The state-of-the-art InterLabs Web-lecturing tool has been designed, developed, and tested at the Department of computer Science and informationsystems and the InterLabs Research Institute, Bradley University, Peoria...
详细信息
The state-of-the-art InterLabs Web-lecturing tool has been designed, developed, and tested at the Department of computer Science and informationsystems and the InterLabs Research Institute, Bradley University, Peoria, Illinois as a part of a National Science Foundation grant. It is based on active utilization of innovative Web-based software engineering, portal, multiagent, streaming multimedia, communication, teaching, learning and information technologies. The introductory "computerinformationsystems" CIS102 course is a required course for all freshman students with major in either engineering, business, science or education areas. As a result, the innovative Web-based CIS102 course was aimed to (1) provide students of various major areas with highest-possible learning convenience, and (2) meet different requirements for CIS102 course of various Bradley departments. The new CIS102 online course was designed and developed by faculty of the computer Science and informationsystems department in cooperation with faculty from other Bradley colleges. Student formative and summative evaluations and academic performance clearly demonstrate the advantages of the innovative online teaching and learning technologies based on the InterLabs Web-lecturing tool.
Recently, blockchain technology has attracted a lot of interest from different researchers and academics due to its unique properties like immutability, interoperability, and confidentiality. However, to date, their a...
详细信息
Osteosarcomas are malignant neoplasms derived from undifferentiated osteogenic mesenchymal cells. It causes severe and permanent damage to human tissue and has a high mortality rate. The condition has the capacity to ...
详细信息
Osteosarcomas are malignant neoplasms derived from undifferentiated osteogenic mesenchymal cells. It causes severe and permanent damage to human tissue and has a high mortality rate. The condition has the capacity to occur in any bone;however, it often impacts long bones like the arms and legs. Prompt identification and prompt intervention are essential for augmenting patient longevity. However, the intricate composition and erratic placement of osteosarcoma provide difficulties for clinicians in accurately determining the scope of the afflicted area. There is a pressing requirement for developing an algorithm that can automatically detect bone tumors with tremendous accuracy. Therefore, in this study, we proposed a novel feature extractor framework associated with a supervised three-class XGBoost algorithm for the detection of osteosarcoma in whole slide histopathology images. This method allows for quicker and more effective data analysis. The first step involves preprocessing the imbalanced histopathology dataset, followed by augmentation and balancing utilizing two techniques: SMOTE and ADASYN. Next, a unique feature extraction framework is used to extract features, which are then inputted into the supervised three-class XGBoost algorithm for classification into three categories: non-tumor, viable tumor, and non-viable tumor. The experimental findings indicate that the proposed model exhibits superior efficiency, accuracy, and a more lightweight design in comparison to other current models for osteosarcoma detection.
Lower limb rehabilitation robots can help to improve the locomotor capabilities of patients experiencing gait impairments and help medical workers by reducing strain on them. However, since commercially available exos...
详细信息
This paper explores using large language models (LLM) for automatic and source-to-source programming across various cross-platform languages and libraries, including generating CUDA code for high performance computing...
详细信息
Digital Transformation (DT) has become a strategic imperative for Small and Medium Enterprise (SME) banks, including for Bank Perekonomian Rakyat (BPRBCo) in Indonesia, which often face constraints in infrastructure, ...
详细信息
The utilization of Data-Driven Machine Learning (DDML) models in the healthcare sector poses unique challenges due to the crucial nature of clinical decision-making and its impact on patient outcomes. A primary concer...
详细信息
Having become so present and accessible, artificial light has been forgotten in the same way as the air we breathe. It is obvious and is only noticed by its often-exceptional absence. Its omnipresence is such that it ...
详细信息
Having become so present and accessible, artificial light has been forgotten in the same way as the air we breathe. It is obvious and is only noticed by its often-exceptional absence. Its omnipresence is such that it goes to excess, resulting in light pollution;environmental impacts;impacts on fauna and flora;and, even more serious, impacts on human health. But it has also been an essential driving force in the evolution of humanity. From the first traces of the mastery of fire as a light source up to the "electronic" light of LEDs, we will travel through more than 500,000 years of history of lighting technologies and more particularly focus on the last 150 years, which have ended with the LED revolution.
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
The high mobility of uncrewed aerial vehicles (UAVs) has led to their usage in various computer vision applications, notably in intelligent traffic surveillance, where it enhances productivity and simplifies the proce...
详细信息
暂无评论