The lungs CT scan is used to visualize the spread of the disease across the lungs to obtain better knowledge of the state of the COVID-19 *** diagnosing of COVID-19 disease is a complex challenge that medical system f...
详细信息
The lungs CT scan is used to visualize the spread of the disease across the lungs to obtain better knowledge of the state of the COVID-19 *** diagnosing of COVID-19 disease is a complex challenge that medical system face during the pandemic *** address this problem,this paper proposes a COVID-19 image enhancement based on Mittag-Leffler-Chebyshev polynomial as pre-processing step for COVID-19 detection and *** proposed approach comprises the MittagLeffler sum convoluted with Chebyshev *** idea for using the proposed image enhancement model is that it improves images with low graylevel changes by estimating the probability of each *** proposed image enhancement technique is tested on a variety of lungs computed tomography(CT)scan dataset of varying quality to demonstrate that it is robust and can resist significant quality *** blind/referenceless image spatial quality evaluator(BRISQUE),and the natural image quality evaluator(NIQE)measures for CT scans were 38.78,and 7.43 *** to the findings,the proposed image enhancement model produces the best image quality ***,this model considerably enhances the details of the given datasets,and it may be able to assist medical professionals in the diagnosing process.
This study addresses the critical aspect of data collection within Wireless Sensor Networks (WSNs), which consist of autonomous, compact sensor devices deployed to monitor environmental conditions. These networks have...
详细信息
This research proposes a hybrid approach for a procedural level generation for our 2D platformer game. The method integrates manual level creation and procedural algorithm to generate a complete level for 2D rouge-lik...
详细信息
Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocol...
详细信息
Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocols are proposed to secure public cloud computing. However, therapid development of high-speed internet and organizations’ race to developquantum computers is a nightmare for existing authentication schemes. Thesetraditional authentication protocols are based on factorization or discretelogarithm problems. As a result, traditional authentication protocols arevulnerable in the quantum computing era. Therefore, in this article, we haveproposed an authentication protocol based on the lattice technique for publiccloud computing to resist quantum attacks and prevent all known traditionalsecurity attacks. The proposed lattice-based authentication protocolis provably secure under the Real-Or-Random (ROR) model. At the sametime, the result obtained during the experiments proved that our protocol islightweight compared to the existing lattice-based authentication protocols,as listed in the performance analysis section. The comparative analysis showsthat the protocol is suitable for practical implementation in a quantum-basedenvironment.
This paper deals with the simulation calculation of transmission (S21) and reflection (S22) parameters in a material parametrically based on clay (brick). The electromagnetic parameters of the clay that are the subjec...
详细信息
Applications based on Wireless Sensor Networks(WSN)have shown to be quite useful in monitoring a particular geographic area of *** geometries of the surrounding environment are essential to establish a successful WSN ...
详细信息
Applications based on Wireless Sensor Networks(WSN)have shown to be quite useful in monitoring a particular geographic area of *** geometries of the surrounding environment are essential to establish a successful WSN *** it is literally hard because constructing a localization algorithm that tracks the exact location of Sensor Nodes(SN)in a WSN is always a challenging *** this research paper,Distance Matrix and Markov Chain(DM-MC)model is presented as node localization technique in which Distance Matrix and Estimation Matrix are used to identify the position of the *** method further employs a Markov Chain Model(MCM)for energy optimization and interference *** are performed against two well-known models,and the results demonstrate that the proposed algorithm improves performance by using less network resources when compared to the existing *** probability is used in the Markova chain to sustain higher energy ***,the proposed Distance Matrix and Markov Chain model decrease energy use by 31%and 25%,respectively,compared to the existing DV-Hop and CSA *** experimental results were performed against two proven models,Distance VectorHop Algorithm(DV-HopA)and Crow Search Algorithm(CSA),showing that the proposed DM-MC model outperforms both the existing models regarding localization accuracy and Energy Consumption(EC).These results add to the credibility of the proposed DC-MC model as a better model for employing node localization while establishing a WSN framework.
The emergence of 5G networks has enabled the deployment of a two-tier edge and vehicular-fog network. It comprises Multi-access Edge Computing (MEC) and Vehicular-Fogs (VFs), strategically positioned closer to Interne...
详细信息
This study conducts a bibliometric analysis of Natural Language Processing (NLP) within Human-computer Interaction (HCI) to identify trends, challenges, and future directions. Analyzing 1,710 SCOPUS-indexed documents ...
详细信息
Career site pages contain valuable information for job seekers, but effectively classifying these pages into relevant categories remains a challenge. This study aims to develop a classification system for career websi...
详细信息
The current study aims to implement a data sharing system that uses the blockchain to ensure data privacy and security-preserving during profile corresponding. The system also utilized a bloom filter to authenticate k...
详细信息
暂无评论