The art of information concealment has become a crucial subject since information security has grown to be a primary concern in the online world. Using cryptography and steganography plays a significant role in secure...
详细信息
A complex Laboratory Developed Test(LDT)is a clinical test developed within a single *** is typically configured from many fea-ture constraints from clinical repositories,which are part of the existing Lab-oratory Inf...
详细信息
A complex Laboratory Developed Test(LDT)is a clinical test developed within a single *** is typically configured from many fea-ture constraints from clinical repositories,which are part of the existing Lab-oratory Information Management System(LIMS).Although these clinical repositories are automated,support for managing patient information with test results of an LDT is also integrated within the existing ***,the support to configure LDTs design needs to be made available even in standard LIMS *** manual configuration of LDTs is a complex process and can generate configuration inconsistencies because many constraints between features can remain *** is a risky process and can lead patients to undergo unnecessary *** proposed an optimized solution(opt-LDT)based on Genetic Algorithms to automate the configuration and resolve the inconsistencies in ***-LDT encodes LDT configuration as an optimization problem and generates a consistent configuration that satisfies the constraints of the *** tested and validated opt-LDT for a local secondary care hospital in a real healthcare *** results,averaged over ten runs,show that opt-LDT resolves 90%of inconsistencies while taking between 6 and 6.5 s for each ***,positive feedback based on a subjective questionnaire from clinicians regarding the performance,acceptability,and efficiency of opt-LDT motivates us to present our results for regulatory approval.
In today's digital world, the integration of mobile device authentication has revolutionized the way we access services and applications. But, due to the growing amount of sensitive data that is stored in mobile d...
详细信息
An important advance towards more characteristic human-computer interaction is the automatic detection of human impact. Present-day developments entail the integration of physiological and audiovisual sensors to ident...
详细信息
CAPTCHAs, a stand-in for Fully Automated Public Turing Tests to Tell computers and Humans Apart, are an essential tool in internet security that can distinguish between automated bots and real people. Although success...
详细信息
Electronic communication is expanding quickly right now, and many new applications are following suit. This aided numerous enterprises in turning a profit in their corresponding industries. Online item bidding has bec...
详细信息
Online Signature Verification (OSV), as a personal identification technology, is widely used in various ***, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. Toadd...
详细信息
Online Signature Verification (OSV), as a personal identification technology, is widely used in various ***, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. Toaddress these issues, we propose a novel approach for online signature verification, using a one-dimensionalGhost-ACmix Residual Network (1D-ACGRNet), which is a Ghost-ACmix Residual Network that combines convolutionwith a self-attention mechanism and performs improvement by using Ghost method. The Ghost-ACmix Residualstructure is introduced to leverage both self-attention and convolution mechanisms for capturing global featureinformation and extracting local information, effectively complementing whole and local signature features andmitigating the problem of insufficient feature extraction. Then, the Ghost-based Convolution and Self-Attention(ACG) block is proposed to simplify the common parts between convolution and self-attention using the Ghostmodule and employ feature transformation to obtain intermediate features, thus reducing computational ***, feature selection is performed using the random forestmethod, and the data is dimensionally reducedusing Principal Component Analysis (PCA). Finally, tests are implemented on the MCYT-100 datasets and theSVC-2004 Task2 datasets, and the equal error rates (EERs) for small-sample training using five genuine andforged signatures are 3.07% and 4.17%, respectively. The EERs for training with ten genuine and forged signaturesare 0.91% and 2.12% on the respective datasets. The experimental results illustrate that the proposed approacheffectively enhances the accuracy of online signature verification.
In the digital age, the expansion of machine-generated content poses significant challenges to the integrity of online communications. This project addresses the critical issue of detecting fake tweets on Social netwo...
详细信息
The aim of this study was to develop a reliable model of text change between two writing systems. ""(meaning "Hello") can be transliterated into Latin alphabet as "namaste". To achieve th...
详细信息
The exponential growth of the metropolitan cities of the country has generated and magnified urban sprawl into the problematic proportions. Lack of the efficient traffic control and management has many a times lead to...
详细信息
暂无评论