Purpose: Diffeomorphic image registration is essential in many medical imaging applications. Several registration algorithms of such type have been proposed, but primarily for intra-contrast alignment. Currently, effi...
详细信息
A kind of deadly skin tumor called melanoma is arguably very lethal since it accounts for the majority of skin cancer fatalities. Melanomas are often brown or black in color because melanocyte cells, which produce mel...
详细信息
A kind of deadly skin tumor called melanoma is arguably very lethal since it accounts for the majority of skin cancer fatalities. Melanomas are often brown or black in color because melanocyte cells, which produce melanin, are the source of the disease. The DNA of skin cells is damaged by UV light, which is the main cause of melanomas. The analysis of the dermoscopy examination’s findings and comparison with medical sciences are frequently used in the manual diagnosis of melanoma cancer. Human subjectivity has a strong impact on manual detection, which renders it unreliable in some circumstances. In order to classify the outcomes of the dermoscopy test and to determine the results more precisely with a comparatively shorter amount of time, computer-assisted technology is required. Problem statement, planning, execution, and testing are the first steps in the creation of this application. To identify picture data, the research study combines deep machine learning approach using Convolutional Neural Network technique along with LeNet-5 architectural model. With a variable number of training and testing epochs and 44 photos from the training results, the experiment with the best success rate (93% in training and 100% in testing) required 176 images and 100 epochs of training data. programming language such as Python with utilization of Keras library, which serves as the Tensorflow back-end, were used to construct this application.
Artificial intelligence(AI)and machine learning(ML)help in making predictions and businesses to make key decisions that are beneficial for *** the case of the online shopping business,it’s very important to find tren...
详细信息
Artificial intelligence(AI)and machine learning(ML)help in making predictions and businesses to make key decisions that are beneficial for *** the case of the online shopping business,it’s very important to find trends in the data and get knowledge of features that helps drive the success of the *** this research,a dataset of 12,330 records of customers has been analyzedwho visited an online shoppingwebsite over a period of one *** main objective of this research is to find features that are relevant in terms of correctly predicting the purchasing decisions made by visiting customers and build ML models which could make correct predictions on unseen data in the *** permutation feature importance approach has been used to get the importance of features according to the output variable(Revenue).Five ML models i.e.,decision tree(DT),random forest(RF),extra tree(ET)classifier,Neural networks(NN),and Logistic regression(LR)have been used to make predictions on the unseen data in the *** performance of each model has been discussed in detail using performance measurement techniques such as accuracy score,precision,recall,F1 score,and ROC-AUC *** model is the bestmodel among all five chosen based on accuracy score of 90%and F1 score of 79%followed by extra tree ***,our study indicates that RF model can be used by online retailing businesses for predicting consumer buying *** research also reveals the importance of page value as a key feature for capturing online purchasing *** may give a clue to future businesses who can focus on this specific feature and can find key factors behind page value success which in turn will help the online shopping business.
The ability of the system to gain knowledge for lowering prescription drug prices has been increasingly studied in recent years. Gadget-gaining knowledge is a branch of synthetic intelligence that enables machines and...
详细信息
ISBN:
(数字)9798350370249
ISBN:
(纸本)9798350370270
The ability of the system to gain knowledge for lowering prescription drug prices has been increasingly studied in recent years. Gadget-gaining knowledge is a branch of synthetic intelligence that enables machines and PC systems to enhance their overall performance on specific obligations by means of mastering beyond facts. Within the context of prescription drug costs, gadget learning may be used to find patterns and developments in drug pricing and usage, decide disparities in getting admission to and usage, and have a look at pricing strategies hired by pharmaceutical businesses. The use of gadgets to gain knowledge can help to discover elements using prescription drug costs, inclusive of the pricing and utilization of individual capsules or the relationships among drug costs and effects. Moreover, AI-primarily based algorithms may be used to use massive datasets in an effort to apprehend the role that healthcare vendors, insurers, and pharmaceutical organizations have on prescription drug ***, AI-based total fashions can also be used to become aware of and degree cost elements associated with specific drug combinations. Sooner or later, machine studying may be leveraged to examine the effects of policy changes and healthcare reforms on prescription drug costs and to become aware of goal populations with high prescription drug prices. By combining gadget studying with conventional healthcare price analysis gear, researchers can gain insights into the drivers of prescription drug charges and make public coverage decisions. In sum, a device gaining knowledge can be a powerful tool.
With the current alarming exponential increase in global energy demand chiefly due to population growth, electrification, and the issues associated with fossil generation, utilities are reinvesting their returns in al...
With the current alarming exponential increase in global energy demand chiefly due to population growth, electrification, and the issues associated with fossil generation, utilities are reinvesting their returns in alternative ways of clean power generation. Although, finding alternative ways to provide clean energy and to advance the power grid are of the main interest globally, many countries face power theft as a frequent problem. in Ghana, power losses in the distribution system cost the nation over a billion Ghana Cedis in the country's total annual revenue, of which power theft plays a predominant role. This paper presents an electricity theft mitigation technique through a programmable smart energy meter. The proposed method is such that interruptions are added to the smart energy meters in order to detect input signals from an added current sensor placed at the terminal point of the service line, from where in-between the sensor and the meter, illegal connections are made. The proposed Advanced Metering Infrastructure (AMI) system will provide smart services, including calculating consumed energy in kWh and generating a bill sent to the utility station. After which, the AMI system will disconnect the power supply from the meter.
Worldwide, distributed generation sources are being installed in increasing numbers within distribution networks. This poses new challenges for distribution network operators, including voltage fluctuations beyond per...
详细信息
The Internet of Things (IoT) enables us to collect and process vast amounts of data in real time. However, the security of IoT devices and networks is highly susceptible to cyber attacks that threaten data integrity a...
详细信息
ISBN:
(数字)9781728190549
ISBN:
(纸本)9781728190556
The Internet of Things (IoT) enables us to collect and process vast amounts of data in real time. However, the security of IoT devices and networks is highly susceptible to cyber attacks that threaten data integrity and service availability. Furthermore, due to the diverse nature of data collected from numerous nodes in IoT systems and the disturbances occurring within them, detecting anomalous activities and compromised nodes is considerably more challenging than in conventional computer systems. Therefore, it is crucial to develop robust and dependable anomaly detection methods to identify and remove malicious and/or unwanted data, which ensures their exclusion from IoT-powered applications and data analytics. To achieve this, this paper proposes a Generative Adverserial Networks (GAN)-based anomaly detection for IoT systems. The proposed model enables the autoencoder - using the adversarial training of GAN - to learn a better representation of IoT data, making it robust against noisy and changing environments. Based on experiments with real-world IoT datasets, the proposed framework has shown to improve the accuracy of detecting malicious traffic in IoT and surpass state-of-the-art anomaly detection models.
Medicine is the only thing by which we use where we feel bad condition of our body’s physical and mental illness. Most of medicines are made of specific plants from our nature. These plants are also known as a medici...
详细信息
Various techniques have been developed for the identification of different types of requirements like interview, questionnaire, group elicitation techniques, attributed goal-oriented requirements analysis, fuzzy based...
Various techniques have been developed for the identification of different types of requirements like interview, questionnaire, group elicitation techniques, attributed goal-oriented requirements analysis, fuzzy based goal-oriented requirements analysis method, non-functional requirements framework, etc. Based on the critical analysis of requirements elicitation methods, we found that single elicitation technique is not suitable to understand the need of the stakeholders. In real life applications, multiple elicitation techniques are required to elicit and select the requirements of an information system because each technique has its strength and limitations. Therefore, to address this issue, this paper presents a mathematical model for the selection of requirements elicitation techniques so that complete set of requirements along with its priority can be identified before the development of an information system. The institute examination system is considered to show the applicability of the proposed mathematical model.
In this letter, we propose an airborne maneuverable bi-static integrated sensing and communication (ISAC) system where both the transmitter and receiver are unmanned aerial vehicles (UAVs). By timely forming a dynamic...
详细信息
暂无评论