Nowadays,the security of images or information is very *** paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image ***,the secret medical image is encrypted using Advanced...
详细信息
Nowadays,the security of images or information is very *** paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image ***,the secret medical image is encrypted using Advanced Encryption Standard(AES)***,the secret report of the patient is embedded into the encrypted secret medical image with the Least Significant Bit(LSB)watermarking *** that,the encrypted secret medical image with the secret report is concealed in a cover medical image,using Kekre’s Median Codebook Generation(KMCG)***,the stego-image obtained is split into 16 ***,it is sent to the *** adopt this strategy to send the secret medical image and report over a network *** proposed technique is assessed with different encryption quality metrics including Peak Signal-to-Noise Ratio(PSNR),Correlation Coefficient(Cr),Fea-ture Similarity Index Metric(FSIM),and Structural Similarity Index Metric(SSIM).Histogram estimation is used to confirm the matching between the secret medical image before and after *** results demonstrate that the proposed technique achieves good performance with high quality of the received medical image and clear image details in a very short processing time.
Enumerating virus particles (VPs) at different stages of the wastewater treatment process or along the distribution network is essential for ensuring high performance and reducing public health risks. Herein, we aimed...
详细信息
Wind energy is attractive into a highly valuable energy source. To meet the grid connections criteria in light of the growing penetration of wind power, changes are needed. The purpose of this chapter is to learn how ...
详细信息
The chest radiograph has been one of the most frequently performed radiological investigation *** clinical medicine,the chest radiograph can provide technical basis and scientific instruction to recognize a series of ...
详细信息
The chest radiograph has been one of the most frequently performed radiological investigation *** clinical medicine,the chest radiograph can provide technical basis and scientific instruction to recognize a series of thoracic diseases(such as Atelectasis,Nodule,and Pneumonia,etc.).Importantly,it is of paramount importance for clinical screening,diagnosis,treatment planning,and efficacy ***,it remains challenging for automated chest radiograph diagnosis and interpretation at the level of an experienced *** recent years,many studies on biomedical image processing have advanced rapidly with the development of artificial intelligence especially deep learning techniques and *** to build an efficient and accurate deep learning model for automatic chest radiograph processing is an important scientific problem that needs to be solved.
Software-defined networking(SDN)is a new paradigm that promises to change by breaking vertical integration,decoupling network control logic from the underlying routers and switches,promoting(logical)network control ce...
详细信息
Software-defined networking(SDN)is a new paradigm that promises to change by breaking vertical integration,decoupling network control logic from the underlying routers and switches,promoting(logical)network control centralization,and introducing network ***,the controller is similarly vulnerable to a“single point of failure”,an attacker can execute a distributed denial of service(DDoS)attack that invalidates the controller and compromises the network security in *** address the problem of DDoS traffic detection in SDN,a novel detection approach based on information entropy and deep neural network(DNN)is *** approach contains a DNN-based DDoS traffic detection module and an information-based entropy initial inspection *** initial inspection module detects the suspicious network traffic by computing the information entropy value of the data packet’s source and destination Internet Protocol(IP)addresses,and then identifies it using the DDoS detection module based on *** assaults were found when suspected irregular traffic was *** reveal that the algorithm recognizes DDoS activity at a rate of more than 99%,with a much better accuracy *** false alarm rate(FAR)is much lower than that of the information entropy-based detection ***,the proposed framework can shorten the detection time and improve the resource utilization efficiency.
In past two decades, the popularity and use of autonomous vehicles and driver assistance systems has accelerated due to the advancement in artificial intelligence techniques, big data analysis, machine learning, compu...
详细信息
Mobile devices (MDs) cannot fully run all computation/delay-sensitive tasks due to their limited computing resources. Mobile edge computing (MEC) meets the demand by providing massive resources for MDs and offloading ...
详细信息
作者:
Chen, HaopengFang, ZaojunZhong, CaimingNingbo University
Ningbo Institute of Materials & Technology Engineering Chinese & Academy of Sciences Faculty of Electrical Engineering and Computer Science Ningbo China Chinese & Academy of Sciences
Zhejiang Key Laboratory of Robotics and Intelligent Manufacturing Equipment Technology Ningbo Institute of Materials & Technology Engineering Ningbo China Ningbo University
College of Science & Technology Ningbo China
Aiming at the scheduling problem in the production process of hybrid flow-shop, a hybrid flow-shop scheduling model with the objective of minimizing the makespan is established, and a neighborhood search adaptive gene...
详细信息
The fast growth of business, science, and technology has ushered in the age of artificial intelligence, which has had far-reaching effects in every sphere of human existence. This article explains how AI may be used t...
详细信息
Oropharyngeal carcinoma is one of the prevalent forms of abnormal cancer. Detecting cancer at an early stage and getting proper treatment is the only way to reduce the mortality rate. The key intention of this work is...
详细信息
暂无评论