Autograft or metal implants are routinely used in skeletal repair.However,they fail to provide long-term clinical resolution,necessitating a functional biomimetic tissue engineering alternative.The use of native human...Autograft or metal implants are routinely used in skeletal repair.However,they fail to provide long-term clinical resolution,necessitating a functional biomimetic tissue engineering alternative.The use of native human bone tissue for synthesizing a biomimeticmaterial inkfor three-dimensional(3D)bioprintingof skeletal tissueis anattractivestrategyfor tissueregeneration.Thus,human bone extracellular matrix(bone-ECM)offers an exciting potential for the development of an appropriate microenvironment for human bone marrow stromal cells(HBMSCs)to proliferate and differentiate along the osteogenic lineage.In this study,we engineered a novel material ink(LAB)by blending human bone-ECM(B)with nanoclay(L,Laponite®)and alginate(A)polymers using extrusion-based deposition.The inclusion of the nanofiller and polymeric material increased the rheology,printability,and drug retention properties and,critically,the preservation of HBMSCs viability upon printing.The composite of human bone-ECM-based 3D constructs containing vascular endothelial growth factor(VEGF)enhanced vascularization after implantation in an ex vivo chick chorioallantoic membrane(CAM)model.The inclusion of bone morphogenetic protein-2(BMP-2)with the HBMSCs further enhanced vascularization and mineralization after only seven days.This study demonstrates the synergistic combination of nanoclay with biomimetic materials(alginate and bone-ECM)to support the formation of osteogenic tissue both in vitro and ex vivo and offers a promising novel 3D bioprinting approach to personalized skeletal tissue repair.展开更多
Accurate precipitation nowcasting can provide great convenience to the public so they can conduct corresponding arrangements in advance to deal with the possible impact of upcoming heavy rain.Recent relevant research ...Accurate precipitation nowcasting can provide great convenience to the public so they can conduct corresponding arrangements in advance to deal with the possible impact of upcoming heavy rain.Recent relevant research activities have shown their concerns on various deep learning models for radar echo extrapolation,where radar echo maps were used to predict their consequent moment,so as to recognize potential severe convective weather events.However,these approaches suffer from an inaccurate prediction of echo dynamics and unreliable depiction of echo aggregation or dissipation,due to the size limitation of convolution filter,lack of global feature,and less attention to features from previous states.To address the problems,this paper proposes a CEMA-LSTM recurrent unit,which is embedded with a Contextual Feature Correlation Enhancement Block(CEB)and a Multi-Attention Mechanism Block(MAB).The CEB enhances contextual feature correlation and supports its model to memorize significant features for near-future prediction;the MAB uses a position and channel attention mechanism to capture global features of radar echoes.Two practical radar echo datasets were used involving the FREM and CIKM 2017 datasets.Both quantification and visualization of comparative experimental results have demonstrated outperformance of the proposed CEMA-LSTMover recentmodels,e.g.,PhyDNet,MIM and PredRNN++,etc.In particular,compared with the second-rankedmodel,its average POD,FAR and CSI have been improved by 3.87%,1.65%and 1.79%,respectively on the FREM,and by 1.42%,5.60%and 3.16%,respectively on the CIKM 2017.展开更多
Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryp...Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryption schemes in the literature based on chaotic maps.This work aims to propose an attack on a recently proposed hyper-chaotic map-based cryptosystem.The core notion of the original algorithm was based on permutation and diffusion.A bitlevel permutation approach was used to do the permutation row-and column-wise.The diffusion was executed in the forward and backward directions.The statistical strength of the cryptosystem has been demonstrated by extensive testing conducted by the author of the cryptosystem.This cryptanalysis article investigates the robustness of this cryptosystem against a chosen-plaintext attack.The secret keys of the cryptosystem were retrieved by the proposed attack with 258 chosen-plain images.The results in this manuscript suggest that,in addition to standard statistical evaluations,thorough cryptanalysis of each newly suggested cryptosystem is necessary before it can be used in practical application.Moreover,the data retrieved is also passed through some statistical analysis to compare the quality of the original and retrieved data.The results of the performance analysis indicate the exact recovery of the original data.To make the cryptosystem useful for applications requiring secure data exchange,a few further improvement recommendations are also suggested.展开更多
Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data.Medical picture encryption is a crucial step in many cloud-based and healthcare appl...Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data.Medical picture encryption is a crucial step in many cloud-based and healthcare applications.In this study,a strong cryptosystem based on a 2D chaotic map and Jigsaw transformation is presented for the encryption of medical photos in private Internet of Medical Things(IoMT)and cloud storage.A disorganized three-dimensional map is the foundation of the proposed cipher.The dispersion of pixel values and the permutation of their places in this map are accomplished using a nonlinear encoding process.The suggested cryptosystem enhances the security of the delivered medical images by performing many operations.To validate the efficiency of the recommended cryptosystem,various medical image kinds are used,each with its unique characteristics.Several measures are used to evaluate the proposed cryptosystem,which all support its robust security.The simulation results confirm the supplied cryptosystem’s secrecy.Furthermore,it provides strong robustness and suggested protection standards for cloud service applications,healthcare,and IoMT.It is seen that the proposed 3D chaotic cryptosystem obtains an average entropy of 7.9998,which is near its most excellent value of 8,and a typical NPCR value of 99.62%,which is also near its extreme value of 99.60%.Moreover,the recommended cryptosystem outperforms conventional security systems across the test assessment criteria.展开更多
TheCOVID-19 outbreak began in December 2019 andwas declared a global health emergency by the World Health Organization.The four most dominating variants are Beta,Gamma,Delta,and Omicron.After the administration of vac...TheCOVID-19 outbreak began in December 2019 andwas declared a global health emergency by the World Health Organization.The four most dominating variants are Beta,Gamma,Delta,and Omicron.After the administration of vaccine doses,an eminent decline in new cases has been observed.The COVID-19 vaccine induces neutralizing antibodies and T-cells in our bodies.However,strong variants likeDelta and Omicron tend to escape these neutralizing antibodies elicited by COVID-19 vaccination.Therefore,it is indispensable to study,analyze and most importantly,predict the response of SARS-CoV-2-derived t-cell epitopes against Covid variants in vaccinated and unvaccinated persons.In this regard,machine learning can be effectively utilized for predicting the response of COVID-derived t-cell epitopes.In this study,prediction of T-cells Epitopes’response was conducted for vaccinated and unvaccinated people for Beta,Gamma,Delta,and Omicron variants.The dataset was divided into two classes,i.e.,vaccinated and unvaccinated,and the predicted response of T-cell Epitopes was divided into three categories,i.e.,Strong,Impaired,and Over-activated.For the aforementioned prediction purposes,a self-proposed Bayesian neural network has been designed by combining variational inference and flow normalization optimizers.Furthermore,the Hidden Markov Model has also been trained on the same dataset to compare the results of the self-proposed Bayesian neural network with this state-of-the-art statistical approach.Extensive experimentation and results demonstrate the efficacy of the proposed network in terms of accurate prediction and reduced error.展开更多
Energy sustainability is a hot topic in both scientific and political cir-cles.To date,two alternative approaches to this issue are being taken.Some peo-ple believe that increasing power consumption is necessary for co...Energy sustainability is a hot topic in both scientific and political cir-cles.To date,two alternative approaches to this issue are being taken.Some peo-ple believe that increasing power consumption is necessary for countries’economic and social progress,while others are more concerned with maintaining carbon consumption under set limitations.To establish a secure,sustainable,and economical energy system while mitigating the consequences of climate change,most governments are currently pushing renewable growth policies.Energy mar-kets are meant to provide consumers with dependable electricity at the lowest pos-sible cost.A profit-maximization optimal decision model is created in the electric power market with the combined wind,solar units,loads,and energy storage sys-tems,based on the bidding mechanism in the electricity market and operational principles.This model utterly considers the technological limits of new energy units and storages,as well as the involvement of new energy and electric vehicles in market bidding through power generation strategy and the output arrangement of the virtual power plant’s coordinated operation.The accuracy and validity of the optimal decision-making model of combined wind,solar units,loads,and energy storage systems are validated using numerical examples.Under multi-operating scenarios,the effects of renewable energy output changes on joint sys-tem bidding techniques are compared.展开更多
In 2020,COVID-19 started spreading throughout the world.This deadly infection was identified as a virus that may affect the lungs and,in severe cases,could be the cause of death.The polymerase chain reaction(PCR)test ...In 2020,COVID-19 started spreading throughout the world.This deadly infection was identified as a virus that may affect the lungs and,in severe cases,could be the cause of death.The polymerase chain reaction(PCR)test is commonly used to detect this virus through the nasal passage or throat.However,the PCR test exposes health workers to this deadly virus.To limit human exposure while detecting COVID-19,image processing techniques using deep learning have been successfully applied.In this paper,a strategy based on deep learning is employed to classify the COVID-19 virus.To extract features,two deep learning models have been used,the DenseNet201 and the SqueezeNet.Transfer learning is used in feature extraction,and models are fine-tuned.A publicly available computerized tomography(CT)scan dataset has been used in this study.The extracted features from the deep learning models are optimized using the Ant Colony Optimization algorithm.The proposed technique is validated through multiple evaluation parameters.Several classifiers have been employed to classify the optimized features.The cubic support vector machine(Cubic SVM)classifier shows superiority over other commonly used classifiers and attained an accuracy of 98.72%.The proposed technique achieves state-of-the-art accuracy,a sensitivity of 98.80%,and a specificity of 96.64%.展开更多
Breast cancer is one of the leading cancers among women.It has the second-highest mortality rate in women after lung cancer.Timely detection,especially in the early stages,can help increase survival rates.However,manu...Breast cancer is one of the leading cancers among women.It has the second-highest mortality rate in women after lung cancer.Timely detection,especially in the early stages,can help increase survival rates.However,manual diagnosis of breast cancer is a tedious and time-consuming process,and the accuracy of detection is reliant on the quality of the images and the radiologist’s experience.However,computer-aided medical diagnosis has recently shown promising results,leading to the need to develop an efficient system that can aid radiologists in diagnosing breast cancer in its early stages.The research presented in this paper is focused on the multi-class classification of breast cancer.The deep transfer learning approach has been utilized to train the deep learning models,and a pre-processing technique has been used to improve the quality of the ultrasound dataset.The proposed technique utilizes two deep learning models,Mobile-NetV2 and DenseNet201,for the composition of the deep ensemble model.Deep learning models are fine-tuned along with hyperparameter tuning to achieve better results.Subsequently,entropy-based feature selection is used.Breast cancer identification using the proposed classification approach was found to attain an accuracy of 97.04%,while the sensitivity and F1 score were 96.87%and 96.76%,respectively.The performance of the proposed model is very effective and outperforms other state-of-the-art techniques presented in the literature.展开更多
Securing digital image data is a key concern in today’s information-driven society.Effective encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal ...Securing digital image data is a key concern in today’s information-driven society.Effective encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal role in many symmetric encryption systems.This study introduces an innovative approach to creating S-boxes for encryption algorithms.The proposed S-boxes are tested for validity and non-linearity by incorporating them into an image encryption scheme.The nonlinearity measure of the proposed S-boxes is 112.These qualities significantly enhance its resistance to common cryptographic attacks,ensuring high image data security.Furthermore,to assess the robustness of the S-boxes,an encryption system has also been proposed and the proposed S-boxes have been integrated into the designed encryption system.To validate the effectiveness of the proposed encryption system,a comprehensive security analysis including brute force attack and histogram analysis has been performed.In addition,to determine the level of security during the transmission and storage of digital content,the encryption system’s Number of Pixel Change Rate(NPCR),and Unified Averaged Changed Intensity(UACI)are calculated.The results indicate a 99.71%NPCR and 33.51%UACI.These results demonstrate that the proposed S-boxes offer a significant level of security for digital content throughout its transmission and storage.展开更多
The advancements in sensing technologies,information processing,and communication schemes have revolutionized the healthcare sector.Electronic Healthcare Records(EHR)facilitate the patients,doctors,hospitals,and other...The advancements in sensing technologies,information processing,and communication schemes have revolutionized the healthcare sector.Electronic Healthcare Records(EHR)facilitate the patients,doctors,hospitals,and other stakeholders to maintain valuable data and medical records.The traditional EHRs are based on cloud-based architectures and are susceptible to multiple cyberattacks.A single attempt of a successful Denial of Service(DoS)attack can compromise the complete healthcare system.This article introduces a secure and immutable blockchain-based framework for the Internet of Medical Things(IoMT)to address the stated challenges.The proposed architecture is on the idea of a lightweight private blockchain-based network that facilitates the users and hospitals to perform multiple healthcare-related operations in a secure and trustworthy manner.The efficacy of the proposed framework is evaluated in the context of service execution time and throughput.The experimental outcomes indicate that the proposed design attained lower service execution time and higher throughput under different control parameters.展开更多
Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this network.Additionally,given the limitations of computers,it becomes evenmore important to empl...Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this network.Additionally,given the limitations of computers,it becomes evenmore important to employ efficient and fast image encryption techniques.While 1D chaotic maps offer a practical approach to real-time image encryption,their limited flexibility and increased vulnerability restrict their practical application.In this research,we have utilized a 3DHindmarsh-Rosemodel to construct a secure cryptosystem.The randomness of the chaotic map is assessed through standard analysis.The proposed system enhances security by incorporating an increased number of system parameters and a wide range of chaotic parameters,as well as ensuring a uniformdistribution of chaotic signals across the entire value space.Additionally,a fast image encryption technique utilizing the new chaotic system is proposed.The novelty of the approach is confirmed through time complexity analysis.To further strengthen the resistance against cryptanalysis attacks and differential attacks,the SHA-256 algorithm is employed for secure key generation.Experimental results through a number of parameters demonstrate the strong cryptographic performance of the proposed image encryption approach,highlighting its exceptional suitability for secure communication.Moreover,the security of the proposed scheme has been compared with stateof-the-art image encryption schemes,and all comparison metrics indicate the superior performance of the proposed scheme.展开更多
基金supported by grants from the Biotechnology and Biological Sciences Research Council(Nos.BBSRC LO21071/and BB/L00609X/1)UK Regenerative Medicine Platform Hub Acellular Approaches for Therapeutic Delivery(No.MR/K026682/1)+3 种基金Acellular Hub,SMART Materials 3D Architecture(No.MR/R015651/1)the UK Regenerative Medicine Platform(No.MR/L012626/1 Southampton Imaging)to ROCOMRCAMED Regenerative Medicine and Stem Cell Research Initiative(No.MR/V00543X/1)to JID,ROCO and YHKGC acknowledges funding from AIRC Aldi Fellowship under grant agreement No.25412.
文摘Autograft or metal implants are routinely used in skeletal repair.However,they fail to provide long-term clinical resolution,necessitating a functional biomimetic tissue engineering alternative.The use of native human bone tissue for synthesizing a biomimeticmaterial inkfor three-dimensional(3D)bioprintingof skeletal tissueis anattractivestrategyfor tissueregeneration.Thus,human bone extracellular matrix(bone-ECM)offers an exciting potential for the development of an appropriate microenvironment for human bone marrow stromal cells(HBMSCs)to proliferate and differentiate along the osteogenic lineage.In this study,we engineered a novel material ink(LAB)by blending human bone-ECM(B)with nanoclay(L,Laponite®)and alginate(A)polymers using extrusion-based deposition.The inclusion of the nanofiller and polymeric material increased the rheology,printability,and drug retention properties and,critically,the preservation of HBMSCs viability upon printing.The composite of human bone-ECM-based 3D constructs containing vascular endothelial growth factor(VEGF)enhanced vascularization after implantation in an ex vivo chick chorioallantoic membrane(CAM)model.The inclusion of bone morphogenetic protein-2(BMP-2)with the HBMSCs further enhanced vascularization and mineralization after only seven days.This study demonstrates the synergistic combination of nanoclay with biomimetic materials(alginate and bone-ECM)to support the formation of osteogenic tissue both in vitro and ex vivo and offers a promising novel 3D bioprinting approach to personalized skeletal tissue repair.
基金funding from the Key Laboratory Foundation of National Defence Technology under Grant 61424010208National Natural Science Foundation of China(Nos.62002276,41911530242 and 41975142)+3 种基金5150 Spring Specialists(05492018012 and 05762018039)Major Program of the National Social Science Fund of China(Grant No.17ZDA092)333 High-LevelTalent Cultivation Project of Jiangsu Province(BRA2018332)Royal Society of Edinburgh,UK andChina Natural Science Foundation Council(RSE Reference:62967)_Liu)_2018)_2)under their Joint International Projects Funding Scheme and Basic Research Programs(Natural Science Foundation)of Jiangsu Province(BK20191398 and BK20180794).
文摘Accurate precipitation nowcasting can provide great convenience to the public so they can conduct corresponding arrangements in advance to deal with the possible impact of upcoming heavy rain.Recent relevant research activities have shown their concerns on various deep learning models for radar echo extrapolation,where radar echo maps were used to predict their consequent moment,so as to recognize potential severe convective weather events.However,these approaches suffer from an inaccurate prediction of echo dynamics and unreliable depiction of echo aggregation or dissipation,due to the size limitation of convolution filter,lack of global feature,and less attention to features from previous states.To address the problems,this paper proposes a CEMA-LSTM recurrent unit,which is embedded with a Contextual Feature Correlation Enhancement Block(CEB)and a Multi-Attention Mechanism Block(MAB).The CEB enhances contextual feature correlation and supports its model to memorize significant features for near-future prediction;the MAB uses a position and channel attention mechanism to capture global features of radar echoes.Two practical radar echo datasets were used involving the FREM and CIKM 2017 datasets.Both quantification and visualization of comparative experimental results have demonstrated outperformance of the proposed CEMA-LSTMover recentmodels,e.g.,PhyDNet,MIM and PredRNN++,etc.In particular,compared with the second-rankedmodel,its average POD,FAR and CSI have been improved by 3.87%,1.65%and 1.79%,respectively on the FREM,and by 1.42%,5.60%and 3.16%,respectively on the CIKM 2017.
基金The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding program grant code(NU/RG/SERC/11/4).
文摘Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryption schemes in the literature based on chaotic maps.This work aims to propose an attack on a recently proposed hyper-chaotic map-based cryptosystem.The core notion of the original algorithm was based on permutation and diffusion.A bitlevel permutation approach was used to do the permutation row-and column-wise.The diffusion was executed in the forward and backward directions.The statistical strength of the cryptosystem has been demonstrated by extensive testing conducted by the author of the cryptosystem.This cryptanalysis article investigates the robustness of this cryptosystem against a chosen-plaintext attack.The secret keys of the cryptosystem were retrieved by the proposed attack with 258 chosen-plain images.The results in this manuscript suggest that,in addition to standard statistical evaluations,thorough cryptanalysis of each newly suggested cryptosystem is necessary before it can be used in practical application.Moreover,the data retrieved is also passed through some statistical analysis to compare the quality of the original and retrieved data.The results of the performance analysis indicate the exact recovery of the original data.To make the cryptosystem useful for applications requiring secure data exchange,a few further improvement recommendations are also suggested.
基金The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding program grant code(NU/RC/SERC/11/5).
文摘Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data.Medical picture encryption is a crucial step in many cloud-based and healthcare applications.In this study,a strong cryptosystem based on a 2D chaotic map and Jigsaw transformation is presented for the encryption of medical photos in private Internet of Medical Things(IoMT)and cloud storage.A disorganized three-dimensional map is the foundation of the proposed cipher.The dispersion of pixel values and the permutation of their places in this map are accomplished using a nonlinear encoding process.The suggested cryptosystem enhances the security of the delivered medical images by performing many operations.To validate the efficiency of the recommended cryptosystem,various medical image kinds are used,each with its unique characteristics.Several measures are used to evaluate the proposed cryptosystem,which all support its robust security.The simulation results confirm the supplied cryptosystem’s secrecy.Furthermore,it provides strong robustness and suggested protection standards for cloud service applications,healthcare,and IoMT.It is seen that the proposed 3D chaotic cryptosystem obtains an average entropy of 7.9998,which is near its most excellent value of 8,and a typical NPCR value of 99.62%,which is also near its extreme value of 99.60%.Moreover,the recommended cryptosystem outperforms conventional security systems across the test assessment criteria.
基金This paper is funded by the Deanship of Scientific Research at ImamMohammad Ibn Saud Islamic University Research Group No.RG-21-07-05.
文摘TheCOVID-19 outbreak began in December 2019 andwas declared a global health emergency by the World Health Organization.The four most dominating variants are Beta,Gamma,Delta,and Omicron.After the administration of vaccine doses,an eminent decline in new cases has been observed.The COVID-19 vaccine induces neutralizing antibodies and T-cells in our bodies.However,strong variants likeDelta and Omicron tend to escape these neutralizing antibodies elicited by COVID-19 vaccination.Therefore,it is indispensable to study,analyze and most importantly,predict the response of SARS-CoV-2-derived t-cell epitopes against Covid variants in vaccinated and unvaccinated persons.In this regard,machine learning can be effectively utilized for predicting the response of COVID-derived t-cell epitopes.In this study,prediction of T-cells Epitopes’response was conducted for vaccinated and unvaccinated people for Beta,Gamma,Delta,and Omicron variants.The dataset was divided into two classes,i.e.,vaccinated and unvaccinated,and the predicted response of T-cell Epitopes was divided into three categories,i.e.,Strong,Impaired,and Over-activated.For the aforementioned prediction purposes,a self-proposed Bayesian neural network has been designed by combining variational inference and flow normalization optimizers.Furthermore,the Hidden Markov Model has also been trained on the same dataset to compare the results of the self-proposed Bayesian neural network with this state-of-the-art statistical approach.Extensive experimentation and results demonstrate the efficacy of the proposed network in terms of accurate prediction and reduced error.
文摘Energy sustainability is a hot topic in both scientific and political cir-cles.To date,two alternative approaches to this issue are being taken.Some peo-ple believe that increasing power consumption is necessary for countries’economic and social progress,while others are more concerned with maintaining carbon consumption under set limitations.To establish a secure,sustainable,and economical energy system while mitigating the consequences of climate change,most governments are currently pushing renewable growth policies.Energy mar-kets are meant to provide consumers with dependable electricity at the lowest pos-sible cost.A profit-maximization optimal decision model is created in the electric power market with the combined wind,solar units,loads,and energy storage sys-tems,based on the bidding mechanism in the electricity market and operational principles.This model utterly considers the technological limits of new energy units and storages,as well as the involvement of new energy and electric vehicles in market bidding through power generation strategy and the output arrangement of the virtual power plant’s coordinated operation.The accuracy and validity of the optimal decision-making model of combined wind,solar units,loads,and energy storage systems are validated using numerical examples.Under multi-operating scenarios,the effects of renewable energy output changes on joint sys-tem bidding techniques are compared.
文摘In 2020,COVID-19 started spreading throughout the world.This deadly infection was identified as a virus that may affect the lungs and,in severe cases,could be the cause of death.The polymerase chain reaction(PCR)test is commonly used to detect this virus through the nasal passage or throat.However,the PCR test exposes health workers to this deadly virus.To limit human exposure while detecting COVID-19,image processing techniques using deep learning have been successfully applied.In this paper,a strategy based on deep learning is employed to classify the COVID-19 virus.To extract features,two deep learning models have been used,the DenseNet201 and the SqueezeNet.Transfer learning is used in feature extraction,and models are fine-tuned.A publicly available computerized tomography(CT)scan dataset has been used in this study.The extracted features from the deep learning models are optimized using the Ant Colony Optimization algorithm.The proposed technique is validated through multiple evaluation parameters.Several classifiers have been employed to classify the optimized features.The cubic support vector machine(Cubic SVM)classifier shows superiority over other commonly used classifiers and attained an accuracy of 98.72%.The proposed technique achieves state-of-the-art accuracy,a sensitivity of 98.80%,and a specificity of 96.64%.
基金This research work was funded by Institutional Fund Projects under Grant No.(IFPIP:1614-611-1442)from the Ministry of Education and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘Breast cancer is one of the leading cancers among women.It has the second-highest mortality rate in women after lung cancer.Timely detection,especially in the early stages,can help increase survival rates.However,manual diagnosis of breast cancer is a tedious and time-consuming process,and the accuracy of detection is reliant on the quality of the images and the radiologist’s experience.However,computer-aided medical diagnosis has recently shown promising results,leading to the need to develop an efficient system that can aid radiologists in diagnosing breast cancer in its early stages.The research presented in this paper is focused on the multi-class classification of breast cancer.The deep transfer learning approach has been utilized to train the deep learning models,and a pre-processing technique has been used to improve the quality of the ultrasound dataset.The proposed technique utilizes two deep learning models,Mobile-NetV2 and DenseNet201,for the composition of the deep ensemble model.Deep learning models are fine-tuned along with hyperparameter tuning to achieve better results.Subsequently,entropy-based feature selection is used.Breast cancer identification using the proposed classification approach was found to attain an accuracy of 97.04%,while the sensitivity and F1 score were 96.87%and 96.76%,respectively.The performance of the proposed model is very effective and outperforms other state-of-the-art techniques presented in the literature.
基金funded by Deanship of Scientific Research at Najran University under the Research Groups Funding Program Grant Code(NU/RG/SERC/12/3)also by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2023R333)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Securing digital image data is a key concern in today’s information-driven society.Effective encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal role in many symmetric encryption systems.This study introduces an innovative approach to creating S-boxes for encryption algorithms.The proposed S-boxes are tested for validity and non-linearity by incorporating them into an image encryption scheme.The nonlinearity measure of the proposed S-boxes is 112.These qualities significantly enhance its resistance to common cryptographic attacks,ensuring high image data security.Furthermore,to assess the robustness of the S-boxes,an encryption system has also been proposed and the proposed S-boxes have been integrated into the designed encryption system.To validate the effectiveness of the proposed encryption system,a comprehensive security analysis including brute force attack and histogram analysis has been performed.In addition,to determine the level of security during the transmission and storage of digital content,the encryption system’s Number of Pixel Change Rate(NPCR),and Unified Averaged Changed Intensity(UACI)are calculated.The results indicate a 99.71%NPCR and 33.51%UACI.These results demonstrate that the proposed S-boxes offer a significant level of security for digital content throughout its transmission and storage.
文摘The advancements in sensing technologies,information processing,and communication schemes have revolutionized the healthcare sector.Electronic Healthcare Records(EHR)facilitate the patients,doctors,hospitals,and other stakeholders to maintain valuable data and medical records.The traditional EHRs are based on cloud-based architectures and are susceptible to multiple cyberattacks.A single attempt of a successful Denial of Service(DoS)attack can compromise the complete healthcare system.This article introduces a secure and immutable blockchain-based framework for the Internet of Medical Things(IoMT)to address the stated challenges.The proposed architecture is on the idea of a lightweight private blockchain-based network that facilitates the users and hospitals to perform multiple healthcare-related operations in a secure and trustworthy manner.The efficacy of the proposed framework is evaluated in the context of service execution time and throughput.The experimental outcomes indicate that the proposed design attained lower service execution time and higher throughput under different control parameters.
基金the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding Program Grant Code(NU/RG/SERC/12/3).
文摘Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this network.Additionally,given the limitations of computers,it becomes evenmore important to employ efficient and fast image encryption techniques.While 1D chaotic maps offer a practical approach to real-time image encryption,their limited flexibility and increased vulnerability restrict their practical application.In this research,we have utilized a 3DHindmarsh-Rosemodel to construct a secure cryptosystem.The randomness of the chaotic map is assessed through standard analysis.The proposed system enhances security by incorporating an increased number of system parameters and a wide range of chaotic parameters,as well as ensuring a uniformdistribution of chaotic signals across the entire value space.Additionally,a fast image encryption technique utilizing the new chaotic system is proposed.The novelty of the approach is confirmed through time complexity analysis.To further strengthen the resistance against cryptanalysis attacks and differential attacks,the SHA-256 algorithm is employed for secure key generation.Experimental results through a number of parameters demonstrate the strong cryptographic performance of the proposed image encryption approach,highlighting its exceptional suitability for secure communication.Moreover,the security of the proposed scheme has been compared with stateof-the-art image encryption schemes,and all comparison metrics indicate the superior performance of the proposed scheme.