Early surgical treatment of brain tumors is crucial in reducing patient mortality rates. However, brain tissue deformation (called brain shift) occurs during the surgery, rendering pre-operative images invalid. As a c...
详细信息
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are expl...
详细信息
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are exploited to carry client patterns observed by a *** client patterns facilitate the particular client’s future visit to the corresponding ***,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the *** protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource *** this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP *** proposed protocol uses a secret key embedded within a *** proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication ***,the analysis presented in this paper confirms that proposed protocol resists various known attacks.
Gliomas are aggressive brain tumors known for their heterogeneity,unclear borders,and diverse locations on Magnetic Resonance Imaging(MRI)*** factors present significant challenges for MRI-based segmentation,a crucial...
详细信息
Gliomas are aggressive brain tumors known for their heterogeneity,unclear borders,and diverse locations on Magnetic Resonance Imaging(MRI)*** factors present significant challenges for MRI-based segmentation,a crucial step for effective treatment planning and monitoring of glioma *** study proposes a novel deep learning framework,ResNet Multi-Head Attention U-Net(ResMHA-Net),to address these challenges and enhance glioma segmentation ***-Net leverages the strengths of both residual blocks from the ResNet architecture and multi-head attention *** powerful combination empowers the network to prioritize informative regions within the 3D MRI data and capture long-range *** doing so,ResMHANet effectively segments intricate glioma sub-regions and reduces the impact of uncertain tumor *** rigorously trained and validated ResMHA-Net on the BraTS 2018,2019,2020 and 2021 ***,ResMHA-Net achieved superior segmentation accuracy on the BraTS 2021 dataset compared to the previous years,demonstrating its remarkable adaptability and robustness across diverse ***,we collected the predicted masks obtained from three datasets to enhance survival prediction,effectively augmenting the dataset *** features were then extracted from these predicted masks and,along with clinical data,were used to train a novel ensemble learning-based machine learning model for survival *** model employs a voting mechanism aggregating predictions from multiple models,leading to significant improvements over existing *** ensemble approach capitalizes on the strengths of various models,resulting in more accurate and reliable predictions for patient ***,we achieved an impressive accuracy of 73%for overall survival(OS)prediction.
In addressing labor-intensive process of manual plant disease detection, this article introduces an innovative solution—the lightweight parallel depthwise separable convolutional neural network (PDSCNN) coupled with ...
详细信息
In this paper we propose a first empirical mapping between the RST-DT and the PDTB 3.0. We provide an original algorithm which allows the mapping of 6,510 (80.0%) explicit and implicit discourse relations between the ...
详细信息
Most enterprises adopted social media for marketing purposes. Traditional media resources about one decade ago are now a day's costly and less productive than social media. Companies that are using social media li...
详细信息
The "ethical by design" approach involves examining all stages of a lifecycle of technology to ensure that they are ethically justifiable and socially sustainable. Building on our work on the ethics of auton...
详细信息
With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem *** security significantly relies on the secu...
详细信息
With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem *** security significantly relies on the security of the underlying hardware chip,which often contains critical information,such as encryption *** understand existing IoT chip security,this study analyzes the security of an IoT security chip that has obtained an Arm Platform Security Architecture(PSA)Level 2 *** analysis shows that the chip leaks part of the encryption key and presents a considerable security ***,we use commodity equipment to collect electromagnetic traces of the *** a statistical T-test,we find that the target chip has physical leakage during the AES encryption *** further use correlation analysis to locate the detailed encryption interval in the collected electromagnetic trace for the Advanced Encryption Standard(AES)encryption *** the basis of the intermediate value correlation analysis,we recover half of the 16-byte AES encryption *** repeat the process for three different tests;in all the tests,we obtain the same result,and we recover around 8 bytes of the 16-byte AES encryption ***,experimental results indicate that despite the Arm PSA Level 2 certification,the target security chip still suffers from physical *** layer application developers should impose strong security mechanisms in addition to those of the chip itself to ensure IoT application security.
People with hearing loss or hard hearing struggle with daily life activities as sign language is not widely known by the public. There are many attempts to use technology to help assist hearing loss individuals. Howev...
详细信息
A neuron with binary inputs and a binary output represents a Boolean function. Our goal is to extract this Boolean function into a tractable representation that will facilitate the explanation and formal verification ...
详细信息
暂无评论