficial paradigm in the healthcare ***,the openness of networks and systems leads to security threats and illegal ***,reliable,fast,and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT *** paper presents an image protection scheme for healthcare applications to protect patients’medical image data exchanged in IoMT *** proposed security scheme depends on an enhanced 2D discrete chaotic map and allows dynamic substitution based on an optimized highly-nonlinear S-box and diffusion to gain an excellent security *** optimized S-box has an excellent nonlinearity score of *** new image protection scheme is efficient enough to exhibit correlation values less than 0.0022,entropy values higher than 7.999,and NPCR values around 99.6%.To reveal the efficacy of the scheme,several comparison studies are *** comparison studies reveal that the novel protection scheme is robust,efficient,and capable of securing healthcare imagery in IoMT systems.
Entanglement is added to the multiphoton state emanated by superradiance. It is achieved by employing multilevel atoms, via a multipath Dicke ladder. Additional quantum effects like beating between collective states a...
详细信息
ISBN:
(纸本)9798350369311
Entanglement is added to the multiphoton state emanated by superradiance. It is achieved by employing multilevel atoms, via a multipath Dicke ladder. Additional quantum effects like beating between collective states are exhibited.
Recommendation systems play a crucial role in identifying users' preferences based on their historical interaction records and those of other users. However, the ability to 'forget' certain users' pref...
详细信息
Following the introduction of Adam, several novel adaptive optimizers for deep learning have been proposed. These optimizers typically excel in some tasks but may not outperform Adam uniformly across all tasks. In thi...
详细信息
Following the introduction of Adam, several novel adaptive optimizers for deep learning have been proposed. These optimizers typically excel in some tasks but may not outperform Adam uniformly across all tasks. In this work, we introduce Meta-Adaptive Optimizers (MADA), a unified optimizer framework that can generalize several known optimizers and dynamically learn the most suitable one during training. The key idea in MADA is to parameterize the space of optimizers and dynamically search through it using hypergradient descent during training. We empirically compare MADA to other popular optimizers on vision and language tasks, and find that MADA consistently outperforms Adam and other popular optimizers, and is robust against sub-optimally tuned hyper-parameters. MADA achieves a greater validation performance improvement over Adam compared to other popular optimizers during GPT-2 training and fine-tuning. We also propose AVGrad, a modification of AMSGrad that replaces the maximum operator with averaging, which is more suitable for hyper-gradient optimization. Finally, we provide a convergence analysis to show that parameterized interpolations of optimizers can improve their error bounds (up to constants), hinting at an advantage for meta-optimizers. Copyright 2024 by the author(s)
Mobile devices (MDs) cannot fully run all computation/delay-sensitive tasks due to their limited computing resources. Mobile edge computing (MEC) meets the demand by providing massive resources for MDs and offloading ...
详细信息
Electric load prediction is a crucial aspect of energy management. It can enhance grid stability and support renewable integration. Recently, there has been significant interest in privacy for smart grids that focus o...
ISBN:
(数字)9798331529680
ISBN:
(纸本)9798331529697
Electric load prediction is a crucial aspect of energy management. It can enhance grid stability and support renewable integration. Recently, there has been significant interest in privacy for smart grids that focus on the traditional model that is used in the smart grids, which concludes there is no privacy in training the model as it uses the raw data of the customers without any encryption or privacy preservation, this problem gives a significant contribution to looking for a tool to solve this problem, this tool is federated learning approach. This paper will explain using the federated learning approach in the smart grid, which allows decentralized model training to achieve privacy preservation and increase security by integrating fully homomorphic encryption in the proposed federated learning framework, which helps smart grid prediction without exposing sensitive data. The experiment results show that the proposed approach achieves a high prediction with high privacy preservation.
The recent developments in biological and information technologies have resulted in the generation of massive quantities of data it speeds up the process of knowledge discovery from biological *** to the advancements ...
详细信息
The recent developments in biological and information technologies have resulted in the generation of massive quantities of data it speeds up the process of knowledge discovery from biological *** to the advancements of medical imaging in healthcare decision making,significant attention has been paid by the computer vision and deep learning(DL)*** the same time,the detection and classification of colorectal cancer(CC)become essential to reduce the severity of the disease at an earlier *** existing methods are commonly based on the combination of textual features to examine the classifier results or machine learning(ML)to recognize the existence of *** this aspect,this study focuses on the design of intelligent DL based CC detection and classification(IDL-CCDC)model for bioinformatics *** proposed IDL-CCDC technique aims to detect and classify different classes of *** addition,the IDLCCDC technique involves fuzzy filtering technique for noise removal ***,water wave optimization(WWO)based EfficientNet model is employed for feature extraction ***,chaotic glowworm swarm optimization(CGSO)based variational auto encoder(VAE)is applied for the classification of CC into benign or *** design of WWO and CGSO algorithms helps to increase the overall classification *** performance validation of the IDL-CCDC technique takes place using benchmark Warwick-QU dataset and the results portrayed the supremacy of the IDL-CCDC technique over the recent approaches with the maximum accuracy of 0.969.
The human brain is made up of millions of neurons, each of which plays a crucial part in directing the behaviour of the human body in response to internal/external motor-impulses. These neurons will act as data condui...
详细信息
Achieving household food security is the tumbling issue of the century. This article explores the factors affecting household food security and solutions by utilizing a synergy of statistical and mathematical models. ...
详细信息
Achieving household food security is the tumbling issue of the century. This article explores the factors affecting household food security and solutions by utilizing a synergy of statistical and mathematical models. The methodology section is divided into two portions namely sociological and mathematical methods. Sociologically, 379 household heads were interviewed through structured questions and further analyzed in terms of descriptive and binary logistic regression. The study found that 4 independent variables (poverty, poor governance, militancy, and social stratification) showed a significant association (P = 0.000) to explain variations in the dependent variable (household FS). The Omnibus test value (χ2= 102.386;P = 0.000) demonstrated that the test for the entire model against constant was statistically significant. Therefore, the set of predictor variables could better distinguish the variation in household FS. The Nagelkerke's R Square (R2 = .333) helps to interpret that the prediction variable and the group variables had a strong relationship. Moreover, 23% to 33% variation in FS was explained by the grouping variables (Cox and Snell R2 = 0.237 and Nagelkerke's R2 = 0.333). The significant value of Wald test results for each variable confirmed that the grouping variables (poor governance P = 0.004, militancy P = 0.000, social stratification P = 0.021 and poverty P = 0.000) significantly predicted FS at the household level. Mathematically, all the statistics were validated further through the application of spherical fuzzy mathematics (TOPIS and MADM) to explore what factors are affecting household FS. Thus, the study found that F3 (poverty) > F2 (militancy) > F4 (social stratification) > F1 (poor governance) respectively. Thus, it could be concluded from these findings that the prevalence of poverty dysfunctional all the channels of household FS at the macro and micro levels. Therefore, a sound and workable model to eradicate poverty in the study area by
Plagiarism is a rapidly rising issue among students during submission of assignments, reports and publications in universities and educational institutions, due to easy accessibility of abundant e-resources on the int...
详细信息
暂无评论