Breast cancer incidence has been rising steadily during the past few decades. It is the second leading cause of death in women. If it is diagnosed early, there is a good possibility of recovery. Mammography is proven to be an excellent screening technique for breast tumor diagnosis, but its detection and classification in mammograms remain a significant challenge. Previous studies’ major limitation is an increase in false positive ratio (FPR) and false negative ratio (FNR), as well as a drop in Matthews correlation coefficient (MCC) value. A model that can lower FPR and FNR while increasing MCC value is required. To overcome prior research limitations, a modified network of YOLOv5 is used in this study to detect and classify breast tumors. Our research is conducted using publicly available datasets Curated Breast Imaging Subset of DDSM (CBIS-DDSM). The first step is to perform preprocessing, which includes image enhancing techniques and the removal of pectoral muscles and labels. The dataset is then annotated, augmented, and divided into 60% for training, 30% for validation, and 10% for testing. The experiment is then performed using a batch size of 8, a learning rate of 0.01, a momentum of 0.843, and an epoch value of 300. To evaluate the performance of our proposed model, our proposed model is compared with YOLOv3 and faster RCNN. The results show that our proposed model performs better than YOLOv3 and faster RCNN with 96% mAP, 93.50% MCC value, 96.50% accuracy, 0.04 FPR, and 0.03 FNR value. The results show that our suggested model successfully identifies and classifies breast tumors while also overcoming previous research limitations by lowering the FPR and FNR and boosting the MCC value.
The number of road accidents has constantly been increasing recently around the world. As per the national highway traffic safety administration's investigation, 45% of vehicle crashes are done by a distracted driver right around each. We endeavor to build a precise and robust framework for distinguishing diverted drivers. The existing work of distracted driver detection is concerned with a limited set of distractions (mainly cell phone usage). This paper uses the first publicly accessible dataset that is the state farm distracted driver detection dataset, which contains eight classes: calling, texting, everyday driving, operating on radio, inactiveness, talking to a passenger, looking behind, and drinking performed by 26 subjects to prepare our proposed model. The transfer values of the pertained model EfficientNet are used, as it is the backbone of EfficientDet. In contrast, the EfficientDet model detects the objects involved in these distracting activities and the region of interest of the body parts from the images to make predictions strong and accomplish state-of-art results. Also, in the Efficientdet model, we implement five variants: Efficientdet (D0-D4) for detection purposes and compared the best Efficientdet version with Faster R-CNN and Yolo-V3. Experimental results show that our approach outperforms earlier methods in the literature and conclude that EfficientDet-D3 is the best model for detecting distracted drivers as it achieves Mean Average Precision (mAP) of 99.16% along with learning rate (le-3), epoch 50, batch size 4, and step size 250, demonstrating that it can potentially help drivers maintain safe driving habits.
With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time enhancing network capacity and meeting the increased demand for access. To increase efficacy of Software Defined Network (SDN) and Network Function Virtualization (NFV) framework, we need to eradicate network security configuration errors that may create vulnerabilities to affect overall efficiency, reduce network performance, and increase maintenance cost. The existing frameworks lack in security, and computer systems face few abnormalities, which prompts the need for different recognition and mitigation methods to keep the system in the operational state proactively. The fundamental concept behind SDN-NFV is the encroachment from specific resource execution to the programming-based structure. This research is around the combination of SDN and NFV for rational decision making to control and monitor traffic in the virtualized environment. The combination is often seen as an extra burden in terms of resources usage in a heterogeneous network environment, but as well as it provides the solution for critical problems specially regarding massive network traffic issues. The attacks have been expanding step by step; therefore, it is hard to recognize and protect by conventional methods. To overcome these issues, there must be an autonomous system to recognize and characterize the network traffic's abnormal conduct if there is any. Only four types of assaults, including HTTP Flood, UDP Flood, Smurf Flood, and SiDDoS Flood, are considered in the identified dataset, to optimize the stability of the SDN-NFV environment and security management, through several machine learning based characterization techniques like Support Vector Machine (SVM), K-Nearest Neighbors (KNN), Logistic Regression (LR) and Isolation Forest (IF). Python is used for simulation purposes, including several valuable utilities like the mine package, the open-source Python ML libraries Scikit-learn, NumPy, SciPy, Matplotlib. Few Flood assaults and Structured Query Language (SQL) injections anomalies are validated and effectively-identified through the anticipated procedure. The classification results are promising and show that overall accuracy lies between 87% to 95% for SVM, LR, KNN, and IF classifiers in the scrutiny of traffic, whether the network traffic is normal or anomalous in the SDN-NFV environment.
During the Covid-19 Pandemic, the usage of social media networks increased exponentially. People engage in education, business, shopping, and other social activities (i.e., Twitter, Facebook, WhatsApp, Instagram, YouTube). As social networking expands rapidly, its positive and negative impacts affect human health. All this leads to social crimes and illegal activities like phishing, hacking, ransomware, password attacks, spyware, blackmailing, Middle-man-attack. This research extensively discusses the social networking threats, challenges, online surveys, and future effects. We conduct an online survey using the google forms platform to collect the responses of social networking sites (SNS) users within Pakistan to show how SNS affects health positively and negatively. According to the collected response, we analyzed that 50% of the users use SNS for education purposes, 17.5% use it for shopping purposes, 58.2% use it for entertainment, 37.1% use it for communication, and 9.8% use it for other purposes. According to the response, the excessive use of SNS affects the health that 9.8% users face the physical threat, 42.8% user faces mental health issues due to excessive or inappropriate use of SN, and 50.5% users feel moral threat using Social sites. Finally, we conclude our paper by discussing the open challenges, conclusions, and future directions.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.