In this golden age of rapid development surgeons realized that AI could contribute to healthcare in all aspects, especially in surgery. The aim of the study will incorporate the use of Convolutional Neural Network and Constrained Local Models (CNN-CLM) which can make improvement for the assessment of Laparoscopic Cholecystectomy (LC) surgery not only bring opportunities for surgery but also bring challenges on the way forward by using the edge cutting technology. The problem with the current method of surgery is the lack of safety and specific complications and problems associated with safety in each laparoscopic cholecystectomy procedure. When CLM is utilize into CNN models, it is effective at predicting time series tasks like identifying the sequence of events in the Laparoscopic Cholecystectomy (LC). This study will contribute to show the effectiveness of CNN-CLM approach on laparoscopic cholecystectomy, which will frequently focus on surgical computer vision analysis of surgical safety and related applications. The method of study is deep learning based CNN-CLM to better detect nominal safety as well as unsafe practices around the critical view of safety and AI-based grading scale. The general design flow of AI-recognition of surgical safety is firstly collecting safety surgical videos for frame segmenting and phase according to the image context by surgeon reviewer by CNN-CLM. For this advance research, the dataset is splatted into three main parts where 70% of which is used for training, 15% of which is used for testing and the rest for the cross validation, to achieve the accuracy up to 98.79% of this specific research. For result part, different metrics of CNN-CLM to evaluate the performance of the proposed model of safety in surgery. The study uses one of the top three performing methods CNN-CLM for the evaluation yields and anatomical structures in laparoscopic cholecystectomy surgery.
ABSTRUCT
In This Paper, some semi- parametric spatial models were estimated, these models are, the semi – parametric spatial error model (SPSEM), which suffer from the problem of spatial errors dependence, and the semi – parametric spatial auto regressive model (SPSAR). Where the method of maximum likelihood was used in estimating the parameter of spatial error ( λ ) in the model (SPSEM), estimated the parameter of spatial dependence ( ρ ) in the model ( SPSAR ), and using the non-parametric method in estimating the smoothing function m(x) for these two models, these non-parametric methods are; the local linear estimator (LLE) which require finding the smoo
... Show MoreThis narrative review focused on research investigating the impact of loneliness on the prevalence of dementia and its relationship with other risk factors. A comprehensive and rigorous search was conducted using a variety of scientific databases with specific keywords to identify all prior studies that examined the correlation between dementia and loneliness. The inquiry was confined to articles published in English from January 2017 to March 2024. The narrative review identified a consensus regarding the role of loneliness in enhancing the risk of all‐cause dementia, with a particular emphasis on the subjective perception of loneliness. This phenomenon may be caused by the sensations of exclusion, discrimination, and alienation that are
... Show MoreMobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreIt takes a lot of time to classify the banana slices by sweetness level using traditional methods. By assessing the quality of fruits more focus is placed on its sweetness as well as the color since they affect the taste. The reason for sorting banana slices by their sweetness is to estimate the ripeness of bananas using the sweetness and color values of the slices. This classifying system assists in establishing the degree of ripeness of bananas needed for processing and consumption. The purpose of this article is to compare the efficiency of the SVM-linear, SVM-polynomial, and LDA classification of the sweetness of banana slices by their LRV level. The result of the experiment showed that the highest accuracy of 96.66% was achieved by the
... Show MoreThis paper presents a modified training method for Recurrent Neural Networks. This method depends on the Non linear Auto Regressive (NARX) model with Modified Wavelet Function as activation function (MSLOG) in the hidden layer. The modified model is known as Modified Recurrent Neural (MRN). It is used for identification Forward dynamics of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot. This model is also used in the design of Direct Inverse Control (DIC). This method is compared with Recurrent Neural Networks that used Sigmoid activation function (RS) in the hidden layer and Recurrent Neural Networks with Wavelet activation function (RW). Simulation results shows that the MRN model is bett
... Show MoreThis work implements the face recognition system based on two stages, the first stage is feature extraction stage and the second stage is the classification stage. The feature extraction stage consists of Self-Organizing Maps (SOM) in a hierarchical format in conjunction with Gabor Filters and local image sampling. Different types of SOM’s were used and a comparison between the results from these SOM’s was given.
The next stage is the classification stage, and consists of self-organizing map neural network; the goal of this stage is to find the similar image to the input image. The proposal method algorithm implemented by using C++ packages, this work is successful classifier for a face database consist of 20
... Show More