Wireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classification approach, hence strengthening the safety of such networks. Feature extraction process is done by using Linear Regression-Based Principal Component Analysis (LR-PCA). The test results demonstrated that the proposed IGO-ANN method attains the greatest performance in terms of accuracy, end to end delay and packet delivery ratio regarding trusted WBAN nodes classification than certain existing methods.
Al2O3 and Al2O3–Al composite coatings were deposited on steel specimens using Oxy-acetylene gas thermal spray gun. Alumina was mixed with Aluminum in six groups of concentrations (0, 5, 10,12,15 and 20% ) Al2O3, Specimens were tested for corrosion using Potentiodynamic polarization technique. Further tests were conducted for the effect of temperature on polarization curve and the hardness tests for the coated specimens. At first, Modelling was carried out using MINITAB-19, least square method, as a 2nd degree nonlinear model, bad results were achieved because of the high nonlinearity. Better result w
In this golden age of rapid development surgeons realized that AI could contribute to healthcare in all aspects, especially in surgery. The aim of the study will incorporate the use of Convolutional Neural Network and Constrained Local Models (CNN-CLM) which can make improvement for the assessment of Laparoscopic Cholecystectomy (LC) surgery not only bring opportunities for surgery but also bring challenges on the way forward by using the edge cutting technology. The problem with the current method of surgery is the lack of safety and specific complications and problems associated with safety in each laparoscopic cholecystectomy procedure. When CLM is utilize into CNN models, it is effective at predicting time series tasks like iden
... Show MoreBackground: Axillary lymph node (ALN) enlargement with diffuse cortical thickening and conserved echogenic hilum may represent a diagnostic and therapeutic challenge. Sonographic strain elastography may help the characterization of borderline ALN.
Aim: To evaluate the strain elastography of borderline ALN and to calculate a cutoff value of strain ratio (SR) that can identify suspicious ALN with the highest sensitivity and specificity to reduce unnecessary invasive procedures.
Subjects and Methods: A prospective study included 45 patients who attended the Breast clinic in Oncology Teaching Hospital with borderline axillary lymphadenopathy (intact hilum and diffusely thic
... Show MoreIn this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreThe issue of increasing the range covered by a wireless sensor network with restricted sensors is addressed utilizing improved CS employing the PSO algorithm and opposition-based learning (ICS-PSO-OBL). At first, the iteration is carried out by updating the old solution dimension by dimension to achieve independent updating across the dimensions in the high-dimensional optimization problem. The PSO operator is then incorporated to lessen the preference random walk stage's imbalance between exploration and exploitation ability. Exceptional individuals are selected from the population using OBL to boost the chance of finding the optimal solution based on the fitness value. The ICS-PSO-OBL is used to maximize coverage in WSN by converting r
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThis research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadri
This study aimed to investigate the incorporation of recycled waste compact discs (WCDs) powder in concrete mixes to replace the fine aggregate by 5%, 10%, 15% and 20%. Compared to the reference concrete mix, results revealed that using WCDs powder in concrete mixes improved the workability and the dry density. The results demonstrated that the compressive, flexural, and split tensile strengths values for the WCDs-modified concrete mixes showed tendency to increase above the reference mix. However, at 28 days curing age, the strengths values for WCDs-modified concrete mixes were comparable to those for the reference mix. The leaching test revealed that none of the WCDs constituents was detected in the leachant after 180 days. The
... Show More