The objective of this research is to examine the use of feature selection and classification methods for distinguishing different types of brain *** brain tumor is characterized by an anomalous proliferation of brain c...
详细信息
The objective of this research is to examine the use of feature selection and classification methods for distinguishing different types of brain *** brain tumor is characterized by an anomalous proliferation of brain cells that can either be benign or *** tumors are misdiagnosed due to the variabil-ity and complexity of lesions,which reduces the survival rate in ***-sis of brain tumors via computer vision algorithms is a challenging *** and classification of brain tumors are currently one of the most essential surgical and pharmaceutical *** brain tumor identi-fication techniques require manual segmentation or handcrafted feature extraction that is error-prone and *** the proposed research work is mainly focused on medical image processing,which takes Magnetic Resonance Imaging(MRI)images as input and performs preprocessing,segmentation,fea-ture extraction,feature selection,similarity measurement,and classification steps for identifying brain ***,the medianfilter is practically applied to the input image to reduce the *** graph-cut segmentation technique is used to segment the tumor *** texture feature is extracted from the output of the segmented *** extracted feature is selected by using the Ant Colony Opti-mization(ACO)algorithm to improve the performance of the classifi*** prob-abilistic approach is used to solve computing *** Euclidean distance is used to calculate the degree of similarity for each extracted *** selected feature value is given to the Relevance Vector Machine(RVM)which is a multi-class classification ***,the tumor is classified as abnormal or *** experimental result reveals that the proposed RVM technique gives a better accuracy range of 98.87%when compared to the traditional Support Vector Machine(SVM)technique.
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
Retrieving legal texts is an important step for building a question answering system on law domain, which needs relevant articles to answer a query. Remarkable research has been done on legal information retrieval. Ho...
详细信息
With the rapid expansion of interactions across various domains such as knowledge graphs and social networks, anomaly detection in dynamic graphs has become increasingly critical for mitigating potential risks. Howeve...
详细信息
Nomadic Vehicular Cloud(NVC)is envisaged in this *** predo-minant aspects of NVC is,it moves along with the vehicle that initiates it and functions only with the resources of moving vehicles on the heavy traffic road ...
详细信息
Nomadic Vehicular Cloud(NVC)is envisaged in this *** predo-minant aspects of NVC is,it moves along with the vehicle that initiates it and functions only with the resources of moving vehicles on the heavy traffic road without relying on any of the static infrastructure and NVC decides the initiation time of container migration using cell transmission model(CTM).Containers are used in the place of Virtual Machines(VM),as containers’features are very apt to NVC’s dynamic *** specifications of 5G NR V2X PC5 interface are applied to NVC,for the feature of not relying on the network ***-days,the peak traffic on the road and the bottlenecks due to it are inevitable,which are seen here as the benefits for VC in terms of resource availability and residual in-network *** speed range of high-end vehicles poses the issue of dis-connectivity among VC participants,that results the container migration *** the entire VC participants are on the move,to maintain proximity of the containers hosted by them,estimating their movements plays a vital *** infer the vehicle movements on the road stretch and initiate the container migration prior enough to avoid the migration failure due to vehicles dynamicity,this paper proposes to apply the CTM to the container based and 5G NR V2X enabled *** simulation results show that there is a significant increase in the success rate of vehicular cloud in terms of successful container migrations.
This multi-center randomized controlled trial explores the therapeutic benefits of Indian classical music, specifically “Raga Therapy,” for managing diabetes, thyroid disorders, and hypertension—prevalent global he...
详细信息
Currently,e-learning is one of the most prevalent educational methods because of its need in today’s *** classrooms and web-based learning are becoming the new method of teaching *** students experience a lack of acc...
详细信息
Currently,e-learning is one of the most prevalent educational methods because of its need in today’s *** classrooms and web-based learning are becoming the new method of teaching *** students experience a lack of access to resources commonly the educational *** remote loca-tions,educational institutions face significant challenges in accessing various web-based materials due to bandwidth and network infrastructure *** objective of this study is to demonstrate an optimization and queueing tech-nique for allocating optimal servers and slots for users to access cloud-based e-learning *** proposed method provides the optimization and queue-ing algorithm for multi-server and multi-city constraints and considers where to locate the best *** optimal server selection,the Rider Optimization Algo-rithm(ROA)is utilized.A performance analysis based on time,memory and delay was carried out for the proposed methodology in comparison with the exist-ing *** proposed Rider Optimization Algorithm is compared to Par-ticle Swarm Optimization(PSO),Genetic Algorithm(GA)and Firefly Algorithm(FFA),the proposed method is more suitable and effective because the other three algorithms drop in local optima and are only suitable for small numbers of user *** the proposed method outweighs the conventional techniques by its enhanced performance over them.
To analyse the student’s academic performance, a new prediction model is developed. This proposed model collects the student’s data from standard online sources. At first, these gathered data are pre-processed by ce...
详细信息
The meta-heuristic algorithm is a global probabilistic search algorithm for the iterative *** has good performance in global optimization fields such as *** this paper,a new adaptive parameter strategy and a parallel ...
详细信息
The meta-heuristic algorithm is a global probabilistic search algorithm for the iterative *** has good performance in global optimization fields such as *** this paper,a new adaptive parameter strategy and a parallel communication strategy are proposed to further improve the Cuckoo Search(CS)*** strategy greatly improves the convergence speed and accuracy of the algorithm and strengthens the algorithm’s ability to jump out of the local *** paper compares the optimization performance of Parallel Adaptive Cuckoo Search(PACS)with CS,Parallel Cuckoo Search(PCS),Particle Swarm Optimization(PSO),Sine Cosine Algorithm(SCA),Grey Wolf Optimizer(GWO),Whale Optimization Algorithm(WOA),Differential Evolution(DE)and Artificial Bee Colony(ABC)algorithms by using the CEC-2013 test *** results show that PACS algorithmoutperforms other algorithms in 20 of 28 test *** to the superior performance of PACS algorithm,this paper uses it to solve the problem of the rectangular *** results show that this scheme has a significant effect,and the material utilization rate is improved from89.5%to 97.8%after optimization.
The rapid development of 5G/6G and AI enables an environment of Internet of Everything(IoE)which can support millions of connected mobile devices and applications to operate smoothly at high speed and low ***,these ma...
详细信息
The rapid development of 5G/6G and AI enables an environment of Internet of Everything(IoE)which can support millions of connected mobile devices and applications to operate smoothly at high speed and low ***,these massive devices will lead to explosive traffic growth,which in turn cause great burden for the data transmission and content *** challenge can be eased by sinking some critical content from cloud to *** this case,how to determine the critical content,where to sink and how to access the content correctly and efficiently become new *** work focuses on establishing a highly efficient content delivery framework in the IoE *** particular,the IoE environment is re-constructed as an end-edge-cloud collaborative system,in which the concept of digital twin is applied to promote the *** on the digital asset obtained by digital twin from end users,a content popularity prediction scheme is firstly proposed to decide the critical content by using the Temporal Pattern Attention(TPA)enabled Long Short-Term Memory(LSTM)***,the prediction results are input for the proposed caching scheme to decide where to sink the critical content by using the Reinforce Learning(RL)***,a collaborative routing scheme is proposed to determine the way to access the content with the objective of minimizing *** experimental results indicate that the proposed schemes outperform the state-of-the-art benchmarks in terms of the caching hit rate,the average throughput,the successful content delivery rate and the average routing overhead.
暂无评论