In a digital landscape demanding cost-effective yet robust data storage solutions, Portable Storage Area Network (SAN) became an affordable alternative for data storage systems. A portable SAN system using the Raspber...
详细信息
作者:
Sheneamer, AbdullahJazan University
Faculty of Computer Science & Information Technology Computer Science Department Jazan45142 Saudi Arabia
A brain tumour is a mass or uncontrolled growth of abnormal cells in the brain. tumours have different types and characteristics and have different treatments. Some tumours are noncancerous (benign tumours), some tumo...
详细信息
Kidney disease is a significant global health issue affecting millions, with various abnormalities, such as stones and cysts, that are often preventable or curable. However, these conditions can progress to more sever...
详细信息
Coronavirus(COVID-19)outbreak was first identified in Wuhan,China in December *** was tagged as a pandemic soon by the WHO being a serious public medical *** spite of the fact that the virus can be diagnosed by qRT-PC...
详细信息
Coronavirus(COVID-19)outbreak was first identified in Wuhan,China in December *** was tagged as a pandemic soon by the WHO being a serious public medical *** spite of the fact that the virus can be diagnosed by qRT-PCR,COVID-19 patients who are affected with pneumonia and other severe complications can only be diagnosed with the help of Chest X-Ray(CXR)and Computed Tomography(CT)*** this paper,the researchers propose to detect the presence of COVID-19 through images using Best deep learning model with various *** features like Speeded-Up Robust Features(SURF),Features from Accelerated Segment Test(FAST)and Scale-Invariant Feature Transform(SIFT)are used in the test images to detect the presence of *** optimal features are extracted from the images utilizing DeVGGCovNet(Deep optimal VGG16)model through optimal learning *** task is accomplished by exceptional mating conduct of Black Widow *** this strategy,cannibalism is *** this phase,fitness outcomes are rejected and are not satisfied by the proposed *** results acquired from real case analysis demonstrate the viability of DeVGGCovNet technique in settling true issues using obscure and testing ***16 model identifies the imagewhich has a place with which it is dependent on the distinctions in *** impact of the distinctions on labels during training stage is studied and predicted for test *** proposed model was compared with existing state-of-the-art models and the results from the proposed model for disarray grid estimates like Sen,Spec,Accuracy and F1 score were promising.
The use of assistive technology in the field of education is now a common practice in today's tech-driven era. The implementation is quite rampant in all levels and sections of education, including by special need...
详细信息
Web services are provided as reusable software components in the services-oriented *** complicated composite services can be combined from these components to satisfy the user requirements represented as a workflow wi...
详细信息
Web services are provided as reusable software components in the services-oriented *** complicated composite services can be combined from these components to satisfy the user requirements represented as a workflow with specified Quality of Service(QoS)*** workflow consists of tasks where many services can be considered for each *** for optimal services combination and optimizing the overall QoS limitations is a Non-deterministic Polynomial(NP)-hard *** work focuses on the Web Service Composition(WSC)problem and proposes a new service composition algorithm based on the micro-bats behavior while hunting the *** proposed algorithm determines the optimal combination of the web services to satisfy the complex user *** also addresses the Bat Algorithm(BA)shortcomings,such as the tradeoff among exploration and exploitation searching mechanisms,local optima,and convergence *** proposed enhancement includes a developed cooperative and adaptive population initialization *** elitist mechanism is utilized to address the BA convergence *** tradeoff between exploration and exploitation is handled through a neighborhood search *** benchmark datasets are selected to evaluate the proposed bat algorithm’s *** simulation results are estimated using the average fitness value,the standard deviation of the fitness value,and an average of the execution time and compared with four bat-inspired *** is observed from the simulation results that introduced enhancement obtains significant results.
The use of covert communications has become more widespread recently as a solution to the information security issue. information security can be partially solved by the discovery and creation of covert routes. Covert...
详细信息
Efficient highway lighting is crucial for ensuring road safety and reducing energy consumption and costs. Traditional highway lighting systems rely on timers or simple photosensors, leading to inefficient operation by...
详细信息
Unstructured Numerical Image Dataset Separation (UNIDS) method employing an enhanced unsupervised clustering technique. The objective is to delineate an optimal number of distinct groups within the input grayscale (G-...
详细信息
The immense volume of data generated and collected by smart devices has significantly enhanced various aspects of our daily lives. However, safeguarding the sensitive information shared among these devices is crucial....
详细信息
暂无评论