about.jpg

Left ventricle segmentation using scale-independent multi-gate unet in mri images

Left ventricle (LV) segmentation is crucial to assess left ventricle global function. U-Net; a Convolutional Neural Network (CNN); boosted the performance of many biomedical image segmentation tasks. In LV segmentation, U-Net suffered from accurately extracting small objects such as the apical short-axis slices. In this paper, we propose a fully automated left ventricle segmentation method for both short-axis and long-axis views. The proposed model utilizes U-Net architecture and Multi-Gate input block to enhance the performance by aggregating multi-scale features and adding different vision

Artificial Intelligence

Quantum video encryption based on qubit-planes controlled-XOR operations and improved logistic map

This paper proposes an efficient and secure quantum video encryption algorithm for quantum videos based on qubit-planes controlled-XOR operations and improved logistic map in multi-layer encryption steps. Three simple cryptosystem steps are presented in the proposed approach to accomplish the whole encryption process: inter-frame permutation, intra-frame pixel position geometric transformation, and high 4-intra-frame-qubit-planes scrambling. Firstly, the inter-frame positions of quantum video are permutated via inter-frame permutation that is controlled by the keys which are generated by

Artificial Intelligence

User Privacy in Legacy Mobile Network Protocols

Current security issues in mobile networks have great impact on user privacy. With the focus directed to signaling protocols security, network security and air interface encryption, critical configurations and design flaws that would impact user privacy can be overlooked. The leakage of IMSI on the broadcast channels during network paging is a privacy issue worth considering. In this paper, we present an experimental analysis for the IMSI leakage in the GSM broadcast channels during the paging procedure and the impact of this type of passive attack on user's privacy. © 2018 IEEE.

Artificial Intelligence

Hybrid feature selection model based on relief-based algorithms and regulizer algorithms for cancer classification

Cancer is a group of diseases that involve abnormal cell growth with the potential to spread to other parts of the body. Cancer microarray data usually include a small number of samples with a large number of gene expression levels as features. Gene expression or microarray is a technology that monitors the expression of the large number of genes in parallel that make it useful in cancer classification, high dimensionality in cancer microarray data results in the overfitting problem. This article proposes novel hybrid feature selection model called the RBARegulizer model, which is based on two

Artificial Intelligence

Enterprise WLAN security flaws current attacks and relative mitigations

The Increasing number of mobiles and handheld devices that allow wireless access to enterprise data and services is considered a major concern for network designers, implementers and analysts. Enhancements of wireless technologies also accelerate the adoptions of enterprise wireless networks that are widely deployed solely or as an extension to existing wired networks. Bring Your Own Device is an example of the new challenging wireless trends. BYOD environments allow the use of personal mobile computing devices like smart phones, tablets, and laptops for business activities. BYOD has become

Artificial Intelligence

Hybrid Information Filtering Engine for Personalized Job Recommender System

The recommendation system, also known as recommender system or recommendation engine/platform, is considered as an interdisciplinary field. It uses the techniques of more than one field. Recommender system inherits approaches from all of machine learning, data mining, information retrieval, information filtering and human-computer interaction. In this paper, we propose our value-added architecture of the hybrid information filtering engine for job recommender system (HIFE-JRS). We discuss our developed system’s components to filter the most relevant information and produce the most

Artificial Intelligence

A novel image steganography technique based on quantum substitution boxes

Substitution boxes play an essential role in designing secure cryptosystems. With the evolution of quantum technologies, current data security mechanisms may be broken due to their construction based on mathematical computation. Quantum walks, a universal quantum computational model, play an essential role in designing quantum algorithms. We utilize the benefits of quantum walks to present a novel technique for constructing substitution boxes (S-boxes) based on quantum walks (QWs). The performance of the presented QWs S-box technique is evaluated by S-box evaluation criteria, and our results

Artificial Intelligence

Corneal Biomechanics Assessment Using High Frequency Ultrasound B-Mode Imaging

Assessment of corneal biomechanics for pre- and post-refractive surgery is of great clinical importance. Corneal biomechanics affect vision quality of human eye. Many factors affect corneal biomechanics such as, age, corneal diseases and corneal refractive surgery. There is a need for non-invasive in-vivo measurement of corneal biomechanics due to corneal shape preserving as opposed to ex-vivo measurements that destructs corneal tissue. In this study, a new approach for assessing corneal biomechanics in-vivo non-invasively using ultrasound estimation method with 100 KHz frame rate is proposed

Artificial Intelligence

Cyber Threats and Policies for Industrial Control Systems

Modern Industrial Control Systems (ICS) are very important in our life as we use information and communication technology (ICT) to manage, monitor and improve ICS usage. This continually exposes it to new threats due to the vulnerabilities and architectural weaknesses introduced by the extensive use of ICT. Different types of ICSs have common attacks in which these attacks are very sophisticated and have a great impact. This paper presents the results of our research on the impact of ICT attacks. Besides, it discusses how to protect ICS from attacks and policies/standards that each nation

Artificial Intelligence

A Novel Vehicle Detection System

Histogram of oriented gradient (HOG) feature has been widely used in vehicle detection. In this paper, a modified version of HOG is proposed by introducing compass gradient into the HOG calculation. Three different versions of the modified HOG features are used as an input for linear and nonlinear support vector machine (SVM). The modified HOG variants proved to have better classification performance than that of the standard HOG. The classification results of modified HOG and nonlinear SVM are compared to the classification results of YOLO object detector. Finally, a vehicle detection system

Artificial Intelligence