When compared to different types of malignant tumors, pancreatic malignancy is the 12th widespread tumor disease among humans globally. Pancreatic cancer can be identified at the earlier stages using microarray gene a...
详细信息
Fog extends the cloud to be closer to the end devices so that it acts on IoT data within a millisecond. Almost 60% of data can be analyzed that is physically near to the IoT data. This proximity has various advantages...
详细信息
This study examines the accuracy and ethical implications of using convolutional neural networks (CNN) for automated crime detection. A CNN model was trained on a dataset of criminal mugshots to identify potential cri...
详细信息
Breast cancer is found in the present generation at a higher level. Since the middle of the 20th century numerous unfavorable changes have been made to food, our way of life, obesity, the situation, and our microbiome...
详细信息
The increasing frequency of network attacks poses a significant challenge in maintaining network security. In response to security vulnerabilities, the employment of Intrusion Detection systems (IDS) has become crucia...
详细信息
Automatic skin lesion subtyping is a crucial step for diagnosing and treating skin cancer and acts as a first level diagnostic aid for medical experts. Although, in general, deep learning is very effective in image pr...
详细信息
Automatic skin lesion subtyping is a crucial step for diagnosing and treating skin cancer and acts as a first level diagnostic aid for medical experts. Although, in general, deep learning is very effective in image processing tasks, there are notable areas of the processing pipeline in the dermoscopic image regime that can benefit from refinement. Our work identifies two such areas for improvement. First, most benchmark dermoscopic datasets for skin cancers and lesions are highly imbalanced due to the relative rarity and commonality in the occurrence of specific lesion types. Deep learning methods tend to exhibit biased performance in favor of the majority classes with such datasets, leading to poor generalization. Second, dermoscopic images can be associated with irrelevant information in the form of skin color, hair, veins, etc.;hence, limiting the information available to a neural network by retaining only relevant portions of an input image has been successful in prompting the network towards learning task-relevant features and thereby improving its performance. Hence, this research work augments the skin lesion characterization pipeline in the following ways. First, it balances the dataset to overcome sample size biases. Two balancing methods, synthetic minority oversampling TEchnique (SMOTE) and Reweighting, are applied, compared, and analyzed. Second, a lesion segmentation stage is introduced before classification, in addition to a preprocessing stage, to retain only the region of interest. A baseline segmentation approach based on Bi-Directional ConvLSTM U-Net is improved using conditional adversarial training for enhanced segmentation performance. Finally, the classification stage is implemented using EfficientNets, where the B2 variant is used to benchmark and choose between the balancing and segmentation techniques, and the architecture is then scaled through to B7 to analyze the performance boost in lesion classification. From these experiments, we find
This study offers a novel approach to tackling the increasing problem of workplace stress by utilizing machine learning techniques. Professionals in modern work contexts experience heightened levels of stress due to d...
详细信息
Biometrics,which has become integrated with our daily lives,could fall prey to falsification attacks,leading to security *** our paper,we use Transient Evoked Otoacoustic Emissions(TEOAE)that are generated by the huma...
详细信息
Biometrics,which has become integrated with our daily lives,could fall prey to falsification attacks,leading to security *** our paper,we use Transient Evoked Otoacoustic Emissions(TEOAE)that are generated by the human cochlea in response to an external sound stimulus,as a biometric *** are robust to falsification attacks,as the uniqueness of an individual’s inner ear cannot be *** this study,we use both the raw 1D TEOAE signals,as well as the 2D time-frequency representation of the signal using Continuous Wavelet Transform(CWT).We use 1D and 2D Convolutional Neural Networks(CNN)for the former and latter,respectively,to derive the feature *** corresponding lower-dimensional feature maps are obtained using principal component analysis,which is then used as features to build classifiers using machine learning techniques for the task of person identification.T-SNE plots of these feature maps show that they discriminate well among the *** the various architectures explored,we achieve a best-performing accuracy of 98.95%and 100%using the feature maps of the 1D-CNN and 2D-CNN,respectively,with the latter performance being an improvement over all the earlier *** performance makes the TEOAE based person identification systems deployable in real-world situations,along with the added advantage of robustness to falsification attacks.
COVID-19 is a highly infectious respiratory illness caused by the novel coronavirus. It was first identified in Wuhan, China in December 2019 and has since spread globally, infecting and killing a vast number of peopl...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
暂无评论