97 research outputs found
Machine Learning Research On Breast And Lung Cancer Detection
As the diagnosis of these cancer cells at late stages causes greater pain and raises the likelihood of death, the initial-state cancer finding is crucial to giving the patient the proper care and reducing the risk of dying from cancer. The publication offers a chance to research breast and lung cancer detection techniques as well as various algorithms for cancer early detection. With the aid of various image kinds and test results data sets, hybrid approaches are utilized to identify lung and breast cancer based on the size and form of the cells. The basic concept of breast and lung cancer block diagram is also explained in this study, with an emphasis on the difficulties and potential future applications of cancer detection and diagnosis techniques
Blockchain-Assisted Homomorphic Encryption Approach for Skin Lesion Diagnosis using Optimal Deep Learning Model
Blockchain (BC) and Machine learning (ML) technologies have been investigated for potential applications in medicine with reasonable success to date. On the other hand, as accurate and early diagnosis of skin lesion classification is essential to gradually increase the survival rate of the patient, Deep-Learning (DL) and ML technologies were introduced for supporting dermatologists to overcome these challenges. This study designed a Blockchain Assisted Homomorphic Encryption Approach for Skin Lesion Diagnosis using an Optimal Deep Learning (BHESKD-ODL) model. The presented BHESKD-ODL model achieves security and proper classification of skin lesion images using BC to store the medical images of the patients to restrict access to third-party users or intruders. In addition, the BHESKD-ODL method secures the medical images using the mayfly optimization (MFO) algorithm with the Homomorphic Encryption (HE) technique. For skin lesion diagnosis, the proposed BHESKD-ODL method uses pre-processing and the Adam optimizer with a Fully Convolutional Network (FCN) based segmentation process. Furthermore, a radiomics feature extraction with a Bidirectional Recurrent Neural Network (BiRNN) model was employed for skin lesion classification. Finally, the Red Deer Optimization (RDO) algorithm was used for the optimal hyperparameter selection of the BiRNN approach. The experimental results of the BHESKD-ODL system on a benchmark skin dataset proved its promising performance in terms of different measures
Ensemble Based Feature Extraction and Deep Learning Classification Model with Depth Vision
It remains a challenging task to identify human activities from a video sequence or still image due to factors such as backdrop clutter, fractional occlusion, and changes in scale, point of view, appearance, and lighting. Different appliances, as well as video surveillance systems, human-computer interfaces, and robots used to study human behavior, require different activity classification systems. A four-stage framework for recognizing human activities is proposed in the paper. As part of the initial stages of pre-processing, video-to-frame conversion and adaptive histogram equalization (AHE) are performed. Additionally, watershed segmentation is performed and, from the segmented images, local texton XOR patterns (LTXOR), motion boundary scale-invariant feature transforms (MoBSIFT) and bag of visual words (BoW) based features are extracted. The Bidirectional gated recurrent unit (Bi-GRU) and the Bidirectional long short-term memory (Bi-LSTM) classifiers are used to detect human activity. In addition, the combined decisions of the Bi-GRU and Bi-LSTM classifiers are further fused, and their accuracy levels are determined. With this Dempster-Shafer theory (DST) technique, it is more likely that the results obtained from the analysis are accurate. Various metrics are used to assess the effectiveness of the deployed approach
An efficient hybrid approach for medical images enhancement
Medical images have various critical usages in the field of medical science and healthcare engineering. These images contain information about many severe diseases. Health professionals identify various diseases by observing the medical images. Quality of medical images directly affects the accuracy of detection and diagnosis of various diseases. Therefore, quality of images must be as good as possible. Different approaches are existing today for enhancement of medical images, but quality of images is not good. In this literature, we have proposed a novel approach that uses principal component analysis (PCA), multi-scale switching morphological operator (MSMO) and contrast limited adaptive histogram equalization (CLAHE) methods in a unique sequence for this purpose. We have conducted exhaustive experiments on large number of images of various modalities such as MRI, ultrasound, and retina. Obtained results demonstrate that quality of medical images processed by proposed approach has significantly improved and better than other existing methods of this field
Technologies of information transmission and processing
ĐĄĐ±ĐŸŃĐœĐžĐș ŃĐŸĐŽĐ”ŃĐ¶ĐžŃ ŃŃĐ°ŃŃĐž, ŃĐ”ĐŒĐ°ŃĐžĐșĐ° ĐșĐŸŃĐŸŃŃŃ
ĐżĐŸŃĐČŃŃĐ”ĐœĐ° ĐœĐ°ŃŃĐœĐŸ-ŃĐ”ĐŸŃĐ”ŃĐžŃĐ”ŃĐșĐžĐŒ ŃĐ°Đ·ŃĐ°Đ±ĐŸŃĐșĐ°ĐŒ ĐČ ĐŸĐ±Đ»Đ°ŃŃĐž ŃĐ”ŃĐ”Đč ŃДлДĐșĐŸĐŒĐŒŃĐœĐžĐșĐ°ŃĐžĐč, ĐžĐœŃĐŸŃĐŒĐ°ŃĐžĐŸĐœĐœĐŸĐč Đ±Đ”Đ·ĐŸĐżĐ°ŃĐœĐŸŃŃĐž, ŃĐ”Ń
ĐœĐŸĐ»ĐŸĐłĐžĐč пДŃДЎаŃĐž Đž ĐŸĐ±ŃĐ°Đ±ĐŸŃĐșĐž ĐžĐœŃĐŸŃĐŒĐ°ŃОО. ĐŃĐ”ĐŽĐœĐ°Đ·ĐœĐ°ŃĐ”Đœ ĐŽĐ»Ń ĐœĐ°ŃŃĐœŃŃ
ŃĐŸŃŃŃĐŽĐœĐžĐșĐŸĐČ ĐČ ĐŸĐ±Đ»Đ°ŃŃĐž ĐžĐœŃĐŸĐșĐŸĐŒĐŒŃĐœĐžĐșĐ°ŃĐžĐč, ĐżŃĐ”ĐżĐŸĐŽĐ°ĐČĐ°ŃДлДĐč, Đ°ŃпОŃĐ°ĐœŃĐŸĐČ, ĐŒĐ°ĐłĐžŃŃŃĐ°ĐœŃĐŸĐČ Đž ŃŃŃĐŽĐ”ĐœŃĐŸĐČ ŃĐ”Ń
ĐœĐžŃĐ”ŃĐșĐžŃ
ĐČŃĐ·ĐŸĐČ
Energy-Sustainable IoT Connectivity: Vision, Technological Enablers, Challenges, and Future Directions
Technology solutions must effectively balance economic growth, social equity,
and environmental integrity to achieve a sustainable society. Notably, although
the Internet of Things (IoT) paradigm constitutes a key sustainability enabler,
critical issues such as the increasing maintenance operations, energy
consumption, and manufacturing/disposal of IoT devices have long-term negative
economic, societal, and environmental impacts and must be efficiently
addressed. This calls for self-sustainable IoT ecosystems requiring minimal
external resources and intervention, effectively utilizing renewable energy
sources, and recycling materials whenever possible, thus encompassing energy
sustainability. In this work, we focus on energy-sustainable IoT during the
operation phase, although our discussions sometimes extend to other
sustainability aspects and IoT lifecycle phases. Specifically, we provide a
fresh look at energy-sustainable IoT and identify energy provision, transfer,
and energy efficiency as the three main energy-related processes whose
harmonious coexistence pushes toward realizing self-sustainable IoT systems.
Their main related technologies, recent advances, challenges, and research
directions are also discussed. Moreover, we overview relevant performance
metrics to assess the energy-sustainability potential of a certain technique,
technology, device, or network and list some target values for the next
generation of wireless systems. Overall, this paper offers insights that are
valuable for advancing sustainability goals for present and future generations.Comment: 25 figures, 12 tables, submitted to IEEE Open Journal of the
Communications Societ
Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies and Future Research
Emerging applications such as Internet of Everything, Holographic Telepresence, collaborative robots, and space and deep-sea tourism are already highlighting the limitations of existing fifth-generation (5G) mobile networks. These limitations are in terms of data-rate, latency, reliability, availability, processing, connection density and global coverage, spanning over ground, underwater and space. The sixth-generation (6G) of mobile networks are expected to burgeon in the coming decade to address these limitations. The development of 6G vision, applications, technologies and standards has already become a popular research theme in academia and the industry. In this paper, we provide a comprehensive survey of the current developments towards 6G. We highlight the societal and technological trends that initiate the drive towards 6G. Emerging applications to realize the demands raised by 6G driving trends are discussed subsequently. We also elaborate the requirements that are necessary to realize the 6G applications. Then we present the key enabling technologies in detail. We also outline current research projects and activities including standardization efforts towards the development of 6G. Finally, we summarize lessons learned from state-of-the-art research and discuss technical challenges that would shed a new light on future research directions towards 6G
Multibiometric security in wireless communication systems
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and
WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition.
First is the enrolment phase by which the database of watermarked fingerprints with
memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel.
Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present oneâs fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user.
The following three steps then involve speaker recognition including the user
responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user.
In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint
image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and
sliding neighborhood) have been followed with further two steps for embedding, and
extracting the watermark into the enhanced fingerprint image utilising Discrete
Wavelet Transform (DWT).
In the speaker recognition stage, the limitations of this technique in wireless
communication have been addressed by sending voice feature (cepstral coefficients)
instead of raw sample. This scheme is to reap the advantages of reducing the
transmission time and dependency of the data on communication channel, together
with no loss of packet. Finally, the obtained results have verified the claims
- âŠ