97 research outputs found

    Machine Learning Research On Breast And Lung Cancer Detection

    Get PDF
    As the diagnosis of these cancer cells at late stages causes greater pain and raises the likelihood of death, the initial-state cancer finding is crucial to giving the patient the proper care and reducing the risk of dying from cancer. The publication offers a chance to research breast and lung cancer detection techniques as well as various algorithms for cancer early detection. With the aid of various image kinds and test results data sets, hybrid approaches are utilized to identify lung and breast cancer based on the size and form of the cells. The basic concept of breast and lung cancer block diagram is also explained in this study, with an emphasis on the difficulties and potential future applications of cancer detection and diagnosis techniques

    Blockchain-Assisted Homomorphic Encryption Approach for Skin Lesion Diagnosis using Optimal Deep Learning Model

    Get PDF
    Blockchain (BC) and Machine learning (ML) technologies have been investigated for potential applications in medicine with reasonable success to date. On the other hand, as accurate and early diagnosis of skin lesion classification is essential to gradually increase the survival rate of the patient, Deep-Learning (DL) and ML technologies were introduced for supporting dermatologists to overcome these challenges. This study designed a Blockchain Assisted Homomorphic Encryption Approach for Skin Lesion Diagnosis using an Optimal Deep Learning (BHESKD-ODL) model. The presented BHESKD-ODL model achieves security and proper classification of skin lesion images using BC to store the medical images of the patients to restrict access to third-party users or intruders. In addition, the BHESKD-ODL method secures the medical images using the mayfly optimization (MFO) algorithm with the Homomorphic Encryption (HE) technique. For skin lesion diagnosis, the proposed BHESKD-ODL method uses pre-processing and the Adam optimizer with a Fully Convolutional Network (FCN) based segmentation process. Furthermore, a radiomics feature extraction with a Bidirectional Recurrent Neural Network (BiRNN) model was employed for skin lesion classification. Finally, the Red Deer Optimization (RDO) algorithm was used for the optimal hyperparameter selection of the BiRNN approach. The experimental results of the BHESKD-ODL system on a benchmark skin dataset proved its promising performance in terms of different measures

    Ensemble Based Feature Extraction and Deep Learning Classification Model with Depth Vision

    Get PDF
    It remains a challenging task to identify human activities from a video sequence or still image due to factors such as backdrop clutter, fractional occlusion, and changes in scale, point of view, appearance, and lighting. Different appliances, as well as video surveillance systems, human-computer interfaces, and robots used to study human behavior, require different activity classification systems. A four-stage framework for recognizing human activities is proposed in the paper. As part of the initial stages of pre-processing, video-to-frame conversion and adaptive histogram equalization (AHE) are performed. Additionally, watershed segmentation is performed and, from the segmented images, local texton XOR patterns (LTXOR), motion boundary scale-invariant feature transforms (MoBSIFT) and bag of visual words (BoW) based features are extracted. The Bidirectional gated recurrent unit (Bi-GRU) and the Bidirectional long short-term memory (Bi-LSTM) classifiers are used to detect human activity. In addition, the combined decisions of the Bi-GRU and Bi-LSTM classifiers are further fused, and their accuracy levels are determined. With this Dempster-Shafer theory (DST) technique, it is more likely that the results obtained from the analysis are accurate. Various metrics are used to assess the effectiveness of the deployed approach

    An efficient hybrid approach for medical images enhancement

    Get PDF
    Medical images have various critical usages in the field of medical science and healthcare engineering. These images contain information about many severe diseases. Health professionals identify various diseases by observing the medical images. Quality of medical images directly affects the accuracy of detection and diagnosis of various diseases. Therefore, quality of images must be as good as possible. Different approaches are existing today for enhancement of medical images, but quality of images is not good. In this literature, we have proposed a novel approach that uses principal component analysis (PCA), multi-scale switching morphological operator (MSMO) and contrast limited adaptive histogram equalization (CLAHE) methods in a unique sequence for this purpose. We have conducted exhaustive experiments on large number of images of various modalities such as MRI, ultrasound, and retina. Obtained results demonstrate that quality of medical images processed by proposed approach has significantly improved and better than other existing methods of this field

    Technologies of information transmission and processing

    Get PDF
    ĐĄĐ±ĐŸŃ€ĐœĐžĐș ŃĐŸĐŽĐ”Ń€Đ¶ĐžŃ‚ статьо, Ń‚Đ”ĐŒĐ°Ń‚ĐžĐșĐ° ĐșĐŸŃ‚ĐŸŃ€Ń‹Ń… ĐżĐŸŃĐČŃŃ‰Đ”ĐœĐ° ĐœĐ°ŃƒŃ‡ĐœĐŸ-Ń‚Đ”ĐŸŃ€Đ”Ń‚ĐžŃ‡Đ”ŃĐșĐžĐŒ Ń€Đ°Đ·Ń€Đ°Đ±ĐŸŃ‚ĐșĐ°ĐŒ ĐČ ĐŸĐ±Đ»Đ°ŃŃ‚Đž сДтДĐč тДлДĐșĐŸĐŒĐŒŃƒĐœĐžĐșацоĐč, ĐžĐœŃ„ĐŸŃ€ĐŒĐ°Ń†ĐžĐŸĐœĐœĐŸĐč Đ±Đ”Đ·ĐŸĐżĐ°ŃĐœĐŸŃŃ‚Đž, Ń‚Đ”Ń…ĐœĐŸĐ»ĐŸĐłĐžĐč пДрДЎачО Đž ĐŸĐ±Ń€Đ°Đ±ĐŸŃ‚ĐșĐž ĐžĐœŃ„ĐŸŃ€ĐŒĐ°Ń†ĐžĐž. ĐŸŃ€Đ”ĐŽĐœĐ°Đ·ĐœĐ°Ń‡Đ”Đœ ĐŽĐ»Ń ĐœĐ°ŃƒŃ‡ĐœŃ‹Ń… ŃĐŸŃ‚Ń€ŃƒĐŽĐœĐžĐșĐŸĐČ ĐČ ĐŸĐ±Đ»Đ°ŃŃ‚Đž ĐžĐœŃ„ĐŸĐșĐŸĐŒĐŒŃƒĐœĐžĐșацоĐč, ĐżŃ€Đ”ĐżĐŸĐŽĐ°ĐČатДлДĐč, Đ°ŃĐżĐžŃ€Đ°ĐœŃ‚ĐŸĐČ, ĐŒĐ°ĐłĐžŃŃ‚Ń€Đ°ĐœŃ‚ĐŸĐČ Đž ŃŃ‚ŃƒĐŽĐ”ĐœŃ‚ĐŸĐČ Ń‚Đ”Ń…ĐœĐžŃ‡Đ”ŃĐșох ĐČŃƒĐ·ĐŸĐČ

    Energy-Sustainable IoT Connectivity: Vision, Technological Enablers, Challenges, and Future Directions

    Full text link
    Technology solutions must effectively balance economic growth, social equity, and environmental integrity to achieve a sustainable society. Notably, although the Internet of Things (IoT) paradigm constitutes a key sustainability enabler, critical issues such as the increasing maintenance operations, energy consumption, and manufacturing/disposal of IoT devices have long-term negative economic, societal, and environmental impacts and must be efficiently addressed. This calls for self-sustainable IoT ecosystems requiring minimal external resources and intervention, effectively utilizing renewable energy sources, and recycling materials whenever possible, thus encompassing energy sustainability. In this work, we focus on energy-sustainable IoT during the operation phase, although our discussions sometimes extend to other sustainability aspects and IoT lifecycle phases. Specifically, we provide a fresh look at energy-sustainable IoT and identify energy provision, transfer, and energy efficiency as the three main energy-related processes whose harmonious coexistence pushes toward realizing self-sustainable IoT systems. Their main related technologies, recent advances, challenges, and research directions are also discussed. Moreover, we overview relevant performance metrics to assess the energy-sustainability potential of a certain technique, technology, device, or network and list some target values for the next generation of wireless systems. Overall, this paper offers insights that are valuable for advancing sustainability goals for present and future generations.Comment: 25 figures, 12 tables, submitted to IEEE Open Journal of the Communications Societ

    Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies and Future Research

    Get PDF
    Emerging applications such as Internet of Everything, Holographic Telepresence, collaborative robots, and space and deep-sea tourism are already highlighting the limitations of existing fifth-generation (5G) mobile networks. These limitations are in terms of data-rate, latency, reliability, availability, processing, connection density and global coverage, spanning over ground, underwater and space. The sixth-generation (6G) of mobile networks are expected to burgeon in the coming decade to address these limitations. The development of 6G vision, applications, technologies and standards has already become a popular research theme in academia and the industry. In this paper, we provide a comprehensive survey of the current developments towards 6G. We highlight the societal and technological trends that initiate the drive towards 6G. Emerging applications to realize the demands raised by 6G driving trends are discussed subsequently. We also elaborate the requirements that are necessary to realize the 6G applications. Then we present the key enabling technologies in detail. We also outline current research projects and activities including standardization efforts towards the development of 6G. Finally, we summarize lessons learned from state-of-the-art research and discuss technical challenges that would shed a new light on future research directions towards 6G

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims
    • 

    corecore