期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
A Novel Inherited Modeling Structure of Automatic Brain Tumor Segmentation from MRI
1
作者 Abdullah AAsiri Tariq Ali +6 位作者 Ahmad Shaf Muhammad Aamir Muhammad Shoaib Muhammad Irfan Hassan A.Alshamrani Fawaz F.Alqahtani Osama M.Alshehri 《Computers, Materials & Continua》 SCIE EI 2022年第11期3983-4002,共20页
Brain tumor is one of the most dreadful worldwide types of cancer and affects people leading to death.Magnetic resonance imaging methods capture skull images that contain healthy and affected tissue.Radiologists check... Brain tumor is one of the most dreadful worldwide types of cancer and affects people leading to death.Magnetic resonance imaging methods capture skull images that contain healthy and affected tissue.Radiologists checked the affected tissue in the slice-by-slice manner,which was timeconsuming and hectic task.Therefore,auto segmentation of the affected part is needed to facilitate radiologists.Therefore,we have considered a hybrid model that inherits the convolutional neural network(CNN)properties to the support vector machine(SVM)for the auto-segmented brain tumor region.The CNN model is initially used to detect brain tumors,while SVM is integrated to segment the tumor region correctly.The proposed method was evaluated on a publicly available BraTS2020 dataset.The statistical parameters used in this work for the mathematical measures are precision,accuracy,specificity,sensitivity,and dice coefficient.Overall,our method achieved an accuracy value of 0.98,which is most prominent than existing techniques.Moreover,the proposed approach is more suitable for medical experts to diagnose the early stages of the brain tumor. 展开更多
关键词 Brain tumor support vector machine convolutional neural network BraTS CLASSIFICATION
暂未订购
5Ws of Green and Sustainable Software 被引量:1
2
作者 Coral Calero Javier Mancebo +4 位作者 Felix Garcia Maria Angeles Moraga Jose Alberto Garcia Berna Jose Luis Fernandez-Aleman Ambrosio Toval 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第3期401-414,共14页
Green and Sustainable Software has emerged as a new and highly active area in the software community.After several years of research and work,we believe that it is now necessary to obtain a general snapshot of how the... Green and Sustainable Software has emerged as a new and highly active area in the software community.After several years of research and work,we believe that it is now necessary to obtain a general snapshot of how the research in this area is evolving.To do so,we have applied the 5 Ws(why,when,who,where,and what),a formula for getting the complete story on a subject.We have therefore carried out a study,using 542 publications related to Green and Sustainable Software research;these were recovered using SCOPUS.The results obtained allow us to conclude that it is important to identify key elements of the research to allow researchers be fully aware of the state of the research on Green and Sustainable Software(why);the study uses papers published between 2000 and the beginning of November 2018(when);the most prolific authors are mainly from Europe,although the USA is the most active country,Green and Sustainable Software being a very interactive area with a good number of multinational publications(who);the top five keywords related to sustainable aspects are Green Software,Green IT,Software Sustainability,Energy Consumption,and Energy Efficiency(what);finally,as regards the places authors prefer to publish in,there is almost a complete balance between conferences and journals,with a trend towards an increase in the number of publications(where). 展开更多
关键词 Green Software Sustainable Software Software Engineering Software Sustainability Energy Efficiency Energy Utilization
原文传递
Fingerprint matching,spoof and liveness detection:classification and literature review
3
作者 Syed Farooq ALI Muhammad Aamir KHAN Ahmed Sohail ASLAM 《Frontiers of Computer Science》 SCIE EI CSCD 2021年第1期179-196,共18页
Fingerprint matching,spoof mitigation and liveness detection are the trendiest biometric techniques,mostly because of their stability through life,uniqueness and their least risk of invasion.In recent decade,several t... Fingerprint matching,spoof mitigation and liveness detection are the trendiest biometric techniques,mostly because of their stability through life,uniqueness and their least risk of invasion.In recent decade,several techniques are presented to address these challenges over well-known data-sets.This study provides a comprehensive review on the fingerprint algorithms and techniques which have been published in the last few decades.It divides the research on fingerprint into nine different approaches including feature based,fuzzy logic,holistic,image enhancement,latent,conventional machine learning,deep learning,template matching and miscellaneous tech-niques.Among these,deep learning approach has outperformed other approaches and gained significant attention for future research.By reviewing fingerprint literature,it is historically divided into four eras based on 106 referred papers and their cumulative citations. 展开更多
关键词 computer society template matching fingerprint recognition SURVEY deep learning machine learning
原文传递
A Process Oriented Integration Model for Smart Health Services
4
作者 Farzana Kausar Gondal Syed Khuram Shahzad +1 位作者 Muhammad Arfan Jaffar Muhammad Waseem Iqbal 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1369-1386,共18页
Cities are facing challenges of high rise in population number and con-sequently need to be equipped with latest smart services to provide luxuries of life to its residents.Smart integrated solutions are also a need t... Cities are facing challenges of high rise in population number and con-sequently need to be equipped with latest smart services to provide luxuries of life to its residents.Smart integrated solutions are also a need to deal with the social and environmental challenges,caused by increasing urbanization.Currently,the development of smart services’integrated network,within a city,is facing the bar-riers including;less efficient collection and sharing of data,along with inadequate collaboration of software and hardware.Aiming to resolve these issues,this paper recommended a solution for a synchronous functionality in the smart services’integration process through modeling technique.Using this integration modeling solution,atfirst,the service participants,processes and tasks of smart services are identified and then standard illustrations are developed for the better understand-ing of the integrated service group environment.Business process modeling and notation(BPMN)language based models are developed and discussed for a devised case study,to test and experiment i.e.,for remote healthcare from a smart home.The research is concluded with the integration process model application for the required data sharing among different service groups.The outcomes of the modeling are better understanding and attaining maximum automation that can be referenced and replicated. 展开更多
关键词 Process modeling business process business process integration business process modeling and notation
在线阅读 下载PDF
Software Vulnerabilities Overview:A Descriptive Study 被引量:2
5
作者 Mario Calín Sánchez Juan Manuel Carrillo de Gea +2 位作者 José Luis Fernández-Alemán Jesús Garcerán Ambrosio Toval 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第2期270-280,共11页
Computer security is a matter of great interest.In the last decade there have been numerous cases of cybercrime based on the exploitation of software vulnerabilities.This fact has generated a great social concern and ... Computer security is a matter of great interest.In the last decade there have been numerous cases of cybercrime based on the exploitation of software vulnerabilities.This fact has generated a great social concern and a greater importance of computer security as a discipline.In this work,the most important vulnerabilities of recent years are identified,classified,and categorized individually.A measure of the impact of each vulnerability is used to carry out this classification,considering the number of products affected by each vulnerability,as well as its severity.In addition,the categories of vulnerabilities that have the greatest presence are identified.Based on the results obtained in this study,we can understand the consequences of the most common vulnerabilities,which software products are affected,how to counteract these vulnerabilities,and what their current trend is. 展开更多
关键词 descriptive study software security software vulnerabilities vulnerability databases
原文传递
Mathematical study of fractional-order biological population model using optimal homotopy asymptotic method 被引量:1
6
作者 S. Sarwar M. A. Zahid S. Iqbal 《International Journal of Biomathematics》 2016年第6期17-33,共17页
In this paper, we study the fractional-order biological population models (FI3PMs) with Malthusian~ Verhulst, and porous media laws. The fractional derivative is defined in Caputo sense. The optimal homotopy asympto... In this paper, we study the fractional-order biological population models (FI3PMs) with Malthusian~ Verhulst, and porous media laws. The fractional derivative is defined in Caputo sense. The optimal homotopy asymptotic method (OHAM) for partial differ- ential equations (PDEs) is extended and successfully implemented to solve FBPMs. Third-order approximate solutions are obtained and compared with the exact solutions. The numerical results unveil that the proposed extension in the OHAM for fractional- order differential problems is very effective and simple in computation. The results reveal the effectiveness with high accuracy and extremely efficient to handle most complicated biological population models. 展开更多
关键词 Biological models population models fractional calculus optimal homotopyasymptotic method partial differential equations.
原文传递
A mathematical analysis of MHD blood flow of Eyring-Powell fluid through a constricted artery 被引量:1
7
作者 Najma Saleem Sufian Munawar 《International Journal of Biomathematics》 2016年第2期175-186,共12页
The present study deals with the flow of blood through a stenotic artery in the presence of a uniform magnetic field. Different flow situations are taken into account by considering the regular and irregular shapes of... The present study deals with the flow of blood through a stenotic artery in the presence of a uniform magnetic field. Different flow situations are taken into account by considering the regular and irregular shapes of stenosis lying inside the walls of artery. Blood inside the artery is assumed to be Eyring-Powell fluid. A mathematical model is developed and simplified under the physical assumptions of stenosis. The regular perturbation method is adopted to find the solutions for axial velocity and pressure gradient. The variations in pressure drop across the stenosis length, the impedance and the shear stress at the walls of stenotic artery are discussed in detail through graphs. It is observed that the Eyring-Powell fluid is helpful in reducing the resistance to the flow in stenotic artery. Moreover, symmetric form of stenosis is more hazardous as compared to asymmetric stenosis. 展开更多
关键词 Blood flow magnetic field stenotic artery Eyring-Powell fluid.
原文传递
Resilient TCP Variant Enabling Smooth Network Updates for Software-Defined Data Center Networks
8
作者 Abdul Basit Dogar Sami Ullah +3 位作者 Yiran Zhang Hisham Alasmary Muhammad Waqas Sheng Chen 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第5期1615-1632,共18页
Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data centers.Modern TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not ... Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data centers.Modern TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not resilient to network updates that provoke flow rerouting.In this paper,we first demonstrate that popular TCP implementations perform inadequately in the presence of frequent and inconsistent network updates,because inconsistent and frequent network updates result in out-of-order packets and packet drops induced via transitory congestion and lead to serious performance deterioration.We look into the causes and propose a network update-friendly TCP(NUFTCP),which is an extension of the DCTCP variant,as a solution.Simulations are used to assess the proposed NUFTCP.Our findings reveal that NUFTCP can more effectively manage the problems of out-of-order packets and packet drops triggered in network updates,and it outperforms DCTCP considerably. 展开更多
关键词 software defined data center networks network updates DCTCP out-of-order packets packet drop SDN
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部