Efficiently quantifying renal structures can provide distinct spatial context and facilitate biomarker discovery for kidney morphology. However, the development and evaluation of transformer model to segment the renal...
详细信息
The learning methods used by teachers in schools in Serang City are very ineffective, especially during the pandemic. This is because not integrated content of material in one subject with other subjects. Never mind b...
详细信息
The remarkable flexibility and adaptability of generative adversarial networks (GANs) have led to the proliferation of its models in bioinformatics research. Proteomic and transcriptomic profiles have been shown to be...
详细信息
The background of this research is the difficulty faced when classifying the result of the assesment in the event Competition Appropriate Technology Tegal City. In this paper, the classification result of the assesmen...
详细信息
In this research study, we compare the predictive performance of two advanced deep learning-based models in order to provide a solution to TACE (Transarterial Chemoembolization) response prediction in HCC (Hepatocellu...
In this research study, we compare the predictive performance of two advanced deep learning-based models in order to provide a solution to TACE (Transarterial Chemoembolization) response prediction in HCC (Hepatocellular Carcinoma) patients. Using entire abdominal CT scans enabled a broader perspective available for the model, eliminating the need for segmentation during the preprocessing. Making use of both single-phase and multi-phase CT imaging, we have used DenseNet121 and have obtained an accuracy of 80% for the multi-phase *** Relevance: The ability to predict the effectiveness of TACE treatment prior to its administration makes it possible to provide a better decision-making aid for physicians and patients.
Campaign strategies are evolving because of developments in communication technologies. Campaign activities have become more attractive to the younger generation with the existence of social media. There is much resea...
Campaign strategies are evolving because of developments in communication technologies. Campaign activities have become more attractive to the younger generation with the existence of social media. There is much research related to campaigns, but it focuses on data collection and content. This research tries to look at it from the other side, namely from the perspective of the campaign team. How can teams improve performance and ensure that strategies are executed correctly? The analysis was carried out using process mining. The methodology used is the Project Mining Methodology, supported by data, identification, conformity checking, and quality improvement. The data used was taken from a Facebook group that was specifically created and operated during the 100 days of the official campaign. Interactions occurred with 2215 members with 975 active members, of which there were 357 posts, 8755 reactions, 1275 comments, and 280 shares. The results obtained from this process show weekly posting patterns and responses. Furthermore, we can see the involvement of key figures in the activities of the campaign group.
Internet Protocol version 6(IPv6)is the latest version of IP that goal to host 3.4×10^(38)unique IP addresses of devices in the ***6 has introduced new features like Neighbour Discovery Protocol(NDP)and Address A...
详细信息
Internet Protocol version 6(IPv6)is the latest version of IP that goal to host 3.4×10^(38)unique IP addresses of devices in the ***6 has introduced new features like Neighbour Discovery Protocol(NDP)and Address Auto-configuration ***6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol(ICMPv6).IPv6 is vulnerable to numerous attacks like Denial of Service(DoS)and Distributed Denial of Service(DDoS)which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial ***,an Intrusion Detection System(IDS)is a monitoring system of the security of a network that detects suspicious activities and deals with amassive amount of data comprised of repetitive and inappropriate features which affect the detection rate.A feature selection(FS)technique helps to reduce the computation time and complexity by selecting the optimum subset of *** paper proposes a method for detecting DDoS flooding attacks(FA)based on ICMPv6 messages using a Binary Flower PollinationAlgorithm(BFPA-FA).The proposed method(BFPA-FA)employs FS technology with a support vector machine(SVM)to identify the most relevant,influential ***,The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack *** results show that the proposed method BFPAFA achieved the best accuracy rate(97.96%)for the ICMPv6 DDoS detection with a reduced number of features(9)to half the total(19)*** proven proposed method BFPA-FAis effective in the ICMPv6 DDoS attacks via IDS.
Speech signals may provide important information for measuring and modelling human behaviour, especially for assessing mental health as well as estimating the emotional state of a person. Speaker's physiological a...
详细信息
A trie T is a rooted tree such that each edge is labeled by a single character from the alphabet, and the labels of out-going edges from the same node are mutually distinct. Given a trie T with n edges, we show how to...
详细信息
暂无评论