8 research outputs found

    Segmenting and Classifiying the Brain Tumor from MRI Medical Images Based on Machine Learning Algorithms: A Review

    No full text
    A brain tumor is a problem that threatens life and impedes the normal working of the human body. The brain tumor needs to be identified early for the proper diagnosis and effective treatment planning. Tumor segmentation from an MRI brain image is one of the most focused areas of the medical community, provided that MRI is non-invasive imaging. Brain tumor segmentation involves distinguishing abnormal brain tissue from normal brain tissue. This paper presents a systematic literature review of brain tumor segmentation strategies and the classification of abnormalities and normality in MRI images based on various deep learning techniques, interbreeding. It requires presentation and quantitative analysis, from standard segmentation and classification methods to the best class strategies

    SQL Injection Attacks Prevention System Technology: Review

    No full text
    The vulnerabilities in most web applications enable hackers to gain access to confidential and private information. Structured query injection poses a significant threat to web applications and is one of the most common and widely used information theft mechanisms. Where hackers benefit from errors in the design of systems or existing gaps by not filtering the user's input for some special characters and symbols contained within the structural query sentences or the quality of the information is not checked, whether it is text or numerical, which causes unpredictability of the outcome of its implementation. In this paper, we review PHP techniques and other techniques for protecting SQL from the injection, methods for detecting SQL attacks, types of SQL injection, causes of SQL injection via getting and Post, and prevention technology for SQL vulnerabilities

    Reliable Communications for Vehicular Networks

    No full text
    Vehicular communications, referring to information exchange among vehicles, and infrastructures. It has attracted a lot of attentions recently due to its great potential to support intelligent transportation, various safety applications, and on-road infotainment. The aim of technologies such as Vehicle-to-Vehicl (V2V) and Vehicle to-Every-thibg (V2X) Vehicle-to very-thing is to include models of connectivity that can be used in various application contexts by vehicles. However, the routing reliability of these ever-changing networks needs to be paid special attention. The link reliability is defined as the probability that a direct communication link between two vehicles will stay continuously available over a specified period. Furthermore, the link reliability value is accurately calculated using the location, direction and velocity information of vehicles along the road

    Paralinguistic Speech Processing: An Overview

    No full text
    Clients can adequately control PCs and create reports by speaking with the guide of innovation, discourse acknowledgment empowers records to be delivered all the more effectively in light of the fact that the program normally produces words as fast as they expressed, which is typically a lot faster than a human can compose. Discourse acknowledgment is an innovation that consequently finds the words and expressions that best match the contribution of human discourse. The most normal use of discourse acknowledgment is correspondence, where discourse acknowledgment can be utilized to create letters/messages and different reports. Point of discourse handling: - to comprehend discourse as a mechanism of correspondence, to reflect discourse for transmission and propagation; - to inspect discourse for robotized data discovery and extraction-to find some physiological highlights of the speaker. In discourse combination, there are two significant capacities. The first is the interpretation of voice to message. The second is for the content to be converted into human voice

    Secure Data Transfer over Internet Using Image Steganography: Review

    No full text
    Whether it's for work or personal well-being, keeping secrets or private information has become part of our everyday existence. Therefore, several researchers acquire an entire focus on secure transmitting secret information. Confidential information is collectively referred to as Steganography for inconspicuous digital media such as video, audio, and images. In disguising information, Steganography plays a significant role. Traditional Steganography faces a further concern of discovery as steganalysis develops. The safety of present steganographic technologies thus has to be improved. In this research, some of the techniques that have been used to hide information inside images have been reviewed. According to the hiding domain, these techniques can be divided into two main parts: The spatial Domain and Transform Domain. In this paper, three methods for each Domain have been chosen to be studied and evaluated. These are; Least Significant Bit (LSB), Pixel Value Difference (PVD), Exploiting Modification Direction (EMD), contourlet transform, Discrete Wavelet Transformation (DWT), and, Discrete Cosine Transformation (DCT). Finally, the best results that have been obtained in terms of higher PSNR, Capacity, and more robustness and security are discussed

    A State of Art for Survey of Combined Iris and Fingerprint Recognition Systems

    No full text
    Biometrics is developing into a technological science in this lifelong technology for the defense of identification. Biometrics is the technology to recognize individuals based on facial features, fingerprints, iris, retina, speech, handprints, etc. Biometric features are used for human recognition and identification. Much research was done in the last years on the biometric system because of a growing need for identification methods. This paper offers an overview of biometric solutions using fingerprint and iris identification, their uses, and Compare the data set, methods, Fusion Level, and the accuracy of the results

    Web Server Performance Improvement Using Dynamic Load Balancing Techniques: A Review

    No full text
    Today, web services rapidly increased and are accessed by many users, leading to massive traffic on the Internet. Hence, the web server suffers from this problem, and it becomes challenging to manage the total traffic with growing users. It will be overloaded and show response time and bottleneck, so this massive traffic must be shared among several servers. Therefore, the load balancing technologies and server clusters are potent methods for dealing with server bottlenecks. Load balancing techniques distribute the load among servers in the cluster so that it balances all web servers. The motivation of this paper is to give an overview of the several load balancing techniques used to enhance the efficiency of web servers in terms of response time, throughput, and resource utilization. Different algorithms are addressed by researchers and get good results like the pending job, and IP hash algorithms achieve better performance

    Review on Natural Language Processing Based on Different Techniques

    No full text
    With the exponential growth of the information on the Internet, there is a high demand for making this information readable and processable by machines. For this purpose, there is a need for the Natural Language Processing (NLP) pipeline. Natural language analysis is a tool used by computers to grasp, perceive, and control human language. This paper discusses various techniques addressed by different researchers on NLP and compares their performance. The comparison among the reviewed researches illustrated that good accuracy levels haved been achieved. Adding to that, the researches that depended on the Sentiment Analysis and ontology methods achieved small prediction error. The syntactic analysis or parsing or syntax analysis is the third stage of the NLP as a conclusion to use NLP technology. This step aims to accurately mean or, from the text, you may state a dictionary meaning. Syntax analysis analyzes the meaning of the text in comparison with the formal grammatical rules
    corecore