This article investigates machine learning techniques’ effectiveness at using computed tomography (CT) images to forecast breast cancer, hoping to expedite early identification and plan treatment. Drawing on many dif...
详细信息
Background: Chronic renal disease, often known as Chronic Kidney Disease (CKD), is an illness that causes a steady decline in kidney function. As per the World Health Organization survey, the incidence of CKD may incr...
详细信息
Effective or efficient management of e-waste is considered as preeminent vital challenges of the modern days. The massive scale of e-waste generated and dumped in open landfills or oceans without proper treatment pose...
详细信息
Orthogonal frequency-division multiplexing(OFDM) has been developed into a popular modulation scheme for wireless communication systems, used in applications such as LTE and 5 G. In wireless communication systems, non...
详细信息
Orthogonal frequency-division multiplexing(OFDM) has been developed into a popular modulation scheme for wireless communication systems, used in applications such as LTE and 5 G. In wireless communication systems, nonlinearity caused by radio frequency(RF)amplifiers will generate distortions to both passband and adjacent channels such that the transmission quality is degraded. The study of this article aims to predict the power spectrum for OFDM based signals at the output of an RF amplifier due to the nonlinearity. In this article,based on Taylor polynomial coefficients, a power spectrum expression for amplified OFDM signals in terms of intercept points(up to nth-order) is derived. This model is useful to RF engineers in choosing and testing RF amplifiers with appropriate specifications, such as intercept points and gain, to meet the requirements of wireless standards. Measurements are carried out to confirm the results of the proposed model.
An ultra-wideband (UWB) slotted compact Vivaldi antenna with a microstrip line feed was evaluated for microwave imaging (MI) applications. The recommended FR4 substrate-based Vivaldi antenna is 50×50×1.5 mm3...
详细信息
Deep learning has recently become a viable approach for classifying Alzheimer's disease(AD)in medical ***,existing models struggle to efficiently extract features from medical images and may squander additional in...
详细信息
Deep learning has recently become a viable approach for classifying Alzheimer's disease(AD)in medical ***,existing models struggle to efficiently extract features from medical images and may squander additional information resources for illness *** address these issues,a deep three‐dimensional convolutional neural network incorporating multi‐task learning and attention mechanisms is *** upgraded primary C3D network is utilised to create rougher low‐level feature *** introduces a new convolution block that focuses on the structural aspects of the magnetORCID:ic resonance imaging image and another block that extracts attention weights unique to certain pixel positions in the feature map and multiplies them with the feature map ***,several fully connected layers are used to achieve multi‐task learning,generating three outputs,including the primary classification *** other two outputs employ backpropagation during training to improve the primary classification *** findings show that the authors’proposed method outperforms current approaches for classifying AD,achieving enhanced classification accuracy and other in-dicators on the Alzheimer's disease Neuroimaging Initiative *** authors demonstrate promise for future disease classification studies.
Digital microfluidic biochip provides an alternative platform to synthesize the biochemical protocols. Droplet routing in biochemical synthesis involves moving multiple droplets across the biochip simultaneously. It i...
详细信息
With the invention of Internet-enabled devices,cloud and blockchain-based technologies,an online voting system can smoothly carry out election *** pandemic situations,citizens tend to develop panic about mass gatherin...
详细信息
With the invention of Internet-enabled devices,cloud and blockchain-based technologies,an online voting system can smoothly carry out election *** pandemic situations,citizens tend to develop panic about mass gatherings,which may influence the decrease in the number of *** urges a reliable,flexible,transparent,secure,and cost-effective voting *** proposed online voting system using cloud-based hybrid blockchain technology eradicates the flaws that persist in the existing voting system,and it is carried out in three phases:the registration phase,vote casting phase and vote counting phase.A timestamp-based authentication protocol with digital signature validates voters and candidates during the registration and vote casting *** smart contracts,third-party interventions are eliminated,and the transactions are secured in the blockchain ***,to provide accurate voting results,the practical Byzantine fault tolerance(PBFT)consensus mechanism is adopted to ensure that the vote has not been modified or ***,the overall performance of the proposed system is significantly better than that of the existing *** performance was analyzed based on authentication delay,vote alteration,response time,and latency.
Various systems were developed to assist those with vision impairments and enhance their standard of life. Regrettably, the majority of these systems have restricted functionality. We decided to build a model that det...
详细信息
The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data *** generated data is collected and shared using edge-based IoT structures at a considerably high ***,the data-s...
详细信息
The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data *** generated data is collected and shared using edge-based IoT structures at a considerably high ***,the data-sharing privacy exposure issue is increasingly intimidating when IoT devices make malicious requests for filching sensitive information from a cloud storage system through edge *** address the identified issue,we present evolutionary privacy preservation learning strategies for an edge computing-based IoT data sharing *** particular,we introduce evolutionary game theory and construct a payoff matrix to symbolize intercommunication between IoT devices and edge nodes,where IoT devices and edge nodes are two parties of the *** devices may make malicious requests to achieve their goals of stealing ***,edge nodes should deny malicious IoT device requests to prevent IoT data from being *** dynamically adjust their own strategies according to the opponent's strategy and finally maximize the *** upon a developed application framework to illustrate the concrete data sharing architecture,a novel algorithm is proposed that can derive the optimal evolutionary learning ***,we numerically simulate evolutionarily stable strategies,and the final results experimentally verify the correctness of the IoT data sharing privacy preservation ***,the proposed model can effectively defeat malicious invasion and protect sensitive information from leaking when IoT data is shared.
暂无评论