A review of intrusion detection systems in RPL routing protocol based on machine learning for internet of things applications
IPv6 routing protocol for low‐power and lossy networks (RPL) has been developed as a
routing agent in low‐power and lossy networks (LLN), where nodes' resource constraint …
routing agent in low‐power and lossy networks (LLN), where nodes' resource constraint …
A review of methods of diagnosis and complexity analysis of Alzheimer's disease using EEG signals
M Ouchani, S Gharibzadeh… - BioMed Research …, 2021 - Wiley Online Library
This study will concentrate on recent research on EEG signals for Alzheimer's diagnosis,
identifying and comparing key steps of EEG‐based Alzheimer's disease (AD) detection …
identifying and comparing key steps of EEG‐based Alzheimer's disease (AD) detection …
A temporal fusion transformer for short-term freeway traffic speed multistep prediction
Accurate short-term freeway speed prediction is a key component for intelligent
transportation management and can help travelers plan travel routes. However, very few …
transportation management and can help travelers plan travel routes. However, very few …
PSOWNNs‐CNN: A Computational Radiology for Breast Cancer Diagnosis Improvement Based on Image Processing Using Machine Learning Methods
A Nomani, Y Ansari, MH Nasirpour… - Computational …, 2022 - Wiley Online Library
Early diagnosis of breast cancer is an important component of breast cancer therapy. A
variety of diagnostic platforms can provide valuable information regarding breast cancer …
variety of diagnostic platforms can provide valuable information regarding breast cancer …
An extended approach to the diagnosis of tumour location in breast cancer using deep learning
Breast cancer is one of the most common and deadly cancers in women. However, early
detection increases the likelihood of survival by 100%. Radiologists use mammograms to …
detection increases the likelihood of survival by 100%. Radiologists use mammograms to …
Machine learning methods for intrusive detection of wormhole attack in mobile ad hoc network (MANET)
A wormhole attack is a type of attack on the network layer that reflects routing protocols. The
classification is performed with several methods of machine learning consisting of K‐nearest …
classification is performed with several methods of machine learning consisting of K‐nearest …
Presentation of a segmentation method for a diabetic retinopathy patient's fundus region detection using a convolutional neural network
Diabetic retinopathy is characteristic of a local distribution that involves early‐stage risk
factors and can forecast the evolution of the illness or morphological lesions related to the …
factors and can forecast the evolution of the illness or morphological lesions related to the …
[Retracted] CT‐ML: Diagnosis of Breast Cancer Based on Ultrasound Images and Time‐Dependent Feature Extraction Methods Using Contourlet Transformation and …
B Hajipour Khire Masjidi, S Bahmani… - Computational …, 2022 - Wiley Online Library
Breast diseases are a group of diseases that appear in different forms. An entire group of
these diseases is breast cancer. This disease is one of the most important and common …
these diseases is breast cancer. This disease is one of the most important and common …
FDCNet: Presentation of the fuzzy CNN and fractal feature extraction for detection and classification of tumors
The detection of brain tumors using magnetic resonance imaging is currently one of the
biggest challenges in artificial intelligence and medical engineering. It is important to identify …
biggest challenges in artificial intelligence and medical engineering. It is important to identify …
MAENet: A novel multi-head association attention enhancement network for completing intra-modal interaction in image captioning
N Hu, C Fan, Y Ming, F Feng - Neurocomputing, 2023 - Elsevier
Image captioning attracts much attention as it bridges computer vision and natural language
processing. Recent works show that transformer-based models with the multi-head self …
processing. Recent works show that transformer-based models with the multi-head self …