A keystroke dynamics is a simple example of a biometric authentication by using a typing rhythm on a keyboard without any special device. Previous research used Euclidean distance to distinguish between an authentic u...
详细信息
Skin cancer is one of the leading causes of death worldwide. Malignant melanoma is the most lethal form of skin cancer which can spread to other areas of the body. Although it is rare, still 75% of skin cancer deaths ...
详细信息
A chest radiology scan can significantly aid the early diagnosis and management of COVID-19 since the virus attacks the *** X-ray(CXR)gained much interest after the COVID-19 outbreak thanks to its rapid imaging time,w...
详细信息
A chest radiology scan can significantly aid the early diagnosis and management of COVID-19 since the virus attacks the *** X-ray(CXR)gained much interest after the COVID-19 outbreak thanks to its rapid imaging time,widespread availability,low cost,and *** radiological investigations,computer-aided diagnostic tools are implemented to reduce intra-and inter-observer *** lately industrialized Artificial Intelligence(AI)algorithms and radiological techniques to diagnose and classify disease is *** current study develops an automatic identification and classification model for CXR pictures using Gaussian Fil-tering based Optimized Synergic Deep Learning using Remora Optimization Algorithm(GF-OSDL-ROA).This method is inclusive of preprocessing and classification based on *** data is preprocessed using Gaussian filtering(GF)to remove any extraneous noise from the image’s ***,the OSDL model is applied to classify the CXRs under different severity levels based on CXR *** learning rate of OSDL is optimized with the help of ROA for COVID-19 diagnosis showing the novelty of the *** model,applied in this study,was validated using the COVID-19 *** experiments were conducted upon the proposed OSDL model,which achieved a classification accuracy of 99.83%,while the current Convolutional Neural Network achieved less classification accuracy,i.e.,98.14%.
In 2020, COVID-19 was a great pandemic that affected the entire world. Millions of people across the world died and businesses were affected. Several individuals have had to spend very heavy medical bills or lose thei...
详细信息
Accessing wireless services is convenient but not secure. The issue of privacy and security is highly demanded on the internet. The information is sent with the undesired threats of eavesdroppers. Secure communication...
详细信息
Live video streaming is one of the newly emerged services over the Internet that has attracted immense interest of the service *** Internet was not designed for such services during its inception,such a service poses ...
详细信息
Live video streaming is one of the newly emerged services over the Internet that has attracted immense interest of the service *** Internet was not designed for such services during its inception,such a service poses some serious challenges including cost and ***-to-Peer(P2P)Internet Protocol Television(IPTV)is an application-level distributed paradigm to offer live video *** terms of ease of deployment,it has emerged as a serious alternative to client server,Content Delivery Network(CDN)and IP multicast ***,P2P approach has struggled to provide the desired streaming quality due to a number of *** of peers in a network is one of themajor issues among *** of the existing approaches address this issue through older-stable *** paper first extensively investigates the older-stable principle to observe its validity in different *** is observed that the older-stable principle does not hold in several of ***,it utilizes machine learning approach to predict the stability of *** work evaluates the accuracy of severalmachine learning algorithms over the prediction of stability,where the Gradient Boosting Regressor(GBR)out-performs other ***,this work presents a proof-of-concept simulation to compare the effectiveness of older-stable rule and machine learning-based predictions for the stabilization of the *** results indicate that machine learning-based stability estimation significantly improves the system.
Faba bean (Vicia faba L.) is an important cash crop for animal and human consumption in many countries, especially Ethiopia due to its high protein content and high rate of production. It also improves soil fertility ...
详细信息
This study aimed to create a mobile application to promote and guide the cultural tourism attraction Phra That Nine Choms in Chiang Rai Province, Thailand. The critical information about Phra That Nine Choms is gather...
详细信息
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task *** this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from on...
详细信息
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task *** this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from one party to *** authentication works via OpenID,Kerberos,password authentication protocols,***,there are still some limitations present in the reported security *** this paper,the presented anticipated strategy secures both Web-based attacks by leveraging encoded emails and a novel password form pattern *** proposed OpenID-based encrypted Email’s Authentication,Authorization,and Accounting(EAAA)protocol ensure security by relying on the email authenticity and a Special Secret Encrypted Alphanumeric String(SSEAS).This string is deployed on both the relying party and the email server,which is unique and *** first authentication,OpenID Uniform Resource Locator(URL)identity,is performed on the identity provider side.A second authentication is carried out by the hidden Email’s server side and receives a third authentication *** Email’s third SSEAS authentication link manages on the relying party(RP).Compared to existing cryptographic single sign-on protocols,the EAAA protocol ensures that an OpenID URL’s identity is secured from MITM and phishing *** study manages two attacks such as MITM and phishing attacks and gives 339 ms response time which is higher than the already reported methods,such as Single Sign-On(SSO)and *** experimental sites were examined by 72 informationtechnology(IT)specialists,who found that 88.89%of respondents successfully validated the user authorization provided to them via *** proposed EAAA protocol minimizes the higher-level risk of MITM and phishing attacks in an OpenID-based atmosphere.
Metasurface-based holograms,or metaholograms,offer unique advantages including enhanced imaging quality,expanded field of view,compact system size,and broad operational ***-channel metaholograms,capable of switching b...
详细信息
Metasurface-based holograms,or metaholograms,offer unique advantages including enhanced imaging quality,expanded field of view,compact system size,and broad operational ***-channel metaholograms,capable of switching between multiple projected images based on the properties of illuminating light such as state of polarization and angle of incidence,have emerged as a promising solution for realizing switchable and dynamic holographic ***,existing designs typically grapple with challenges such as limited multiplexing channels and unwanted crosstalk,which severely constrain their practical ***,we present a new type of waveguidebased multi-channel metaholograms,which support six independent and fully crosstalk-free holographic display channels,simultaneously multiplexed by the spin and angle of guided incident light within the glass *** employ a k-space translation strategy that allows each of the six distinct target images to be selectively translated from evanescent-wave region to the center of propagation-wave region and projected into free space without crosstalk,when the metahologram is under illumination of a guided light with specific spin and azimuthal *** addition,by tailoring the encoded target images,we implement a three-channel polarization-independent metahologram and a two-channel full-color(RGB)***,the number of multiplexing channels can be further increased by expanding the k-space’s central-period region or combing the k-space translation strategy with other multiplexing techniques such as orbital angular momentum *** work provides a novel approach towards realization of high-performance and compact holographic optical elements with substantial information capacity,opening avenues for applications in AR/VR displays,image encryption,and information storage.
暂无评论