-
201
Metode Deteksi Pokok Pohon Secara Automatis pada Citra Perkebunan Sawit Menggunakan Model Convolutional Neural Network (CNN) pada Perangkat Lunak Sistem Informasi Geografis
Published 2022-12-01“…This study demonstrates the use of the Convolutional Neural Network (CNN) method with the ResNet-34 and ResNet-50 architectures to build a palm tree principal detection model from UAV images of PTPN IV oil palm plantations. The purpose of tree detection is to carry out further analysis related to the condition of oil palm trees such as nutritional status, harvest readiness and indications of disease attacks.. …”
Get full text
Article -
202
Enhancing Voice Spoofing Detection: A Hybrid Approach With VGGish-LSTM Model for Improved Security in Automatic Speaker Verification Systems
Published 2025-01-01“…To address these concerns, this research focuses on the detection of voice spoofing attacks by utilizing a hybrid VGGish-LSTM model. While previous transfer learning methodologies have essentially been applied to image classification tasks, our methodology focuses on voice classification. …”
Get full text
Article -
203
Pitting corrosion studies on SS316L wall fabricated by directed energy deposition based wire arc process
Published 2025-06-01“…EDS analysis confirmed localized depletion of chromium and molybdenum, with elevated oxygen and chloride concentrations within pits, verifying the aggressive localized attack. …”
Get full text
Article -
204
A new digital watermarking model using honey encryption and reversible cellular automata
Published 2025-07-01“…Furthermore, normalized correlation analysis of the proposed method exhibits its higher robustness against various attacks, including noise and JPEG compression than the compared approaches.…”
Get full text
Article -
205
Intravascular Ultrasound Findings in Acute and Chronic Deep Vein Thrombosis of the Lower Extremities
Published 2025-02-01“…Deep vein thrombosis (DVT) of the lower extremities, as part of venous thromboembolism disorder, is the third leading cause of acute cardiovascular syndrome after heart attack and stroke. It can result in disability due to pulmonary embolism (PE) and post-thrombotic syndrome (PTS), particularly in cases where the thrombosis extends to the iliofemoral veins. …”
Get full text
Article -
206
Evaluation of Risk Factors, Etiology, Diagnosis, and Auxiliary Diagnostic Methods of Children With Recurrent Wheezing Between 1-24 Months
Published 2024-09-01“…Cystic fibrosis was detected in one of the 64 patients who underwent sweat testing, and the diagnosis was confirmed by mutation analysis. When all the cases were examined, it was observed that winter is 45% (n=34) of the attack season at the time of admission due to wheezing. …”
Get full text
Article -
207
Acousto-optic cryptosystem based on dynamic DNA encoding and hyperchaotic system in gyrator domains
Published 2025-05-01“…The proposed remote sensing image encryption system exhibits high security performance and robustness against various attacks.…”
Get full text
Article -
208
Hilbert Convex Similarity for Highly Secure Random Distribution of Patient Privacy Steganography
Published 2023-01-01“…Medical images confidentiality suffers from potential attacks and tracing by an unauthorized access. …”
Get full text
Article -
209
ALDP-FL for adaptive local differential privacy in federated learning
Published 2025-07-01“…Regarding the reconstructed images under the iDLG attack, the average improvement rates in MSE and SSIM reach 391.2% and –85.4%, respectively, significantly outperforming all other comparison methods.…”
Get full text
Article -
210
The Role of Optical Coherence Tomography in the Diagnosis of Angle Closed Diseases of the Anterior Chamber. Part 2: Visualization of the Posterior Segment of the Eye
Published 2021-10-01“…The emergence of new imaging technologies such as SS-OCT contributes to understanding the pathogenesis of primary angle closure diseases in terms of involvement of the choroid in the process. …”
Get full text
Article -
211
Generalized Fractional Order Complex Lorenz System-Based Dual Layer Security Enhancement Approach
Published 2025-01-01“…Histogram analysis, correlation analysis and key space analysis are performed to ensure the efficiency of the enhanced security approach. …”
Get full text
Article -
212
The Relationship of Clinical and Laboratory Factors with Acute Isolated Vertigo and Cerebellar Infarction
Published 2020-07-01“…Materials and Methods: Ninety patients presented with isolated acute vertigo attack and/or dizziness symptoms were retrospectively analyzed. …”
Get full text
Article -
213
A compressive data gathering method based on El Gamal cryptography
Published 2019-12-01“…As a hot researching area,compressive sensing has advantages in signal process,image processing and data gathering and analysis.How to effectively and safely apply compressive sensing technology to collect data in wireless sensor networks is studied.Conventional compressive sensing technology based data collection method does not consider the security issue.Furthermore,every nod in the network must participate in the process of collecting measurements.The El Gamal cryptography and sparse matrices based compressive sensing technology were combined,and the El Gamal based sparse compressive data gathering (ESCDG) method was proposed.Theoretical analysis and numerical experiments show that ESCDG not only decreases the network resource consumption but also be able to defense the internal and external attacks.…”
Get full text
Article -
214
Using machine learning to predict carotid artery symptoms from CT angiography: A radiomics and deep learning approach
Published 2024-12-01“…Methods: Carotid CT angiography (CTA) images from symptomatic patients (ischaemic stroke/transient ischaemic attack within the last 3 months) and asymptomatic patients were analysed. …”
Get full text
Article -
215
(H-DIR)<sup>2</sup>: A Scalable Entropy-Based Framework for Anomaly Detection and Cybersecurity in Cloud IoT Data Centers
Published 2025-08-01“…All code, datasets, and Docker images are provided to ensure full reproducibility. …”
Get full text
Article -
216
HET0016 decreases lung metastasis from breast cancer in immune-competent mouse model.
Published 2017-01-01“…The ability of tumor cells to modulate TME and to escape immune-mediated attack by releasing immunosuppressive cytokines has become a hallmark of breast cancer. …”
Get full text
Article -
217
Associations between multiple acute infarctions and intracranial arterial stenosis with functional outcomes in anterior circulation acute ischaemic stroke reperfusion therapy: resu...
Published 2025-05-01“…Objective This study aims to observe the correlation between infarction pattern and intracranial arterial stenosis (ICAS) on magnetic resonance and functional outcome in acute ischaemic stroke (AIS) patients after reperfusion therapy.Design This is a post hoc analysis of the Third China National Stroke Registry (CNSR-III) study.Setting The data was derived from the CNSR-III study, which was a nationwide clinical registry of ischaemic stroke or transient ischaemic attack based in China.Participants Patients with anterior circulation AIS who underwent reperfusion therapy were included for analysis. …”
Get full text
Article -
218
Design of the “EAST” strategy in patients with symptomatic intracranial atherosclerotic stenosis
Published 2025-05-01“…High resolution vessel wall magnetic resonance imaging (HR-vwMRI) will be performed at recruitment and after 6 months and 12 months. …”
Get full text
Article -
219
AI-Driven Framework for Recognition of Guava Plant Diseases through Machine Learning from DSLR Camera Sensor Based High Resolution Imagery
Published 2021-06-01“…Guava, well known to be the tropics’ apple, is one significant fruit cultivated in tropical regions. It is attacked by 177 pathogens, including 167 fungal and others such as bacterial, algal, and nematodes. …”
Get full text
Article -
220
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article