Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 2 de 2
Filtrar
Más filtros




Base de datos
Intervalo de año de publicación
1.
PeerJ Comput Sci ; 10: e2108, 2024.
Artículo en Inglés | MEDLINE | ID: mdl-38983233

RESUMEN

With the development of technology, more and more devices are connected to the Internet. According to statistics, Internet of Things (IoT) devices have reached tens of billions of units, which forms a massive Internet of Things system. Social Internet of Things (SIoT) is an essential extension of the IoT system. Because of the heterogeneity present in the SIoT system and the limited resources available, it is facing increasing security issues, which hinders the interaction of SIoT information. Consortium chain combined with the trust problem in SIoT systems has gradually become an important goal to improve the security of SIoT data interaction. Detection of malicious nodes is one of the key points to solve the trust problem. In this article, we focus on the consortium chain network. According to the information characteristics of nodes on the consortium chain, it can be analyzed that the SIoT malicious node detection combined with the consortium chain network should have the privacy protection, subjectivity, uncertainty, lightweight, dynamic timeliness and so on. In response to the features above and the concerns of existing malicious node detection methods, we propose an algorithm based on inter-block delay. We employ unsupervised clustering algorithms, including K-means and DBSCAN, to analyze and compare the data set intercepted from the consortium chain. The results indicate that DBSCAN exhibits the best clustering performance. Finally, we transmit the acquired data onto the chain. We conclude that the proposed algorithm is highly effective in detecting malicious nodes on the combination of SIoT and consortium chain networks.

2.
Med Biol Eng Comput ; 62(6): 1837-1849, 2024 Jun.
Artículo en Inglés | MEDLINE | ID: mdl-38396278

RESUMEN

The femoral neck is the most vulnerable site for fractures within the hip joint. Due to its complex three-dimensional structure and special blood supply mechanism, the treatment of femoral neck fractures is difficult and the healing probability is low. Using computers to accurately and automatically locate the femoral neck axis can detect the density of femoral neck, the neck-shaft angle and the anteversion angle, which effectively assists in the prevention and treatment of femoral neck fractures. Additionally, the traditional femoral neck axis positioning schemes have limitations in accuracy, automation and assistance to bone density measurement. Therefore, this paper proposes a new fully automatic femoral neck axis positioning method. First, the coronal plane's three-dimensional reconstruction highlights the details of the target bone, and then designs a coarse localization module based on multi-scale template matching to obtain the rough range of the femoral neck axis. Then, a detailed localization module based on the femoral neck virtual slices is used to obtain the contour centers and accurately locates the three-dimensional femoral neck axis. This method has been validated in comparison with the manual measurement method. Experimental results revealed that the extracted femoral neck axis in this study can achieve automation, ensure accuracy, and avoid subjective effects effectively and has the potential value to be applied in the prevention and treatment of femoral neck fractures.


Asunto(s)
Cuello Femoral , Imagenología Tridimensional , Tomografía Computarizada por Rayos X , Humanos , Cuello Femoral/diagnóstico por imagen , Cuello Femoral/anatomía & histología , Tomografía Computarizada por Rayos X/métodos , Imagenología Tridimensional/métodos , Masculino , Femenino , Fracturas del Cuello Femoral/diagnóstico por imagen , Automatización , Adulto , Algoritmos , Persona de Mediana Edad
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA