Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 2 de 2
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Sci Rep ; 13(1): 14877, 2023 09 09.
Artigo em Inglês | MEDLINE | ID: mdl-37689757

RESUMO

Mortality from breast cancer (BC) is among the top causes of cancer death in women. BC can be effectively treated when diagnosed early, improving the likelihood that a patient will survive. BC masses and calcification clusters must be identified by mammography in order to prevent disease effects and commence therapy at an early stage. A mammography misinterpretation may result in an unnecessary biopsy of the false-positive results, lowering the patient's odds of survival. This study intends to improve breast mass detection and identification in order to provide better therapy and reduce mortality risk. A new deep-learning (DL) model based on a combination of transfer-learning (TL) and long short-term memory (LSTM) is proposed in this study to adequately facilitate the automatic detection and diagnosis of the BC suspicious region using the 80-20 method. Since DL designs are modelled to be problem-specific, TL applies the knowledge gained during the solution of one problem to another relevant problem. In the presented model, the learning features from the pre-trained networks such as the squeezeNet and DenseNet are extracted and transferred with the features that have been extracted from the INbreast dataset. To measure the proposed model performance, we selected accuracy, sensitivity, specificity, precision, and area under the ROC curve (AUC) as our metrics of choice. The classification of mammographic data using the suggested model yielded overall accuracy, sensitivity, specificity, precision, and AUC values of 99.236%, 98.8%, 99.1%, 96%, and 0.998, respectively, demonstrating the model's efficacy in detecting breast tumors.


Assuntos
Neoplasias da Mama , Mamografia , Humanos , Feminino , Neoplasias da Mama/diagnóstico por imagem , Área Sob a Curva , Benchmarking , Redes Neurais de Computação
2.
Sensors (Basel) ; 23(12)2023 Jun 19.
Artigo em Inglês | MEDLINE | ID: mdl-37420868

RESUMO

The latest version of ZigBee offers improvements in various aspects, including its low power consumption, flexibility, and cost-effective deployment. However, the challenges persist, as the upgraded protocol continues to suffer from a wide range of security weaknesses. Constrained wireless sensor network devices cannot use standard security protocols such as asymmetric cryptography mechanisms, which are resource-intensive and unsuitable for wireless sensor networks. ZigBee uses the Advanced Encryption Standard (AES), which is the best recommended symmetric key block cipher for securing data of sensitive networks and applications. However, AES is expected to be vulnerable to some attacks in the near future. Moreover, symmetric cryptosystems have key management and authentication issues. To address these concerns in wireless sensor networks, particularly in ZigBee communications, in this paper, we propose a mutual authentication scheme that can dynamically update the secret key value of device-to-trust center (D2TC) and device-to-device (D2D) communications. In addition, the suggested solution improves the cryptographic strength of ZigBee communications by improving the encryption process of a regular AES without the need for asymmetric cryptography. To achieve that, we use a secure one-way hash function operation when D2TC and D2D mutually authenticate each other, along with bitwise exclusive OR operations to enhance cryptography. Once authentication is accomplished, the ZigBee-based participants can mutually agree upon a shared session key and exchange a secure value. This secure value is then integrated with the sensed data from the devices and utilized as input for regular AES encryption. By adopting this technique, the encrypted data gains robust protection against potential cryptanalysis attacks. Finally, a comparative analysis is conducted to illustrate how the proposed scheme effectively maintains efficiency in comparison to eight competitive schemes. This analysis evaluates the scheme's performance across various factors, including security features, communication, and computational cost.


Assuntos
Comunicação , Segurança Computacional , Humanos , Redes de Comunicação de Computadores
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...