期刊文献+
共找到787篇文章
< 1 2 40 >
每页显示 20 50 100
The computerized LASSI-BC Test versus the Standard LASSI-L Paper-and-Pencil Version in Community-Based-Samples
1
作者 Rosie E. Curiel Cid Alexandra Ortega +13 位作者 Ubbo Visser Marcela Kitaigorodsky D. Diane Zheng Diana Hincapie Kirsten Horne Crenshaw Ashleigh Beaulieu Brooke Bosworth Liz Gallardo Emory Neer Sofia Ramirez Elizabeth A. Crocco Mike Georgiou Efrosyni Sfakianaki David A. Loewenstein 《Advances in Alzheimer's Disease》 CAS 2024年第1期11-25,共15页
Proactive Semantic Interference (PSI) and failure to recover from PSI (frPSI), are novel constructs assessed by the LASSI-L. These measures are sensitive to cognitive changes in early Mild Cognitive Impairment (MCI) a... Proactive Semantic Interference (PSI) and failure to recover from PSI (frPSI), are novel constructs assessed by the LASSI-L. These measures are sensitive to cognitive changes in early Mild Cognitive Impairment (MCI) and preclinical AD determined by Aβ load using PET. The goal of this study was to compare a new computerized version of the LASSI-L (LASSI-Brief Computerized) to the standard paper-and-pencil version of the test. In this study, we examined 110 cognitively unimpaired (CU) older adults and 79 with amnestic MCI (aMCI) who were administered the paper-and-pencil form of the LASSI-L. Their performance was compared with 62 CU older adults and 52 aMCI participants examined using the LASSI-BC. After adjustment for covariates (degree of initial learning, sex, education, and language of evaluation) both the standard and computerized versions distinguished between aMCI and CU participants. The performance of CU and aMCI groups using either form was relatively commensurate. Importantly, an optimal combination of Cued B2 recall and Cued B1 intrusions on the LASSI-BC yielded an area under the ROC curve of .927, a sensitivity of 92.3% and specificity of 88.1%, relative to an area under the ROC curve of .815, a sensitivity of 72.5%, and a specificity of 79.1% obtained for the paper-and-pencil LASSI-L. Overall, the LASSI-BC was comparable, and in some ways, superior to the paper-and-pencil LASSI-L. Advantages of the LASSI-BC include a more standardized administration, suitability for remote assessment, and an automated scoring mechanism that can be verified by a built-in audio recording of responses. 展开更多
关键词 Mild Cognitive Impairment Proactive Semantic Interference LASSI-L Computerized Cognitive Assessment
下载PDF
Computer-aided texture analysis combined with experts' knowledge: Improving endoscopic celiac disease diagnosis 被引量:1
2
作者 Michael Gadermayr Hubert Kogler +3 位作者 Maximilian Karla Dorit Merhof Andreas Uhl Andreas Vécsei 《World Journal of Gastroenterology》 SCIE CAS 2016年第31期7124-7134,共11页
AIM: To further improve the endoscopic detection of intestinal mucosa alterations due to celiac disease(CD).METHODS: We assessed a hybrid approach based on the integration of expert knowledge into the computerbased cl... AIM: To further improve the endoscopic detection of intestinal mucosa alterations due to celiac disease(CD).METHODS: We assessed a hybrid approach based on the integration of expert knowledge into the computerbased classification pipeline. A total of 2835 endoscopic images from the duodenum were recorded in 290 children using the modified immersion technique(MIT). These children underwent routine upper endoscopy for suspected CD or non-celiac upper abdominal symptoms between August 2008 and December 2014. Blinded to the clinical data and biopsy results, three medical experts visually classified each image as normal mucosa(Marsh-0) or villous atrophy(Marsh-3). The experts' decisions were further integrated into state-of-the-arttexture recognition systems. Using the biopsy results as the reference standard, the classification accuracies of this hybrid approach were compared to the experts' diagnoses in 27 different settings.RESULTS: Compared to the experts' diagnoses, in 24 of 27 classification settings(consisting of three imaging modalities, three endoscopists and three classification approaches), the best overall classification accuracies were obtained with the new hybrid approach. In 17 of 24 classification settings, the improvements achieved with the hybrid approach were statistically significant(P < 0.05). Using the hybrid approach classification accuracies between 94% and 100% were obtained. Whereas the improvements are only moderate in the case of the most experienced expert, the results of the less experienced expert could be improved significantly in 17 out of 18 classification settings. Furthermore, the lowest classification accuracy, based on the combination of one database and one specific expert, could be improved from 80% to 95%(P < 0.001).CONCLUSION: The overall classification performance of medical experts, especially less experienced experts, can be boosted significantly by integrating expert knowledge into computer-aided diagnosis systems. 展开更多
关键词 CELIAC disease DIAGNOSIS ENDOSCOPY COMPUTER-AIDED texture analysis BIOPSY Pattern recognition
下载PDF
Quest for the best endoscopic imaging modality for computer-assisted colonic polyp staging 被引量:2
3
作者 Georg Wimmer Michael Gadermayr +8 位作者 Gernot Wolkersdorfer Roland Kwitt Toru Tamaki Jens Tischendorf Michael Hafner Shigeto Yoshida Shinji Tanaka Dorit Merhof Andreas Uhl 《World Journal of Gastroenterology》 SCIE CAS 2019年第10期1197-1209,共13页
BACKGROUND It was shown in previous studies that high definition endoscopy, high magnification endoscopy and image enhancement technologies, such as chromoendoscopy and digital chromoendoscopy [narrow-band imaging(NBI... BACKGROUND It was shown in previous studies that high definition endoscopy, high magnification endoscopy and image enhancement technologies, such as chromoendoscopy and digital chromoendoscopy [narrow-band imaging(NBI), iScan] facilitate the detection and classification of colonic polyps during endoscopic sessions. However, there are no comprehensive studies so far that analyze which endoscopic imaging modalities facilitate the automated classification of colonic polyps. In this work, we investigate the impact of endoscopic imaging modalities on the results of computer-assisted diagnosis systems for colonic polyp staging.AIM To assess which endoscopic imaging modalities are best suited for the computerassisted staging of colonic polyps.METHODS In our experiments, we apply twelve state-of-the-art feature extraction methods for the classification of colonic polyps to five endoscopic image databases of colonic lesions. For this purpose, we employ a specifically designed experimental setup to avoid biases in the outcomes caused by differing numbers of images per image database. The image databases were obtained using different imaging modalities. Two databases were obtained by high-definition endoscopy in combination with i-Scan technology(one with chromoendoscopy and one without chromoendoscopy). Three databases were obtained by highmagnification endoscopy(two databases using narrow band imaging and one using chromoendoscopy). The lesions are categorized into non-neoplastic and neoplastic according to the histological diagnosis.RESULTS Generally, it is feature-dependent which imaging modalities achieve high results and which do not. For the high-definition image databases, we achieved overall classification rates of up to 79.2% with chromoendoscopy and 88.9% without chromoendoscopy. In the case of the database obtained by high-magnification chromoendoscopy, the classification rates were up to 81.4%. For the combination of high-magnification endoscopy with NBI, results of up to 97.4% for one database and up to 84% for the other were achieved. Non-neoplastic lesions were classified more accurately in general than non-neoplastic lesions. It was shown that the image recording conditions highly affect the performance of automated diagnosis systems and partly contribute to a stronger effect on the staging results than the used imaging modality.CONCLUSION Chromoendoscopy has a negative impact on the results of the methods. NBI is better suited than chromoendoscopy. High-definition and high-magnification endoscopy are equally suited. 展开更多
关键词 ENDOSCOPY Colonic polyps Automated diagnosis system Narrow-band imaging CHROMOENDOSCOPY Imaging modalities Image enhancement technologies
下载PDF
Deep Learning Enabled Computer Aided Diagnosis Model for Lung Cancer using Biomedical CT Images 被引量:1
4
作者 Mohammad Alamgeer Hanan Abdullah Mengash +5 位作者 Radwa Marzouk Mohamed K Nour Anwer Mustafa Hilal Abdelwahed Motwakel Abu Sarwar Zamani Mohammed Rizwanullah 《Computers, Materials & Continua》 SCIE EI 2022年第10期1437-1448,共12页
Early detection of lung cancer can help for improving the survival rate of the patients.Biomedical imaging tools such as computed tomography(CT)image was utilized to the proper identification and positioning of lung c... Early detection of lung cancer can help for improving the survival rate of the patients.Biomedical imaging tools such as computed tomography(CT)image was utilized to the proper identification and positioning of lung cancer.The recently developed deep learning(DL)models can be employed for the effectual identification and classification of diseases.This article introduces novel deep learning enabled CAD technique for lung cancer using biomedical CT image,named DLCADLC-BCT technique.The proposed DLCADLC-BCT technique intends for detecting and classifying lung cancer using CT images.The proposed DLCADLC-BCT technique initially uses gray level co-occurrence matrix(GLCM)model for feature extraction.Also,long short term memory(LSTM)model was applied for classifying the existence of lung cancer in the CT images.Moreover,moth swarm optimization(MSO)algorithm is employed to optimally choose the hyperparameters of the LSTM model such as learning rate,batch size,and epoch count.For demonstrating the improved classifier results of the DLCADLC-BCT approach,a set of simulations were executed on benchmark dataset and the outcomes exhibited the supremacy of the DLCADLC-BCT technique over the recent approaches. 展开更多
关键词 Biomedical images lung cancer deep learning machine learning metaheuristics hyperparameter tuning
下载PDF
Computerized Detection of Limbal Stem Cell Deficiency from Digital Cornea Images
5
作者 Hanan A.Hosni Mahmoud Doaa S.Khafga Amal H.Alharbi 《Computer Systems Science & Engineering》 SCIE EI 2022年第2期805-821,共17页
Limbal Stem Cell Deficiency(LSCD)is an eye disease that can cause corneal opacity and vascularization.In its advanced stage it can lead to a degree of visual impairment.It involves the changing in the semispherical sh... Limbal Stem Cell Deficiency(LSCD)is an eye disease that can cause corneal opacity and vascularization.In its advanced stage it can lead to a degree of visual impairment.It involves the changing in the semispherical shape of the cornea to a drooping shape to downwards direction.LSCD is hard to be diagnosed at early stages.The color and texture of the cornea surface can provide significant information about the cornea affected by LSCD.Parameters such as shape and texture are very crucial to differentiate normal from LSCD cornea.Although several medical approaches exist,most of them requires complicated procedure and medical devices.Therefore,in this paper,we pursued the development of a LSCD detection technique(LDT)utilizing image processing methods.Early diagnosis of LSCD is very crucial for physicians to arrange for effective treatment.In the proposed technique,we developed a method for LSCD detection utilizing frontal eye images.A dataset of 280 eye images of frontal and lateral LSCD and normal patients were used in this research.First,the cornea region of both frontal and lateral images is segmented,and the geometric features are extracted through the automated active contour model and the spline curve.While the texture features are extracted using the feature selection algorithm.The experimental results exhibited that the combined features of the geometric and texture will exhibit accuracy of 95.95%,sensitivity of 97.91% and specificity of 94.05% with the random forest classifier of n=40.As a result,this research developed a Limbal stem cell deficiency detection system utilizing features’fusion using image processing techniques for frontal and lateral digital images of the eyes. 展开更多
关键词 Feature extraction corneal opacity geometric features computerized detection image processing
下载PDF
Framework for a Computer-Aided Treatment Prediction (CATP) System for Breast Cancer
6
作者 Emad Abd Al Rahman Nur Intan Raihana Ruhaiyem +1 位作者 Majed Bouchahma Kamarul Imran Musa 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期3007-3028,共22页
This study offers a framework for a breast cancer computer-aided treat-ment prediction(CATP)system.The rising death rate among women due to breast cancer is a worldwide health concern that can only be addressed by ear... This study offers a framework for a breast cancer computer-aided treat-ment prediction(CATP)system.The rising death rate among women due to breast cancer is a worldwide health concern that can only be addressed by early diagno-sis and frequent screening.Mammography has been the most utilized breast ima-ging technique to date.Radiologists have begun to use computer-aided detection and diagnosis(CAD)systems to improve the accuracy of breast cancer diagnosis by minimizing human errors.Despite the progress of artificial intelligence(AI)in the medical field,this study indicates that systems that can anticipate a treatment plan once a patient has been diagnosed with cancer are few and not widely used.Having such a system will assist clinicians in determining the optimal treatment plan and avoid exposing a patient to unnecessary hazardous treatment that wastes a significant amount of money.To develop the prediction model,data from 336,525 patients from the SEER dataset were split into training(80%),and testing(20%)sets.Decision Trees,Random Forest,XGBoost,and CatBoost are utilized with feature importance to build the treatment prediction model.The best overall Area Under the Curve(AUC)achieved was 0.91 using Random Forest on the SEER dataset. 展开更多
关键词 BREASTCANCER MACHINELEARNING featureimportance FEATURESELECTION treatment prediction SEER dataset computer-aided treatment prediction(CATP) clinical decision support system
下载PDF
Deep Fake Detection Using Computer Vision-Based Deep Neural Network with Pairwise Learning
7
作者 R.Saravana Ram M.Vinoth Kumar +3 位作者 Tareq M.Al-shami Mehedi Masud Hanan Aljuaid Mohamed Abouhawwash 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2449-2462,共14页
Deep learning-based approaches are applied successfully in manyfields such as deepFake identification,big data analysis,voice recognition,and image recognition.Deepfake is the combination of deep learning in fake creati... Deep learning-based approaches are applied successfully in manyfields such as deepFake identification,big data analysis,voice recognition,and image recognition.Deepfake is the combination of deep learning in fake creation,which states creating a fake image or video with the help of artificial intelligence for political abuse,spreading false information,and pornography.The artificial intel-ligence technique has a wide demand,increasing the problems related to privacy,security,and ethics.This paper has analyzed the features related to the computer vision of digital content to determine its integrity.This method has checked the computer vision features of the image frames using the fuzzy clustering feature extraction method.By the proposed deep belief network with loss handling,the manipulation of video/image is found by means of a pairwise learning approach.This proposed approach has improved the accuracy of the detection rate by 98%on various datasets. 展开更多
关键词 Deep fake deep belief network fuzzy clustering feature extraction pairwise learning
下载PDF
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data 被引量:1
8
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
下载PDF
Improving the Segmentation of Arabic Handwriting Using Ligature Detection Technique
9
作者 Husam Ahmad Al Hamad Mohammad Shehab 《Computers, Materials & Continua》 SCIE EI 2024年第5期2015-2034,共20页
Recognizing handwritten characters remains a critical and formidable challenge within the realm of computervision. Although considerable strides have been made in enhancing English handwritten character recognitionthr... Recognizing handwritten characters remains a critical and formidable challenge within the realm of computervision. Although considerable strides have been made in enhancing English handwritten character recognitionthrough various techniques, deciphering Arabic handwritten characters is particularly intricate. This complexityarises from the diverse array of writing styles among individuals, coupled with the various shapes that a singlecharacter can take when positioned differently within document images, rendering the task more perplexing. Inthis study, a novel segmentation method for Arabic handwritten scripts is suggested. This work aims to locatethe local minima of the vertical and diagonal word image densities to precisely identify the segmentation pointsbetween the cursive letters. The proposed method starts with pre-processing the word image without affectingits main features, then calculates the directions pixel density of the word image by scanning it vertically and fromangles 30° to 90° to count the pixel density fromall directions and address the problem of overlapping letters, whichis a commonly attitude in writing Arabic texts by many people. Local minima and thresholds are also determinedto identify the ideal segmentation area. The proposed technique is tested on samples obtained fromtwo datasets: Aself-curated image dataset and the IFN/ENIT dataset. The results demonstrate that the proposed method achievesa significant improvement in the proportions of cursive segmentation of 92.96% on our dataset, as well as 89.37%on the IFN/ENIT dataset. 展开更多
关键词 Arabic handwritten SEGMENTATION image processing ligature detection technique intelligent recognition
下载PDF
Using Improved Particle Swarm Optimization Algorithm for Location Problem of Drone Logistics Hub
10
作者 Li Zheng Gang Xu Wenbin Chen 《Computers, Materials & Continua》 SCIE EI 2024年第1期935-957,共23页
Drone logistics is a novel method of distribution that will become prevalent.The advantageous location of the logistics hub enables quicker customer deliveries and lower fuel consumption,resulting in cost savings for ... Drone logistics is a novel method of distribution that will become prevalent.The advantageous location of the logistics hub enables quicker customer deliveries and lower fuel consumption,resulting in cost savings for the company’s transportation operations.Logistics firms must discern the ideal location for establishing a logistics hub,which is challenging due to the simplicity of existing models and the intricate delivery factors.To simulate the drone logistics environment,this study presents a new mathematical model.The model not only retains the aspects of the current models,but also considers the degree of transportation difficulty from the logistics hub to the village,the capacity of drones for transportation,and the distribution of logistics hub locations.Moreover,this paper proposes an improved particle swarm optimization(PSO)algorithm which is a diversity-based hybrid PSO(DHPSO)algorithm to solve this model.In DHPSO,the Gaussian random walk can enhance global search in the model space,while the bubble-net attacking strategy can speed convergence.Besides,Archimedes spiral strategy is employed to overcome the local optima trap in the model and improve the exploitation of the algorithm.DHPSO maintains a balance between exploration and exploitation while better defining the distribution of logistics hub locations Numerical experiments show that the newly proposed model always achieves better locations than the current model.Comparing DHPSO with other state-of-the-art intelligent algorithms,the efficiency of the scheme can be improved by 42.58%.This means that logistics companies can reduce distribution costs and consumers can enjoy a more enjoyable shopping experience by using DHPSO’s location selection.All the results show the location of the drone logistics hub is solved by DHPSO effectively. 展开更多
关键词 Drone logistics location problem mathematical model DIVERSITY particle swarm optimization
下载PDF
An Online Fake Review Detection Approach Using Famous Machine Learning Algorithms
11
作者 Asma Hassan Alshehri 《Computers, Materials & Continua》 SCIE EI 2024年第2期2767-2786,共20页
Online review platforms are becoming increasingly popular,encouraging dishonest merchants and service providers to deceive customers by creating fake reviews for their goods or services.Using Sybil accounts,bot farms,... Online review platforms are becoming increasingly popular,encouraging dishonest merchants and service providers to deceive customers by creating fake reviews for their goods or services.Using Sybil accounts,bot farms,and real account purchases,immoral actors demonize rivals and advertise their goods.Most academic and industry efforts have been aimed at detecting fake/fraudulent product or service evaluations for years.The primary hurdle to identifying fraudulent reviews is the lack of a reliable means to distinguish fraudulent reviews from real ones.This paper adopts a semi-supervised machine learning method to detect fake reviews on any website,among other things.Online reviews are classified using a semi-supervised approach(PU-learning)since there is a shortage of labeled data,and they are dynamic.Then,classification is performed using the machine learning techniques Support Vector Machine(SVM)and Nave Bayes.The performance of the suggested system has been compared with standard works,and experimental findings are assessed using several assessment metrics. 展开更多
关键词 SECURITY fake review semi-supervised learning ML algorithms review detection
下载PDF
Smart Healthcare Activity Recognition Using Statistical Regression and Intelligent Learning
12
作者 K.Akilandeswari Nithya Rekha Sivakumar +2 位作者 Hend Khalid Alkahtani Shakila Basheer Sara Abdelwahab Ghorashi 《Computers, Materials & Continua》 SCIE EI 2024年第1期1189-1205,共17页
In this present time,Human Activity Recognition(HAR)has been of considerable aid in the case of health monitoring and recovery.The exploitation of machine learning with an intelligent agent in the area of health infor... In this present time,Human Activity Recognition(HAR)has been of considerable aid in the case of health monitoring and recovery.The exploitation of machine learning with an intelligent agent in the area of health informatics gathered using HAR augments the decision-making quality and significance.Although many research works conducted on Smart Healthcare Monitoring,there remain a certain number of pitfalls such as time,overhead,and falsification involved during analysis.Therefore,this paper proposes a Statistical Partial Regression and Support Vector Intelligent Agent Learning(SPR-SVIAL)for Smart Healthcare Monitoring.At first,the Statistical Partial Regression Feature Extraction model is used for data preprocessing along with the dimensionality-reduced features extraction process.Here,the input dataset the continuous beat-to-beat heart data,triaxial accelerometer data,and psychological characteristics were acquired from IoT wearable devices.To attain highly accurate Smart Healthcare Monitoring with less time,Partial Least Square helps extract the dimensionality-reduced features.After that,with these resulting features,SVIAL is proposed for Smart Healthcare Monitoring with the help of Machine Learning and Intelligent Agents to minimize both analysis falsification and overhead.Experimental evaluation is carried out for factors such as time,overhead,and false positive rate accuracy concerning several instances.The quantitatively analyzed results indicate the better performance of our proposed SPR-SVIAL method when compared with two state-of-the-art methods. 展开更多
关键词 Internet of Things smart health care monitoring human activity recognition intelligent agent learning statistical partial regression support vector
下载PDF
NFA:A neural factorization autoencoder based online telephony fraud detection
13
作者 Abdul Wahid Mounira Msahli +1 位作者 Albert Bifet Gerard Memmi 《Digital Communications and Networks》 SCIE CSCD 2024年第1期158-167,共10页
The proliferation of internet communication channels has increased telecom fraud,causing billions of euros in losses for customers and the industry each year.Fraudsters constantly find new ways to engage in illegal ac... The proliferation of internet communication channels has increased telecom fraud,causing billions of euros in losses for customers and the industry each year.Fraudsters constantly find new ways to engage in illegal activity on the network.To reduce these losses,a new fraud detection approach is required.Telecom fraud detection involves identifying a small number of fraudulent calls from a vast amount of call traffic.Developing an effective strategy to combat fraud has become challenging.Although much effort has been made to detect fraud,most existing methods are designed for batch processing,not real-time detection.To solve this problem,we propose an online fraud detection model using a Neural Factorization Autoencoder(NFA),which analyzes customer calling patterns to detect fraudulent calls.The model employs Neural Factorization Machines(NFM)and an Autoencoder(AE)to model calling patterns and a memory module to adapt to changing customer behaviour.We evaluate our approach on a large dataset of real-world call detail records and compare it with several state-of-the-art methods.Our results show that our approach outperforms the baselines,with an AUC of 91.06%,a TPR of 91.89%,an FPR of 14.76%,and an F1-score of 95.45%.These results demonstrate the effectiveness of our approach in detecting fraud in real-time and suggest that it can be a valuable tool for preventing fraud in telecommunications networks. 展开更多
关键词 Telecom industry Streaming anomaly detection Fraud analysis Factorization machine Real-time system Security
下载PDF
Impact of correlated private signals on continuous-time insider trading
14
作者 ZHOU Yonghui XIAO Kai 《运筹学学报(中英文)》 CSCD 北大核心 2024年第3期97-107,共11页
A model of continuous-time insider trading in which a risk-neutral in-sider possesses two imperfect correlated signals of a risky asset is studied.By conditional expectation theory and filtering theory,we first establ... A model of continuous-time insider trading in which a risk-neutral in-sider possesses two imperfect correlated signals of a risky asset is studied.By conditional expectation theory and filtering theory,we first establish three lemmas:normal corre-lation,equivalent pricing and equivalent profit,which can guarantee to turn our model into a model with insider knowing full information.Then we investigate the impact of the two correlated signals on the market equilibrium consisting of optimal insider trading strategy and semi-strong pricing rule.It shows that in the equilibrium,(1)the market depth is constant over time;(2)if the two noisy signals are not linerly correlated,then all private information of the insider is incorporated into prices in the end while the whole information on the asset value can not incorporated into prices in the end;(3)if the two noisy signals are linear correlated such that the insider can infer the whole information of the asset value,then our model turns into a model with insider knowing full information;(4)if the two noisy signals are the same then the total ex ant profit of the insider is increasing with the noise decreasing,while down to O as the noise going up to infinity;(5)if the two noisy signals are not linear correlated then with one noisy signal fixed,the total ex ante profit of the insider is single-peaked with a unique minimum with respect to the other noisy signal value,and furthermore as the noisy value going to O it gets its maximum,the profit in the case that the real value is observed. 展开更多
关键词 continuous-time insider trading risk neutral private correlated signals linear bayesian equilibrium market depth residual information
下载PDF
Adaptive Resource Allocation Algorithm for 5G Vehicular Cloud Communication
15
作者 Huanhuan Li Hongchang Wei +1 位作者 Zheliang Chen Yue Xu 《Computers, Materials & Continua》 SCIE EI 2024年第8期2199-2219,共21页
The current resource allocation in 5G vehicular networks for mobile cloud communication faces several challenges,such as low user utilization,unbalanced resource allocation,and extended adaptive allocation time.We pro... The current resource allocation in 5G vehicular networks for mobile cloud communication faces several challenges,such as low user utilization,unbalanced resource allocation,and extended adaptive allocation time.We propose an adaptive allocation algorithm for mobile cloud communication resources in 5G vehicular networks to address these issues.This study analyzes the components of the 5G vehicular network architecture to determine the performance of different components.It is ascertained that the communication modes in 5G vehicular networks for mobile cloud communication include in-band and out-of-band modes.Furthermore,this study analyzes the single-hop and multi-hop modes in mobile cloud communication and calculates the resource transmission rate and bandwidth in different communication modes.The study also determines the scenario of one-way and two-way vehicle lane cloud communication network connectivity,calculates the probability of vehicle network connectivity under different mobile cloud communication radii,and determines the amount of cloud communication resources required by vehicles in different lane scenarios.Based on the communication status of users in 5G vehicular networks,this study calculates the bandwidth and transmission rate of the allocated channels using Shannon’s formula.It determines the adaptive allocation of cloud communication resources,introduces an objective function to obtain the optimal solution after allocation,and completes the adaptive allocation process.The experimental results demonstrate that,with the application of the proposed method,the maximum utilization of user communication resources reaches approximately 99%.The balance coefficient curve approaches 1,and the allocation time remains under 2 s.This indicates that the proposed method has higher adaptive allocation efficiency. 展开更多
关键词 5G vehicular networks mobile cloud communication resource allocation channel capacity network connectivity communication radius objective function
下载PDF
5G Resource Allocation Using Feature Selection and Greylag Goose Optimization Algorithm
16
作者 Amel Ali Alhussan S.K.Towfek 《Computers, Materials & Continua》 SCIE EI 2024年第7期1179-1201,共23页
In the contemporary world of highly efficient technological development,fifth-generation technology(5G)is seen as a vital step forward with theoretical maximum download speeds of up to twenty gigabits per second(Gbps)... In the contemporary world of highly efficient technological development,fifth-generation technology(5G)is seen as a vital step forward with theoretical maximum download speeds of up to twenty gigabits per second(Gbps).As far as the current implementations are concerned,they are at the level of slightly below 1 Gbps,but this allowed a great leap forward from fourth generation technology(4G),as well as enabling significantly reduced latency,making 5G an absolute necessity for applications such as gaming,virtual conferencing,and other interactive electronic processes.Prospects of this change are not limited to connectivity alone;it urges operators to refine their business strategies and offers users better and improved digital solutions.An essential factor is optimization and the application of artificial intelligence throughout the general arrangement of intricate and detailed 5G lines.Integrating Binary Greylag Goose Optimization(bGGO)to achieve a significant reduction in the feature set while maintaining or improving model performance,leading to more efficient and effective 5G network management,and Greylag Goose Optimization(GGO)increases the efficiency of the machine learningmodels.Thus,the model performs and yields more accurate results.This work proposes a new method to schedule the resources in the next generation,5G,based on a feature selection using GGO and a regression model that is an ensemble of K-Nearest Neighbors(KNN),Gradient Boosting,and Extra Trees algorithms.The ensemble model shows better prediction performance with the coefficient of determination R squared value equal to.99348.The proposed framework is supported by several Statistical analyses,such as theWilcoxon signed-rank test.Some of the benefits of this study are the introduction of new efficient optimization algorithms,the selection of features and more reliable ensemble models which improve the efficiency of 5G technology. 展开更多
关键词 OPTIMIZATION ensemble learning 5G technology artificial intelligence greylag goose optimization ANOVA test
下载PDF
Hybrid Approach for Cost Efficient Application Placement in Fog-Cloud Computing Environments
17
作者 Abdulelah Alwabel Chinmaya Kumar Swain 《Computers, Materials & Continua》 SCIE EI 2024年第6期4127-4148,共22页
Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data sources.How... Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data sources.However,the majority of the fog nodes in this environment are geographically scattered with resources that are limited in terms of capabilities compared to cloud nodes,thus making the application placement problem more complex than that in cloud computing.An approach for cost-efficient application placement in fog-cloud computing environments that combines the benefits of both fog and cloud computing to optimize the placement of applications and services while minimizing costs.This approach is particularly relevant in scenarios where latency,resource constraints,and cost considerations are crucial factors for the deployment of applications.In this study,we propose a hybrid approach that combines a genetic algorithm(GA)with the Flamingo Search Algorithm(FSA)to place application modules while minimizing cost.We consider four cost-types for application deployment:Computation,communication,energy consumption,and violations.The proposed hybrid approach is called GA-FSA and is designed to place the application modules considering the deadline of the application and deploy them appropriately to fog or cloud nodes to curtail the overall cost of the system.An extensive simulation is conducted to assess the performance of the proposed approach compared to other state-of-the-art approaches.The results demonstrate that GA-FSA approach is superior to the other approaches with respect to task guarantee ratio(TGR)and total cost. 展开更多
关键词 Placement mechanism application module placement fog computing cloud computing genetic algorithm flamingo search algorithm
下载PDF
A Comprehensive Systematic Review: Advancements in Skin Cancer Classification and Segmentation Using the ISIC Dataset
18
作者 Madiha Hameed Aneela Zameer Muhammad Asif Zahoor Raja 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2131-2164,共34页
The International Skin Imaging Collaboration(ISIC)datasets are pivotal resources for researchers in machine learning for medical image analysis,especially in skin cancer detection.These datasets contain tens of thousa... The International Skin Imaging Collaboration(ISIC)datasets are pivotal resources for researchers in machine learning for medical image analysis,especially in skin cancer detection.These datasets contain tens of thousands of dermoscopic photographs,each accompanied by gold-standard lesion diagnosis metadata.Annual challenges associated with ISIC datasets have spurred significant advancements,with research papers reporting metrics surpassing those of human experts.Skin cancers are categorized into melanoma and non-melanoma types,with melanoma posing a greater threat due to its rapid potential for metastasis if left untreated.This paper aims to address challenges in skin cancer detection via visual inspection and manual examination of skin lesion images,processes historically known for their laboriousness.Despite notable advancements in machine learning and deep learning models,persistent challenges remain,largely due to the intricate nature of skin lesion images.We review research on convolutional neural networks(CNNs)in skin cancer classification and segmentation,identifying issues like data duplication and augmentation problems.We explore the efficacy of Vision Transformers(ViTs)in overcoming these challenges within ISIC dataset processing.ViTs leverage their capabilities to capture both global and local relationships within images,reducing data duplication and enhancing model generalization.Additionally,ViTs alleviate augmentation issues by effectively leveraging original data.Through a thorough examination of ViT-based methodologies,we illustrate their pivotal role in enhancing ISIC image classification and segmentation.This study offers valuable insights for researchers and practitioners looking to utilize ViTs for improved analysis of dermatological images.Furthermore,this paper emphasizes the crucial role of mathematical and computational modeling processes in advancing skin cancer detection methodologies,highlighting their significance in improving algorithmic performance and interpretability. 展开更多
关键词 Medical image skin cancer classification skin cancer segmentation international skin imaging collaboration convolutional neural network deep learning
下载PDF
Improved Belief Propagation Decoder for LDPC-CRC-Polar Codes with Bit-Freezing
19
作者 Qasim Jan Yin Chao +3 位作者 Pan Zhiwen Muhammad Furqan Zakir Ali You Xiaohu 《China Communications》 SCIE CSCD 2024年第7期135-148,共14页
Though belief propagation bit-flip(BPBF)decoding improves the error correction performance of polar codes,it uses the exhaustive flips method to achieve the error correction performance of CA-SCL decoding,thus resulti... Though belief propagation bit-flip(BPBF)decoding improves the error correction performance of polar codes,it uses the exhaustive flips method to achieve the error correction performance of CA-SCL decoding,thus resulting in high decoding complexity and latency.To alleviate this issue,we incorporate the LDPC-CRC-Polar coding scheme with BPBF and propose an improved belief propagation decoder for LDPC-CRC-Polar codes with bit-freezing(LDPCCRC-Polar codes BPBFz).The proposed LDPCCRC-Polar codes BPBFz employs the LDPC code to ensure the reliability of the flipping set,i.e.,critical set(CS),and dynamically update it.The modified CS is further utilized for the identification of error-prone bits.The proposed LDPC-CRC-Polar codes BPBFz obtains remarkable error correction performance and is comparable to that of the CA-SCL(L=16)decoder under medium-to-high signal-to-noise ratio(SNR)regions.It gains up to 1.2dB and 0.9dB at a fixed BLER=10-4compared with BP and BPBF(CS-1),respectively.In addition,the proposed LDPC-CRC-Polar codes BPBFz has lower decoding latency compared with CA-SCL and BPBF,i.e.,it is 15 times faster than CA-SCL(L=16)at high SNR regions. 展开更多
关键词 belief propagation bit-flipping concatenated codes LDPC-CRC-Polar codes polar codes
下载PDF
IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO
20
作者 Ashraf S.Mashaleh Noor Farizah Binti Ibrahim +2 位作者 Mohammad Alauthman Mohammad Almseidin Amjad Gawanmeh 《Computers, Materials & Continua》 SCIE EI 2024年第2期2245-2267,共23页
Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic hazards.As IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection method... Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic hazards.As IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection methods.This paper proposes a risk assessment framework based on fuzzy logic and Particle Swarm Optimization(PSO)to address the risks associated with IoT botnets.Fuzzy logic addresses IoT threat uncertainties and ambiguities methodically.Fuzzy component settings are optimized using PSO to improve accuracy.The methodology allows for more complex thinking by transitioning from binary to continuous assessment.Instead of expert inputs,PSO data-driven tunes rules and membership functions.This study presents a complete IoT botnet risk assessment system.The methodology helps security teams allocate resources by categorizing threats as high,medium,or low severity.This study shows how CICIoT2023 can assess cyber risks.Our research has implications beyond detection,as it provides a proactive approach to risk management and promotes the development of more secure IoT environments. 展开更多
关键词 IoT botnet detection risk assessment fuzzy logic particle swarm optimization(PSO) CYBERSECURITY interconnected devices
下载PDF
上一页 1 2 40 下一页 到第
使用帮助 返回顶部