computer-Aided Diagnostic (CAD) systems enhance clinical decision-making, providing more accurate and streamlined processes. CAD systems based on Content-Based Image Retrieval (CBIR) serve as visual tools that strengt...
详细信息
Cardiovascular disease remains a major issue for mortality and morbidity, making accurate classification crucial. This paper introduces a novel heart disease classification model utilizing Electrocardiogram (ECG) sign...
详细信息
Machine learning has emerged as one transformative tool in predicting student academic performance. This study evaluates machine learning models regression in predicting student academic performance. It can be found o...
详细信息
The security and privacy issues in the Internet of Things (IoT) are a mandatory process and also a challenging task for researchers. Blockchain technology enhanced and motivated the recent security parameters, and it ...
详细信息
In the field of medical images,pixel-level labels are time-consuming and expensive to acquire,while image-level labels are relatively easier to ***,it makes sense to learn more information(knowledge)from a small numbe...
详细信息
In the field of medical images,pixel-level labels are time-consuming and expensive to acquire,while image-level labels are relatively easier to ***,it makes sense to learn more information(knowledge)from a small number of hard-to-get pixel-level annotated images to apply to different tasks to maximize their usefulness and save time and training *** this paper,using Pixel-Level Labeled Images forMulti-Task Learning(PLDMLT),we focus on grading the severity of fundus images for Diabetic Retinopathy(DR).This is because,for the segmentation task,there is a finely labeled mask,while the severity grading task is without classification *** this end,we propose a two-stage multi-label learning weakly supervised algorithm,which generates initial classification pseudo labels in the first stage and visualizes heat maps at all levels of severity using Grad-Cam to further provide medical interpretability for the classification task.A multitask model framework with U-net as the baseline is proposed in the second stage.A label update network is designed to alleviate the gradient balance between the classification and segmentation *** experimental results show that our PLDMLTmethod significantly outperforms other stateof-the-art methods in DR segmentation on two public datasets,achieving up to 98.897%segmentation *** addition,our method achieves comparable competitiveness with single-task fully supervised learning in the DR severity grading task.
Voting is one of the most fundamental and important pillars for smooth functioning of a democracy. The conventional voting system based on a ballot system or Electronic Voting Machine (EVM) is susceptible to multiple ...
详细信息
Algorithms are central objects of every nontrivial computer application but their analysis and design are a great challenge. While traditional methods involve mathematical and empirical approaches, there exists a thir...
详细信息
Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based *** consuming time and resources,intrusive traffic hampers the efficient operation of network *** effective st...
详细信息
Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based *** consuming time and resources,intrusive traffic hampers the efficient operation of network *** effective strategy for preventing,detecting,and mitigating intrusion incidents will increase productivity.A crucial element of secure network traffic is Intrusion Detection System(IDS).An IDS system may be host-based or network-based to monitor intrusive network *** unusual internet traffic has become a severe security risk for intelligent *** systems are negatively impacted by several attacks,which are slowing *** addition,networked communication anomalies and breaches must be detected using Machine Learning(ML).This paper uses the NSL-KDD data set to propose a novel IDS based on Artificial Neural Networks(ANNs).As a result,the ML model generalizes sufficiently to perform well on untried *** NSL-KDD dataset shall be utilized for both training and *** this paper,we present a custom ANN model architecture using the Keras open-source software *** specific arrangement of nodes and layers,along with the activation functions,enhances the model’s ability to capture intricate patterns in network *** performance of the ANN is carefully tested and evaluated,resulting in the identification of a maximum detection accuracy of 97.5%.We thoroughly compared our suggested model to industry-recognized benchmark methods,such as decision classifier combinations and ML classifiers like k-Nearest Neighbors(KNN),Deep Learning(DL),Support Vector Machine(SVM),Long Short-Term Memory(LSTM),Deep Neural Network(DNN),and *** is encouraging to see that our model consistently outperformed each of these tried-and-true techniques in all *** result underlines the effectiveness of the suggested methodology by demonstrating the ANN’s capacity to accurately assess the effectiveness of the developed strategy
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
This study examines the ways in which Learning Management Systems (LMS) have become an essential component of contemporary education, influencing both teacher effectiveness and student learning. It looks at the origin...
详细信息
暂无评论