The necessity of a blueprint of a building structure is a mandatory requirement for any reconnaissance or rescue operations. In our project, we build a modular system combining sensors related to sonar, laser, micro-w...
详细信息
Automated segmentation of brain tumors using Magnetic Resonance Imaging(MRI)data is critical in the analysis and monitoring of disease *** a result,gliomas are aggressive and diverse tumors that may be split into intr...
详细信息
Automated segmentation of brain tumors using Magnetic Resonance Imaging(MRI)data is critical in the analysis and monitoring of disease *** a result,gliomas are aggressive and diverse tumors that may be split into intra-tumoral groups by using effective and accurate segmentation *** is intended to extract characteristics from an image using the Gray Level Co-occurrence(GLC)matrix feature extraction method described in the proposed *** Convolutional Neural Networks(CNNs),which are commonly used in biomedical image segmentation,CNNs have significantly improved the precision of the state-of-the-art segmentation of a brain *** two segmentation networks,a U-Net and a 3D CNN,we present a major yet easy combinative technique that results in improved and more precise *** U-Net and 3D CNN are used together in this study to get better and more accurate estimates of what is going *** the dataset,two models were developed and assessed to provide segmentation maps that differed fundamentally in terms of the segmented tumour ***,the estimates was made by two separate models that were put together to produce the final *** comparison to current state-of-the-art designs,the precision(percentage)was 98.35,98.5,and 99.4 on the validation set for tumor core,enhanced tumor,and whole tumor,respectively.
It is quite common for medical drugs and prescriptions to be misidentified by hospitals and after drugs are being dispensed to the patients. Misidentification of medical drugs is more common among elderly and visually...
详细信息
In a network design, the control plane and the data plane are separated by the architectural concept of software defined networking (SDN). A centralised controller that serves as the only point of control for the whol...
详细信息
In cipher algorithms,the encryption and decryption are based on the same *** are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwis...
详细信息
In cipher algorithms,the encryption and decryption are based on the same *** are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes *** paper aims to improve the said limitations by designing of Triple key security algorithm(TKS)in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and *** plaintext character is substituted by an alternative *** mode of substitution is transformed cyclically which depends on the current position of the modified *** keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR(XOR)of the 1st *** study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the *** utilization of the TKS algorithm,the decryption is illustrated,and security is analyzed in detail with mathematical examples.
We study the problem of dispatching jobs to multiple FCFS (First-Come, First-Served) queues. We consider the case where the dispatcher is size-aware, meaning it learns the size (i.e. service time) of each job as it ar...
详细信息
A host-switch graph was originally proposed as a graph that represents a network topology of a computersystems with 1-port host computers and (Formula presented.) -port switches. It has been studied from both theoret...
详细信息
To enhance the privacy of messages in Internet of Vehicles (IoVs), it is critical to preserve the communication security between Road Side Unit (RSU) and numerous vehicles. The primitive of signcryption is introduced ...
详细信息
To enhance the privacy of messages in Internet of Vehicles (IoVs), it is critical to preserve the communication security between Road Side Unit (RSU) and numerous vehicles. The primitive of signcryption is introduced to guarantee the confidentiality, integrity and unforgeability of transmitted messages. Nevertheless, the existing signcryption schemes fail to achieve a balance between security and efficiency. In this paper, we construct a Chinese remainder theorem (CRT) empowered certificateless aggregate signcryption scheme with key agreement (CASKA-CRT). As the vehicle joins and leaves dynamically, the proposed scheme can ensure the dynamic security via one modulo division operation. Besides, the certificateless aggregate signcryption and key agreement mechanisms are embedded. The former idea can both address the certificate management and key escrow problems, while the latter technology can create authentication as a premise of secure communication. Based on this construction, the hash-to-group operation and bilinear pairing are avoided, to realize a faster verification with the increased number of messages. Moreover, the security of proposed scheme is proved under the random oracle model. Finally, the performance analysis demonstrates the advantage of CASKA-CRT in terms of security and reliability over related works. IEEE
Lip Reading AI is a discipline that is rapidly changing and has numerous applications in security, accessibility and human-computer interaction. This paper proposes a model which combines Convolutional Neural Networks...
Lip Reading AI is a discipline that is rapidly changing and has numerous applications in security, accessibility and human-computer interaction. This paper proposes a model which combines Convolutional Neural Networks (CNNs) to capture spatial capabilities, Long Short-Term Memory (LSTM) networks to examine temporal dependencies, and an adaptive interest mechanism. Meticulous preprocessing of the MIRACL VC-l dataset addressing challenges including one of a kind lip moves and occlusions accompanied with the aid of transitioning this study effortlessly to LRS2 dataset to complement lexemic versatility is one of its key function. The effects verify its robustness throughout unique datasets with superior overall performance towards cutting-edge techniques. Ablation checks suggest the crucial significance of every element in phrases of improving lip analyzing accuracy. Our proposed model version additionally suggests flexibility in restricted and naturalistic language situations.
Advanced techniques in medical image segmentation often leverage deep learning methodologies. UNet and its variants plays a major role in image segmentation of medical images. UNet based networks have so many limitati...
详细信息
暂无评论