期刊文献+
共找到7,811篇文章
< 1 2 250 >
每页显示 20 50 100
Laboratory or Department?Exploration and Creation in Computer Science and Technology
1
作者 Ann Copestake 《计算机教育》 2024年第3期13-16,共4页
In the very beginning,the Computer Laboratory of the University of Cambridge was founded to provide computing service for different disciplines across the university.As computer science developed as a discipline in it... In the very beginning,the Computer Laboratory of the University of Cambridge was founded to provide computing service for different disciplines across the university.As computer science developed as a discipline in its own right,boundaries necessarily arose between it and other disciplines,in a way that is now often detrimental to progress.Therefore,it is necessary to reinvigorate the relationship between computer science and other academic disciplines and celebrate exploration and creativity in research.To do this,the structures of the academic department have to act as supporting scaffolding rather than barriers.Some examples are given that show the efforts being made at the University of Cambridge to approach this problem. 展开更多
关键词 Laboratory or department University of Cambridge Boundaries Exploration and creativity
下载PDF
Panel Discussion on“Development Trends of Computer Science in the New Era”
2
作者 Andrew Yao Nancy M.Amato +3 位作者 Ann Copestake Sukyoung Ryu Yike Guo Yaqin Zhang 《计算机教育》 2024年第3期26-29,共4页
At the panel session of the 3rd Global Forum on the Development of Computer Science,attendees had an opportunity to deliberate recent issues affecting computer science departments as a result of the recent growth in t... At the panel session of the 3rd Global Forum on the Development of Computer Science,attendees had an opportunity to deliberate recent issues affecting computer science departments as a result of the recent growth in the field.6 heads of university computer science departments participated in the discussions,including the moderator,Professor Andrew Yao.The first issue was how universities are managing the growing number of applicants in addition to swelling class sizes.Several approaches were suggested,including increasing faculty hiring,implementing scalable teaching tools,and working closer with other departments through degree programs that integrate computer science with other fields.The second issue was about the position and role of computer science within broader science.Participants generally agreed that all fields are increasingly relying on computer science techniques,and that effectively disseminating these techniques to others is a key to unlocking broader scientific progress. 展开更多
关键词 Development trends Computer science
下载PDF
Early Detection of Colletotrichum Kahawae Disease in Coffee Cherry Based on Computer Vision Techniques
3
作者 Raveena Selvanarayanan Surendran Rajendran Youseef Alotaibi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期759-782,共24页
Colletotrichum kahawae(Coffee Berry Disease)spreads through spores that can be carried by wind,rain,and insects affecting coffee plantations,and causes 80%yield losses and poor-quality coffee beans.The deadly disease ... Colletotrichum kahawae(Coffee Berry Disease)spreads through spores that can be carried by wind,rain,and insects affecting coffee plantations,and causes 80%yield losses and poor-quality coffee beans.The deadly disease is hard to control because wind,rain,and insects carry spores.Colombian researchers utilized a deep learning system to identify CBD in coffee cherries at three growth stages and classify photographs of infected and uninfected cherries with 93%accuracy using a random forest method.If the dataset is too small and noisy,the algorithm may not learn data patterns and generate accurate predictions.To overcome the existing challenge,early detection of Colletotrichum Kahawae disease in coffee cherries requires automated processes,prompt recognition,and accurate classifications.The proposed methodology selects CBD image datasets through four different stages for training and testing.XGBoost to train a model on datasets of coffee berries,with each image labeled as healthy or diseased.Once themodel is trained,SHAP algorithmto figure out which features were essential formaking predictions with the proposed model.Some of these characteristics were the cherry’s colour,whether it had spots or other damage,and how big the Lesions were.Virtual inception is important for classification to virtualize the relationship between the colour of the berry is correlated with the presence of disease.To evaluate themodel’s performance andmitigate excess fitting,a 10-fold cross-validation approach is employed.This involves partitioning the dataset into ten subsets,training the model on each subset,and evaluating its performance.In comparison to other contemporary methodologies,the model put forth achieved an accuracy of 98.56%. 展开更多
关键词 Computer vision coffee berry disease colletotrichum kahawae XG boost shapley additive explanations
下载PDF
Multi-disciplinary Pathways to Computing:A Scalable and Col aborative Approach to Capitalize on the Demand for Computer Science Education
4
作者 Nancy M.Amato 《计算机教育》 2024年第3期10-12,共3页
The number of students demanding computer science(CS)education is rapidly rising,and while faculty sizes are also growing,the traditional pipeline consisting of a CS major,a CS master’s,and then a move to industry or... The number of students demanding computer science(CS)education is rapidly rising,and while faculty sizes are also growing,the traditional pipeline consisting of a CS major,a CS master’s,and then a move to industry or a Ph.D.program is simply not scalable.To address this problem,the Department of Computing at the University of Illinois has introduced a multidisciplinary approach to computing,which is a scalable and collaborative approach to capitalize on the tremendous demand for computer science education.The key component of the approach is the blended major,also referred to as“CS+X”,where CS denotes computer science and X denotes a non-computing field.These CS+X blended degrees enable win-win partnerships among multiple subject areas,distributing the educational responsibilities while growing the entire university.To meet the demand from non-CS majors,another pathway that is offered is a graduate certificate program in addition to the traditional minor program.To accommodate the large number of students,scalable teaching tools,such as automatic graders,have also been developed. 展开更多
关键词 Multi-disciplinary Pathways A Scalable and Collaborative Approach Computer Science Education CS+X
下载PDF
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles 被引量:1
5
作者 Naiyu Wang Wenti Yang +4 位作者 Xiaodong Wang Longfei Wu Zhitao Guan Xiaojiang Du Mohsen Guizani 《Digital Communications and Networks》 SCIE CSCD 2024年第1期126-134,共9页
The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have be... The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have been raised over the security and privacy of the tons of traffic and vehicle data.In this regard,Federated Learning(FL)with privacy protection features is considered a highly promising solution.However,in the FL process,the server side may take advantage of its dominant role in model aggregation to steal sensitive information of users,while the client side may also upload malicious data to compromise the training of the global model.Most existing privacy-preserving FL schemes in IoV fail to deal with threats from both of these two sides at the same time.In this paper,we propose a Blockchain based Privacy-preserving Federated Learning scheme named BPFL,which uses blockchain as the underlying distributed framework of FL.We improve the Multi-Krum technology and combine it with the homomorphic encryption to achieve ciphertext-level model aggregation and model filtering,which can enable the verifiability of the local models while achieving privacy-preservation.Additionally,we develop a reputation-based incentive mechanism to encourage users in IoV to actively participate in the federated learning and to practice honesty.The security analysis and performance evaluations are conducted to show that the proposed scheme can meet the security requirements and improve the performance of the FL model. 展开更多
关键词 Federated learning Blockchain Privacy-preservation Homomorphic encryption Internetof vehicles
下载PDF
Novel Computer-Aided Diagnosis System for the Early Detection of Alzheimer’s Disease
6
作者 Meshal Alharbi Shabana R.Ziyad 《Computers, Materials & Continua》 SCIE EI 2023年第3期5483-5505,共23页
Aging is a natural process that leads to debility,disease,and dependency.Alzheimer’s disease(AD)causes degeneration of the brain cells leading to cognitive decline and memory loss,as well as dependence on others to f... Aging is a natural process that leads to debility,disease,and dependency.Alzheimer’s disease(AD)causes degeneration of the brain cells leading to cognitive decline and memory loss,as well as dependence on others to fulfill basic daily needs.AD is the major cause of dementia.Computer-aided diagnosis(CADx)tools aid medical practitioners in accurately identifying diseases such as AD in patients.This study aimed to develop a CADx tool for the early detection of AD using the Intelligent Water Drop(IWD)algorithm and the Random Forest(RF)classifier.The IWD algorithm an efficient feature selection method,was used to identify the most deterministic features of AD in the dataset.RF is an ensemble method that leverages multiple weak learners to classify a patient’s disease as either demented(DN)or cognitively normal(CN).The proposed tool also classifies patients as mild cognitive impairment(MCI)or CN.The dataset on which the performance of the proposed CADx was evaluated was sourced from the Alzheimer’s Disease Neuroimaging Initiative(ADNI).The RF ensemble method achieves 100%accuracy in identifying DN patients from CN patients.The classification accuracy for classifying patients as MCI or CN is 92%.This study emphasizes the significance of pre-processing prior to classification to improve the classification results of the proposed CADx tool. 展开更多
关键词 Alzheimer’s disease DEMENTIA mild cognitive impairment computer-aided diagnosis intelligent water drop algorithm random forest
下载PDF
Topological Evaluation of Certain Computer Networks by Contraharmonic-Quadratic Indices
7
作者 Ahmed M.Alghamdi Khalid Hamid +3 位作者 Muhammad Waseem Iqbal M.Usman Ashraf Abdullah Alshahrani Adel Alshamrani 《Computers, Materials & Continua》 SCIE EI 2023年第2期3795-3810,共16页
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two networks.These kinds of networks are called bridge networks which are utilized in interconnection ne... In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two networks.These kinds of networks are called bridge networks which are utilized in interconnection networks of PC,portable networks,spine of internet,networks engaged with advanced mechanics,power generation interconnection,bio-informatics and substance intensify structures.Any number that can be entirely calculated by a graph is called graph invariants.Countless mathematical graph invariants have been portrayed and utilized for connection investigation during the latest twenty years.Nevertheless,no trustworthy evaluation has been embraced to pick,how much these invariants are associated with a network graph or subatomic graph.In this paper,it will discuss three unmistakable varieties of bridge networks with an incredible capacity of assumption in the field of computer science,chemistry,physics,drug industry,informatics and arithmetic in setting with physical and manufactured developments and networks,since Contraharmonic-quadratic invariants(CQIs)are recently presented and have different figure qualities for different varieties of bridge graphs or networks.The study settled the geography of bridge graphs/networks of three novel sorts with two kinds of CQI and Quadratic-Contraharmonic Indices(QCIs).The deduced results can be used for the modeling of the above-mentioned networks. 展开更多
关键词 Bridge networks INVARIANTS Quadratic-Contraharmonic Indices MAPLE network graph molecular graph
下载PDF
Subpopulations of regulatory T cells are associated with subclinical atherosclerotic plaques,levels of LDL,and cardiorespiratory fitness in the elderly 被引量:1
8
作者 Tim Böttrich Pascal Bauer +11 位作者 Vincent Gröβer Magdalena Huber Hartmann Raifer Torsten Frech Svenja Nolte Theresa Dombrowski Franz Cemic Natascha Sommer Robert Ringseis Klaus Eder Karsten Krüger Christopher Weyh 《Journal of Sport and Health Science》 SCIE CAS CSCD 2024年第3期288-296,I0002,共10页
Background:Atherosclerosis forms the pathological basis for the development of cardiovascular disease.Since pathological processes initially develop without clinically relevant symptoms,the identification of early mar... Background:Atherosclerosis forms the pathological basis for the development of cardiovascular disease.Since pathological processes initially develop without clinically relevant symptoms,the identification of early markers in the subclinical stage plays an important role for initiating early interventions.There is evidence that regulatory T cells(Tregs)are involved in the development of atherosclerosis.Therefore,the present study aimed to identify and investigate associations with Tregs and their subsets in a cohort of healthy elderly individuals with and without subclinical atherosclerotic plaques(SAP).In addition,various lifestyle and risk factors,such as cardiorespiratory fitness,were investigated as associated signatures.Methods:A cross-sectional study was performed in 79 participants(male:n=50;age=63.6±3.7 years;body mass index=24.9±3.1 kg/m2;mean±SD)who had no previous diagnosis of chronic disease and were not taking medication.Ultrasound of the carotids to identify SAP,cardiovascular function measurement for vascular assessment and a cardiorespiratory fitness test to determine peak oxygen uptake were performed.Additionally,tests were conducted to assess blood lipids and determine glucose levels.Immunophenotyping of Tregs and their subtypes(resting(rTregs)and effector/memory(mTregs))was performed by 8-chanel flow cytometry.Participants were categorized according to atherosclerotic plaque status.Linear and logistic regression models were used to analyze associations between parameters.Results:SAP was detected in a total of 29 participants.The participants with plaque were older(64.8±3.6 years vs.62.9±3.5 years)and had higher peripheral systolic blood pressure(133.8±14.7 mmHg vs.125.8±10.9 mmHg).The participants with SAP were characterized by a lower percentage of rTregs(28.8%±10.7%vs.34.6%±10.7%)and a higher percentage of mTregs(40.3%±14.7%vs.30.0%±11.9%).Multiple logistic regression identified age(odds ratio(OR)=1.20(95%confidence interval(95%CI):1.011.42))and mTregs(OR=1.05(95%CI:1.021.10))as independent risk factors for SAP.Stepwise linear regression could reveal an association of peak oxygen uptake(β=0.441),low-density lipoprotein(LDL)(β=0.096),and SAP(β=6.733)with mTregs and LDL(β=0.104)with rTregs.Conclusion:While at an early stage of SAP,the total proportion of Tregs gives no indication of vascular changes,this is indicated by a shift in the Treg subgroups.Factors such as serum LDL or cardiopulmonary fitness may be associated with this shift and may also be additional diagnostic indicators.This could be used to initiate lifestyle-based preventive measures at an early stage,which may have a protective effect against disease progression. 展开更多
关键词 Cardiorespiratory fitness ELDERLY Regulatory T cells Subclinical atherosclerosis
下载PDF
Sustainable Learning of Computer Programming Languages Using Mind Mapping
9
作者 Shahla Gul Muhammad Asif +6 位作者 Zubair Nawaz Muhammad Haris Aziz Shahzada Khurram Muhammad Qaiser Saleem Elturabi Osman Ahmed Habib Muhammad Shafiq Osama E.Sheta 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1687-1697,共11页
In the current era of information technology,students need to learn modern programming languages efficiently.The art of teaching/learning program-ming requires many logical and conceptual skills.So it’s a challenging ... In the current era of information technology,students need to learn modern programming languages efficiently.The art of teaching/learning program-ming requires many logical and conceptual skills.So it’s a challenging task for the instructors/learners to teach/learn these programming languages effectively and efficiently.Mind mapping is a useful visual tool for establishing ideas and connecting them to solve problems.This research proposed an effective way to teach programming languages through visual tools.This experimental study uses a mind mapping tool to teach two programming environments:Text-based Programming and Blocks-based Programming.We performed the experiments with one hundred and sixty undergraduate students of two public sector universities in the Asia Pacific region.Four different instructional approaches,including block-based language(BBL),text-based languages(TBL),mind map with text-based language(MMTBL)and mind mapping with block-based(MMBBL)are used for this purpose.The results show that instructional approaches using a mind mapping tool to help students solve given tasks in their critical thinking are more effective than other instructional techniques. 展开更多
关键词 Text programming blocks programming novice programmer
下载PDF
Modeling of Computer Virus Propagation with Fuzzy Parameters
10
作者 Reemah M.Alhebshi Nauman Ahmed +6 位作者 Dumitru Baleanu Umbreen Fatima Fazal Dayan Muhammad Rafiq Ali Raza Muhammad Ozair Ahmad Emad E.Mahmoud 《Computers, Materials & Continua》 SCIE EI 2023年第3期5663-5678,共16页
Typically,a computer has infectivity as soon as it is infected.It is a reality that no antivirus programming can identify and eliminate all kinds of viruses,suggesting that infections would persevere on the Internet.T... Typically,a computer has infectivity as soon as it is infected.It is a reality that no antivirus programming can identify and eliminate all kinds of viruses,suggesting that infections would persevere on the Internet.To understand the dynamics of the virus propagation in a better way,a computer virus spread model with fuzzy parameters is presented in this work.It is assumed that all infected computers do not have the same contribution to the virus transmission process and each computer has a different degree of infectivity,which depends on the quantity of virus.Considering this,the parametersβandγbeing functions of the computer virus load,are considered fuzzy numbers.Using fuzzy theory helps us understand the spread of computer viruses more realistically as these parameters have fixed values in classical models.The essential features of the model,like reproduction number and equilibrium analysis,are discussed in fuzzy senses.Moreover,with fuzziness,two numerical methods,the forward Euler technique,and a nonstandard finite difference(NSFD)scheme,respectively,are developed and analyzed.In the evidence of the numerical simulations,the proposed NSFD method preserves the main features of the dynamic system.It can be considered a reliable tool to predict such types of solutions. 展开更多
关键词 SIR model fuzzy parameters computer virus NSFD scheme STABILITY
下载PDF
A Novel Computerized Cognitive Test for the Detection of Mild Cognitive Impairment and Its Association with Neurodegeneration in Alzheimer’s Disease Prone Brain Regions
11
作者 Rosie E. Curiel Cid D. Diane Zheng +11 位作者 Marcela Kitaigorodsky Malek Adjouadi Elizabeth A. Crocco Mike Georgiou Christian Gonzalez-Jimenez Alexandra Ortega Mohammed Goryawala Natalya Nagornaya Pradip Pattany Efrosyni Sfakianaki Ubbo Visser David A. Loewenstein 《Advances in Alzheimer's Disease》 2023年第3期38-54,共17页
During the prodromal stage of Alzheimer’s disease (AD), neurodegenerative changes can be identified by measuring volumetric loss in AD-prone brain regions on MRI. Cognitive assessments that are sensitive enough to me... During the prodromal stage of Alzheimer’s disease (AD), neurodegenerative changes can be identified by measuring volumetric loss in AD-prone brain regions on MRI. Cognitive assessments that are sensitive enough to measure the early brain-behavior manifestations of AD and that correlate with biomarkers of neurodegeneration are needed to identify and monitor individuals at risk for dementia. Weak sensitivity to early cognitive change has been a major limitation of traditional cognitive assessments. In this study, we focused on expanding our previous work by determining whether a digitized cognitive stress test, the Loewenstein-Acevedo Scales for Semantic Interference and Learning, Brief Computerized Version (LASSI-BC) could differentiate between Cognitively Unimpaired (CU) and amnestic Mild Cognitive Impairment (aMCI) groups. A second focus was to correlate LASSI-BC performance to volumetric reductions in AD-prone brain regions. Data was gathered from 111 older adults who were comprehensively evaluated and administered the LASSI-BC. Eighty-seven of these participants (51 CU;36 aMCI) underwent MR imaging. The volumes of 12 AD-prone brain regions were related to LASSI-BC and other memory tests correcting for False Discovery Rate (FDR). Results indicated that, even after adjusting for initial learning ability, the failure to recover from proactive semantic interference (frPSI) on the LASSI-BC differentiated between CU and aMCI groups. An optimal combination of frPSI and initial learning strength on the LASSI-BC yielded an area under the ROC curve of 0.876 (76.1% sensitivity, 82.7% specificity). Further, frPSI on the LASSI-BC was associated with volumetric reductions in the hippocampus, amygdala, inferior temporal lobes, precuneus, and posterior cingulate. 展开更多
关键词 Mild Cognitive Impairment Proactive Semantic Interference MRI Volume Cortical Thickness LASSI-L
下载PDF
Forecasting Budget Estimated Using Time-Series—Case Study on College of Computer Science and Information Technology 被引量:1
12
作者 Foriaa Ahmed Elbasheer Samani A. Talab 《Intelligent Information Management》 2014年第3期142-148,共7页
The need for information systems in organizations and economic units increases as there is a great deal of data that arise from doing many of the processes in order to be addressed to provide information that can brin... The need for information systems in organizations and economic units increases as there is a great deal of data that arise from doing many of the processes in order to be addressed to provide information that can bring interest to multi-users, the new and distinctive management accounting systems which meet in a manner easily all the needs of institutions and individuals from financial business, accounting and management, which take into account the accuracy, speed and confidentiality of the information for which the system is designed. The paper aims to describe a computerized system that is able to predict the budget for the new year based on past budgets by using time series analysis, which gives results with errors to a minimum and controls the budget during the year, through the ability to control exchange, compared to the scheme with the investigator and calculating the deviation, measurement of performance ratio and the expense of a number of indicators relating to budgets, such as the rate of condensation of capital, the growth rate and profitability ratio and gives a clear indication whether these ratios are good or not. There is a positive impact on information systems through this system for its ability to accomplish complex calculations and process paperwork, which is faster than it was previously and there is also a high flexibility, where the system can do any adjustments required in helping relevant parties to control the financial matters of the decision-making appropriate action thereon. 展开更多
关键词 Budgets Information ACCOUNTING PREDICT Time SERIES Analysis
下载PDF
Contemporary Study for Detection of COVID-19 Using Machine Learning with Explainable AI
13
作者 Saad Akbar Humera Azam +3 位作者 Sulaiman Sulmi Almutairi Omar Alqahtani Habib Shah Aliya Aleryani 《Computers, Materials & Continua》 SCIE EI 2024年第7期1075-1104,共30页
The prompt spread of COVID-19 has emphasized the necessity for effective and precise diagnostic tools.In this article,a hybrid approach in terms of datasets as well as the methodology by utilizing a previously unexplo... The prompt spread of COVID-19 has emphasized the necessity for effective and precise diagnostic tools.In this article,a hybrid approach in terms of datasets as well as the methodology by utilizing a previously unexplored dataset obtained from a private hospital for detecting COVID-19,pneumonia,and normal conditions in chest X-ray images(CXIs)is proposed coupled with Explainable Artificial Intelligence(XAI).Our study leverages less preprocessing with pre-trained cutting-edge models like InceptionV3,VGG16,and VGG19 that excel in the task of feature extraction.The methodology is further enhanced by the inclusion of the t-SNE(t-Distributed Stochastic Neighbor Embedding)technique for visualizing the extracted image features and Contrast Limited Adaptive Histogram Equalization(CLAHE)to improve images before extraction of features.Additionally,an AttentionMechanism is utilized,which helps clarify how the modelmakes decisions,which builds trust in artificial intelligence(AI)systems.To evaluate the effectiveness of the proposed approach,both benchmark datasets and a private dataset obtained with permissions from Jinnah PostgraduateMedical Center(JPMC)in Karachi,Pakistan,are utilized.In 12 experiments,VGG19 showcased remarkable performance in the hybrid dataset approach,achieving 100%accuracy in COVID-19 vs.pneumonia classification and 97%in distinguishing normal cases.Overall,across all classes,the approach achieved 98%accuracy,demonstrating its efficiency in detecting COVID-19 and differentiating it fromother chest disorders(Pneumonia and healthy)while also providing insights into the decision-making process of the models. 展开更多
关键词 COVID-19 detection deep neural networks support vector machine CXIs InceptionV3 VGG16 VGG19 t-SNE embedding CLAHE attention mechanism XAI
下载PDF
GliomaCNN: An Effective Lightweight CNN Model in Assessment of Classifying Brain Tumor from Magnetic Resonance Images Using Explainable AI
14
作者 Md.Atiqur Rahman Mustavi Ibne Masum +4 位作者 Khan Md Hasib M.F.Mridha Sultan Alfarhood Mejdl Safran Dunren Che 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2425-2448,共24页
Brain tumors pose a significant threat to human lives and have gained increasing attention as the tenth leading cause of global mortality.This study addresses the pressing issue of brain tumor classification using Mag... Brain tumors pose a significant threat to human lives and have gained increasing attention as the tenth leading cause of global mortality.This study addresses the pressing issue of brain tumor classification using Magnetic resonance imaging(MRI).It focuses on distinguishing between Low-Grade Gliomas(LGG)and High-Grade Gliomas(HGG).LGGs are benign and typically manageable with surgical resection,while HGGs are malignant and more aggressive.The research introduces an innovative custom convolutional neural network(CNN)model,Glioma-CNN.GliomaCNN stands out as a lightweight CNN model compared to its predecessors.The research utilized the BraTS 2020 dataset for its experiments.Integrated with the gradient-boosting algorithm,GliomaCNN has achieved an impressive accuracy of 99.1569%.The model’s interpretability is ensured through SHapley Additive exPlanations(SHAP)and Gradient-weighted Class Activation Mapping(Grad-CAM++).They provide insights into critical decision-making regions for classification outcomes.Despite challenges in identifying tumors in images without visible signs,the model demonstrates remarkable performance in this critical medical application,offering a promising tool for accurate brain tumor diagnosis which paves the way for enhanced early detection and treatment of brain tumors. 展开更多
关键词 Deep learning magnetic resonance imaging convolutional neural networks explainable AI boosting algorithm ablation
下载PDF
Automatic Fetal Segmentation Designed on Computer-Aided Detection with Ultrasound Images
15
作者 Mohana Priya Govindarajan Sangeetha Subramaniam Karuppaiya Bharathi 《Computers, Materials & Continua》 SCIE EI 2024年第11期2967-2986,共20页
In the present research,we describe a computer-aided detection(CAD)method aimed at automatic fetal head circumference(HC)measurement in 2D ultrasonography pictures during all trimesters of pregnancy.The HC might be ut... In the present research,we describe a computer-aided detection(CAD)method aimed at automatic fetal head circumference(HC)measurement in 2D ultrasonography pictures during all trimesters of pregnancy.The HC might be utilized toward determining gestational age and tracking fetal development.This automated approach is particularly valuable in low-resource settings where access to trained sonographers is limited.The CAD system is divided into two steps:to begin,Haar-like characteristics were extracted from ultrasound pictures in order to train a classifier using random forests to find the fetal skull.We identified the HC using dynamic programming,an elliptical fit,and a Hough transform.The computer-aided detection(CAD)program was well-trained on 999 pictures(HC18 challenge data source),and then verified on 335 photos from all trimesters in an independent test set.A skilled sonographer and an expert in medicine personally marked the test set.We used the crown-rump length(CRL)measurement to calculate the reference gestational age(GA).In the first,second,and third trimesters,the median difference between the standard GA and the GA calculated by the skilled sonographer stayed at 0.7±2.7,0.0±4.5,and 2.0±12.0 days,respectively.The regular duration variance between the baseline GA and the health investigator’s GA remained 1.5±3.0,1.9±5.0,and 4.0±14 a couple of days.The mean variance between the standard GA and the CAD system’s GA remained between 0.5 and 5.0,with an additional variation of 2.9 to 12.5 days.The outcomes reveal that the computer-aided detection(CAD)program outperforms an expert sonographer.When paired with the classifications reported in the literature,the provided system achieves results that are comparable or even better.We have assessed and scheduled this computerized approach for HC evaluation,which includes information from all trimesters of gestation. 展开更多
关键词 Fetal growth SEGMENTATION ultrasound images computer-aided detection gestational age crown-rump length head circumference
下载PDF
An Attention-Based Approach to Enhance the Detection and Classification of Android Malware
16
作者 Abdallah Ghourabi 《Computers, Materials & Continua》 SCIE EI 2024年第8期2743-2760,共18页
The dominance of Android in the global mobile market and the open development characteristics of this platform have resulted in a significant increase in malware.These malicious applications have become a serious conc... The dominance of Android in the global mobile market and the open development characteristics of this platform have resulted in a significant increase in malware.These malicious applications have become a serious concern to the security of Android systems.To address this problem,researchers have proposed several machine-learning models to detect and classify Android malware based on analyzing features extracted from Android samples.However,most existing studies have focused on the classification task and overlooked the feature selection process,which is crucial to reduce the training time and maintain or improve the classification results.The current paper proposes a new Android malware detection and classification approach that identifies the most important features to improve classification performance and reduce training time.The proposed approach consists of two main steps.First,a feature selection method based on the Attention mechanism is used to select the most important features.Then,an optimized Light Gradient Boosting Machine(LightGBM)classifier is applied to classify the Android samples and identify the malware.The feature selection method proposed in this paper is to integrate an Attention layer into a multilayer perceptron neural network.The role of the Attention layer is to compute the weighted values of each feature based on its importance for the classification process.Experimental evaluation of the approach has shown that combining the Attention-based technique with an optimized classification algorithm for Android malware detection has improved the accuracy from 98.64%to 98.71%while reducing the training time from 80 to 28 s. 展开更多
关键词 Android malware malware detection feature selection attention mechanism LightGBM mobile security
下载PDF
An Effective Hybrid Model of ELM and Enhanced GWO for Estimating Compressive Strength of Metakaolin-Contained Cemented Materials
17
作者 Abidhan Bardhan Raushan Kumar Singh +1 位作者 Mohammed Alatiyyah Sulaiman Abdullah Alateyah 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1521-1555,共35页
This research proposes a highly effective soft computing paradigm for estimating the compressive strength(CS)of metakaolin-contained cemented materials.The proposed approach is a combination of an enhanced grey wolf o... This research proposes a highly effective soft computing paradigm for estimating the compressive strength(CS)of metakaolin-contained cemented materials.The proposed approach is a combination of an enhanced grey wolf optimizer(EGWO)and an extreme learning machine(ELM).EGWO is an augmented form of the classic grey wolf optimizer(GWO).Compared to standard GWO,EGWO has a better hunting mechanism and produces an optimal performance.The EGWO was used to optimize the ELM structure and a hybrid model,ELM-EGWO,was built.To train and validate the proposed ELM-EGWO model,a sum of 361 experimental results featuring five influencing factors was collected.Based on sensitivity analysis,three distinct cases of influencing parameters were considered to investigate the effect of influencing factors on predictive precision.Experimental consequences show that the constructed ELM-EGWO achieved the most accurate precision in both training(RMSE=0.0959)and testing(RMSE=0.0912)phases.The outcomes of the ELM-EGWO are significantly superior to those of deep neural networks(DNN),k-nearest neighbors(KNN),long short-term memory(LSTM),and other hybrid ELMs constructed with GWO,particle swarm optimization(PSO),harris hawks optimization(HHO),salp swarm algorithm(SSA),marine predators algorithm(MPA),and colony predation algorithm(CPA).The overall results demonstrate that the newly suggested ELM-EGWO has the potential to estimate the CS of metakaolin-contained cemented materials with a high degree of precision and robustness. 展开更多
关键词 Metakaolin-contained cemented materials compressive strength extreme learning machine grey wolf optimizer swarm intelligence uncertainty analysis artificial intelligence
下载PDF
Deep Convolutional Neural Networks for Accurate Classification of Gastrointestinal Tract Syndromes
18
作者 Zahid Farooq Khan Muhammad Ramzan +4 位作者 Mudassar Raza Muhammad Attique Khan Khalid Iqbal Taerang Kim Jae-Hyuk Cha 《Computers, Materials & Continua》 SCIE EI 2024年第1期1207-1225,共19页
Accurate detection and classification of artifacts within the gastrointestinal(GI)tract frames remain a significant challenge in medical image processing.Medical science combined with artificial intelligence is advanc... Accurate detection and classification of artifacts within the gastrointestinal(GI)tract frames remain a significant challenge in medical image processing.Medical science combined with artificial intelligence is advancing to automate the diagnosis and treatment of numerous diseases.Key to this is the development of robust algorithms for image classification and detection,crucial in designing sophisticated systems for diagnosis and treatment.This study makes a small contribution to endoscopic image classification.The proposed approach involves multiple operations,including extracting deep features from endoscopy images using pre-trained neural networks such as Darknet-53 and Xception.Additionally,feature optimization utilizes the binary dragonfly algorithm(BDA),with the fusion of the obtained feature vectors.The fused feature set is input into the ensemble subspace k nearest neighbors(ESKNN)classifier.The Kvasir-V2 benchmark dataset,and the COMSATS University Islamabad(CUI)Wah private dataset,featuring three classes of endoscopic stomach images were used.Performance assessments considered various feature selection techniques,including genetic algorithm(GA),particle swarm optimization(PSO),salp swarm algorithm(SSA),sine cosine algorithm(SCA),and grey wolf optimizer(GWO).The proposed model excels,achieving an overall classification accuracy of 98.25% on the Kvasir-V2 benchmark and 99.90% on the CUI Wah private dataset.This approach holds promise for developing an automated computer-aided system for classifying GI tract syndromes through endoscopy images. 展开更多
关键词 Feature fusion Darknet-53 Xception binary dragonfly algorithm ENSEMBLE
下载PDF
Two-Stage IoT Computational Task Offloading Decision-Making in MEC with Request Holding and Dynamic Eviction
19
作者 Dayong Wang Kamalrulnizam Bin Abu Bakar Babangida Isyaku 《Computers, Materials & Continua》 SCIE EI 2024年第8期2065-2080,共16页
The rapid development of Internet of Things(IoT)technology has led to a significant increase in the computational task load of Terminal Devices(TDs).TDs reduce response latency and energy consumption with the support ... The rapid development of Internet of Things(IoT)technology has led to a significant increase in the computational task load of Terminal Devices(TDs).TDs reduce response latency and energy consumption with the support of task-offloading in Multi-access Edge Computing(MEC).However,existing task-offloading optimization methods typically assume that MEC’s computing resources are unlimited,and there is a lack of research on the optimization of task-offloading when MEC resources are exhausted.In addition,existing solutions only decide whether to accept the offloaded task request based on the single decision result of the current time slot,but lack support for multiple retry in subsequent time slots.It is resulting in TD missing potential offloading opportunities in the future.To fill this gap,we propose a Two-Stage Offloading Decision-making Framework(TSODF)with request holding and dynamic eviction.Long Short-Term Memory(LSTM)-based task-offloading request prediction and MEC resource release estimation are integrated to infer the probability of a request being accepted in the subsequent time slot.The framework learns optimized decision-making experiences continuously to increase the success rate of task offloading based on deep learning technology.Simulation results show that TSODF reduces total TD’s energy consumption and delay for task execution and improves task offloading rate and system resource utilization compared to the benchmark method. 展开更多
关键词 Decision making internet of things load prediction task offloading multi-access edge computing
下载PDF
Refinement modeling and verification of secure operating systems for communication in digital twins
20
作者 Zhenjiang Qian Gaofei Sun +1 位作者 Xiaoshuang Xing Gaurav Dhiman 《Digital Communications and Networks》 SCIE CSCD 2024年第2期304-314,共11页
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d... In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the digital twin communication system implementation is completely correct.Formal verification is currently recognized as a method to ensure the correctness of software system for communication in digital twins because it uses rigorous mathematical methods to verify the correctness of systems for communication in digital twins and can effectively help system designers determine whether the system is designed and implemented correctly.In this paper,we use the interactive theorem proving tool Isabelle/HOL to construct the formal model of the X86 architecture,and to model the related assembly instructions.The verification result shows that the system states obtained after the operations of relevant assembly instructions is consistent with the expected states,indicating that the system meets the design expectations. 展开更多
关键词 Theorem proving Isabelle/HOL Formal verification System modeling Correctness verification
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部