首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4篇
  免费   0篇
一般工业技术   1篇
自动化技术   3篇
  2022年   2篇
  2020年   1篇
  2014年   1篇
排序方式: 共有4条查询结果,搜索用时 0 毫秒
1
1.
The Journal of Supercomputing - Auscultation, the listening process for lung sound using acoustic stethoscope, is the first physical examination used to detect any disorder in heartbeat system....  相似文献   
2.
To transfer the medical image from one place to another place or to store a medical image in a particular place with secure manner has become a challenge. In order to solve those problems, the medical image is encrypting and compressing before sending or saving at a place. In this paper, a new block pixel sort algorithm has been proposed for compressing the encrypted medical image. The encrypted medical image acts as an input for this compression process. During the compression, encrypted secret image E12(;) is compressed by the pixel block sort encoding (PBSE). The image is divided into four identical blocks, similar to 2×2 matrix. The minimum occurrence pixel(s) are found out from every block and the positions of the minimum occurrence pixel(s) are found using the verdict occurrence process. The pixel positions are shortened with the help of a shortening process. The features (symbols and shortened pixel positions) are extracted from each block and the extracted features are stored in a particular place, and the values of these features put together as a compressed medical image. The next process of PBSE is pixel block short decoding (PBSD) process. In the decoding process, there are nine steps involved while decompressing the compressed encrypted medical image. The feature extraction value of compressed information is found out from the feature extraction, the symbols are split and the positions are shortened in a separate manner. The position is retrieved from the rescheduled process and the symbols and reconstructed positions of the minimum occurrence pixels are taken block wise. Every symbol is placed based on the position in each block: if the minimum occurrence pixel is ‘0’, then the rest of the places are automatically allocated as ‘1’ or if the minimum occurrence pixel is ‘1’ the remaining place is automatically allocated as ‘0’. Both the blocks are merged as per order 2×2. The final output is the reconstructed encrypted medical image. From this compression method, we can achieve the high compression ratio, minimum time, less compression size and lossless compression, which are the things experimented and proved.  相似文献   
3.
The Internet of Things (IoT) represents a radical shifting paradigm for technological innovations as it can play critical roles in cyberspace applications in various sectors, such as security, monitoring, medical, and environmental sectors, and also in control and industrial applications. The IoT in E-medicine unleashed the design space for new technologies to give instant treatment to patients while also monitoring and tracking health conditions. This research presents a system-level architecture approach for IoT energy efficiency and security. The proposed architecture includes functional components that provide privacy management and system security. Components in the security function group provide secure communications through Multi-Authority Ciphertext-Policy Attributes-Based Encryption (MA-CPABE). Because MA-CPABE is assigned to unlimited devices, presuming that the devices are reliable, the user encodes data with Advanced Encryption Standard (AES) and protects the ABE approach using the solutions of symmetric key. The Johnson’s algorithm with a new computation measure is used to increase network lifetime since an individual sensor node with limited energy represents the inevitable constraints for the broad usage of wireless sensor networks. The optimal route from a source to destination turns out as the cornerstone for longevity of network and its sustainability. To reduce the energy consumption of networks, the evaluation measures consider the node’s residual energy, the number of neighbors, their distance, and the link dependability. The experiment results demonstrate that the proposed model increases network life by about 12.25% (27.73%) compared to Floyd–Warshall’s, Bellman–Ford’s, and Dijkstra’s algorithms, lowering consumption of energy by eliminating the necessity for re-routing the message as a result of connection failure.  相似文献   
4.
The Journal of Supercomputing - Context-aware collaborative filtering is an efficient method for tailoring recommendations to the individual contextual settings of users, with the objective of...  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号