Pub Date : 2023-12-15DOI: 10.30534/ijccn/2023/011242023
The aim of the study is to compare the deadlock detection algorithms in distributed systems with respective Blockchain technology presented in this paper. Today, detecting deadlocks in distributed systems is a very important challenge. Without the proper deadlock detection mechanism, the system can get stuck in a reject state. The goal of this work is to figure out which algorithm is more suitable for deadlock detection in Blockchain technology based on these factors i-e Security, Time, Performance, Communication, and Correctness. Under the positivism paradigm. The descriptive research design and distributed technique are used to minimize the occurrence of deadlock and to identify the deadlock in parallel collective operation verified up to maximum threads. The algorithms for deadlock detection that are compared in this study are Scalable deadlock detection, Push-relabel algorithm, Knapp’s, Fulgor, and Consensus based on Blockchain technology. Blockchain technology provides a secure environment and helps to build trust. According to this paper, the Fulgor algorithm is more effective at removing deadlocks and maintaining communication security between distributed systems. Both controlled and uncontrolled environments are tested with different algorithms and are compared to define efficiency side-by-side. Deadlock detection requires identifying some properties and message delays in the global state of the distributed system. The number of common parameters has been identified in the selected algorithms to detect deadlocks in a distributed system
{"title":"Comparative Analysis of Deadlock Detection Algorithm based on Blockchain","authors":"","doi":"10.30534/ijccn/2023/011242023","DOIUrl":"https://doi.org/10.30534/ijccn/2023/011242023","url":null,"abstract":"The aim of the study is to compare the deadlock detection algorithms in distributed systems with respective Blockchain technology presented in this paper. Today, detecting deadlocks in distributed systems is a very important challenge. Without the proper deadlock detection mechanism, the system can get stuck in a reject state. The goal of this work is to figure out which algorithm is more suitable for deadlock detection in Blockchain technology based on these factors i-e Security, Time, Performance, Communication, and Correctness. Under the positivism paradigm. The descriptive research design and distributed technique are used to minimize the occurrence of deadlock and to identify the deadlock in parallel collective operation verified up to maximum threads. The algorithms for deadlock detection that are compared in this study are Scalable deadlock detection, Push-relabel algorithm, Knapp’s, Fulgor, and Consensus based on Blockchain technology. Blockchain technology provides a secure environment and helps to build trust. According to this paper, the Fulgor algorithm is more effective at removing deadlocks and maintaining communication security between distributed systems. Both controlled and uncontrolled environments are tested with different algorithms and are compared to define efficiency side-by-side. Deadlock detection requires identifying some properties and message delays in the global state of the distributed system. The number of common parameters has been identified in the selected algorithms to detect deadlocks in a distributed system","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"57 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139000268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-15DOI: 10.30534/ijccn/2023/021222023
This work presents a framework with a taxonomy on meta-learning used in Dynamic Adaptive Streaming over HTTP (DASH). With the increasing complexity of network conditions and user preferences, there is a need for efficient adaptation mechanisms in DASH to provide optimal quality of experience (QoE) for users. Meta-learning, or learning to learn, has emerged as a promising approach to enhance adaptive streaming algorithms in DASH by leveraging prior knowledge and experiences. The proposed framework provides a systematic and structured approach for applying meta-learning techniques in the context of DASH. It encompasses essential components, including data collection and preprocessing, meta-model architecture, meta-training, meta-testing, fine-tuning, and continuous improvement. The taxonomy within the framework categorizes various aspects of meta-learning in DASH, such as meta-learning approaches, components, objectives, and applications
{"title":"A Framework for Meta-Learning in Dynamic Adaptive Streaming over HTTP","authors":"","doi":"10.30534/ijccn/2023/021222023","DOIUrl":"https://doi.org/10.30534/ijccn/2023/021222023","url":null,"abstract":"This work presents a framework with a taxonomy on meta-learning used in Dynamic Adaptive Streaming over HTTP (DASH). With the increasing complexity of network conditions and user preferences, there is a need for efficient adaptation mechanisms in DASH to provide optimal quality of experience (QoE) for users. Meta-learning, or learning to learn, has emerged as a promising approach to enhance adaptive streaming algorithms in DASH by leveraging prior knowledge and experiences. The proposed framework provides a systematic and structured approach for applying meta-learning techniques in the context of DASH. It encompasses essential components, including data collection and preprocessing, meta-model architecture, meta-training, meta-testing, fine-tuning, and continuous improvement. The taxonomy within the framework categorizes various aspects of meta-learning in DASH, such as meta-learning approaches, components, objectives, and applications","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"16 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133203816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-08DOI: 10.30534/ijccn/2023/011222023
The cultivation of onions is crucial for meeting global demand, as they are widely consumed and used as a seasoning in various dishes worldwide. However, the production of onions is significantly affected by climatic factors and pest infestations. To address these challenges, this study presents OnionAider, a Model Driven Decision Support System that utilizes weather and pest-occurrence prediction models for onion cultivation. The system integrates descriptive, exploratory, historical, and AGILE methodologies to develop a comprehensive mobile application. The effectiveness of OnionAider was evaluated through data retrieval, questionnaires, and interviews with farmers, experts, and relevant stakeholders. The results indicate a strong relationship between climatic data and pest infestation in onions, with temperature and humidity being the primary predictors. The developed mobile application incorporates an algorithm derived from the Proponent-Rete method and offers valuable features for onion farmers. The system complies with ISO 25010 software compliance criteria. This article discusses the methodology, results, and implications of OnionAider in enhancing onion cultivation practices.
{"title":"OnionAider: A Model Driven Decision Support System for Weather and Pest-Occurrence Prediction in Onion Cultivation","authors":"","doi":"10.30534/ijccn/2023/011222023","DOIUrl":"https://doi.org/10.30534/ijccn/2023/011222023","url":null,"abstract":"The cultivation of onions is crucial for meeting global demand, as they are widely consumed and used as a seasoning in various dishes worldwide. However, the production of onions is significantly affected by climatic factors and pest infestations. To address these challenges, this study presents OnionAider, a Model Driven Decision Support System that utilizes weather and pest-occurrence prediction models for onion cultivation. The system integrates descriptive, exploratory, historical, and AGILE methodologies to develop a comprehensive mobile application. The effectiveness of OnionAider was evaluated through data retrieval, questionnaires, and interviews with farmers, experts, and relevant stakeholders. The results indicate a strong relationship between climatic data and pest infestation in onions, with temperature and humidity being the primary predictors. The developed mobile application incorporates an algorithm derived from the Proponent-Rete method and offers valuable features for onion farmers. The system complies with ISO 25010 software compliance criteria. This article discusses the methodology, results, and implications of OnionAider in enhancing onion cultivation practices.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121804193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-15DOI: 10.30534/ijccn/2022/021142022
Digital citizenship is the set of rules, controls, standards, norms, ideas and principles followed in the optimal and correct use of technology, which citizens need in order to contribute to the advancement of the country. Digital citizenship in short is guidance, guidance and protection, guidance and guidance towards the benefits of modern technologies, and protection from their dangers. In short, it is the smart handling of technology. This paper sheds light on digital citizenship and its role in supporting the educational process in accordance with the vision of the Kingdom of Saudi Arabia 2030, given that in today's world and with the development of the world in various fields and the emergence of technological openness and the emergence of digital programs and the spread of modern means of mass communication and its wide range and ease of access to all, I started The importance of digital citizenship, its dimensions, and its effects are clearly evident, as the digital citizen is considered a patriot’s helper, and it is a mirror of his homeland, through which he reflects his values, customs, and traditions. Therefore, he became responsible to everyone in what he says and what he does, and everyone represents the country through his digital personality that he creates himself through his behaviors, participation, and cultures that he creates. He roams around the globe and communicates with others smoothly and easily, in a monitored and documented manner, as if it were a biography of this person. Based on the foregoing, it has become necessary to provide ideal positive models on how to properly use the means of technology in order to set a good example, by spreading the culture of digital citizenship and security awareness among members of society in light of the current scientific developments and their challenges, by encouraging desirable behaviors and fighting unpopular behaviors. In digital transactions, to be the forearms of a patriot, producers, creators, and officials in the digital space, preserving societal values, and practicing positive digital citizenship. To verify the objective of the study, we have used the digital citizenship study questionnaire which was made available electronically, and the number of distributed questionnaires reached 172. After reviewing and checking, we obtained 159 questionnaires valid for statistical analysis according to the target group, who are students. The five-point Likert scale was used as well as the direct questions (yes, no). The five-point Likert scale is characterized by the level measurement (high, above average, average, below average, poor). The analysis of the results using SPSS to measure the arithmetic mean and the recurrence rate showed a number of results that help the researcher to identify the most important skills that need to be strengthened and developed through education and training, to achieve the optimal use of technology and enhance intellectual security, in light of digital
{"title":"Digital Citizenship and its Role in Achieving the Vision of Kingdom of Saudi Arabia 2030","authors":"","doi":"10.30534/ijccn/2022/021142022","DOIUrl":"https://doi.org/10.30534/ijccn/2022/021142022","url":null,"abstract":"Digital citizenship is the set of rules, controls, standards, norms, ideas and principles followed in the optimal and correct use of technology, which citizens need in order to contribute to the advancement of the country. Digital citizenship in short is guidance, guidance and protection, guidance and guidance towards the benefits of modern technologies, and protection from their dangers. In short, it is the smart handling of technology. This paper sheds light on digital citizenship and its role in supporting the educational process in accordance with the vision of the Kingdom of Saudi Arabia 2030, given that in today's world and with the development of the world in various fields and the emergence of technological openness and the emergence of digital programs and the spread of modern means of mass communication and its wide range and ease of access to all, I started The importance of digital citizenship, its dimensions, and its effects are clearly evident, as the digital citizen is considered a patriot’s helper, and it is a mirror of his homeland, through which he reflects his values, customs, and traditions. Therefore, he became responsible to everyone in what he says and what he does, and everyone represents the country through his digital personality that he creates himself through his behaviors, participation, and cultures that he creates. He roams around the globe and communicates with others smoothly and easily, in a monitored and documented manner, as if it were a biography of this person. Based on the foregoing, it has become necessary to provide ideal positive models on how to properly use the means of technology in order to set a good example, by spreading the culture of digital citizenship and security awareness among members of society in light of the current scientific developments and their challenges, by encouraging desirable behaviors and fighting unpopular behaviors. In digital transactions, to be the forearms of a patriot, producers, creators, and officials in the digital space, preserving societal values, and practicing positive digital citizenship. To verify the objective of the study, we have used the digital citizenship study questionnaire which was made available electronically, and the number of distributed questionnaires reached 172. After reviewing and checking, we obtained 159 questionnaires valid for statistical analysis according to the target group, who are students. The five-point Likert scale was used as well as the direct questions (yes, no). The five-point Likert scale is characterized by the level measurement (high, above average, average, below average, poor). The analysis of the results using SPSS to measure the arithmetic mean and the recurrence rate showed a number of results that help the researcher to identify the most important skills that need to be strengthened and developed through education and training, to achieve the optimal use of technology and enhance intellectual security, in light of digital ","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121611901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-15DOI: 10.30534/ijccn/2022/011142022
The Kahoot program now provides more than forty million pre-packaged games in all subjects and in various languages and levels. It is also available to all learners, which makes starting learning on it quickly, easy and appropriate, especially in the distance learning process when the time and conditions are not available to reach the educational institution. Since Kahoot is completely free, it simply requires you to create an account to start working on it. Students can use it through most electronic devices from anywhere and at any time after connecting to the Internet. This study aimed to identify the effectiveness of using Kahoot application in increasing motivation and achievement. The study was done on the faculty of communication and media- King Abdulaziz University. The most important results indicate that the use of the Kahoot application had a positive impact on increasing learning motivation and learning the offensive skills under discussion in a short time. The leaderboards for learners applying Kahoot had a positive impact on indirect learning among learners. Also, the results indicate that although teachers believe that Kahoot is qualified with several positive features, it still suffers from several disadvantages in which it can definitely improve. Finally it was found that the most important advantage of Kahoot application is immediate feedback. The teacher can gather information about how many students get the right answer at once and can compare that information with students’ current level of knowledge about a topic. Kahoot also frees both the teachers and students from traditional assessment and evaluation models
{"title":"The Effective Role of using Kahoot Application in Supporting University Education in Saudi Universities: Case Study on King Abdulaziz University Jeddah, Saudi Arabia","authors":"","doi":"10.30534/ijccn/2022/011142022","DOIUrl":"https://doi.org/10.30534/ijccn/2022/011142022","url":null,"abstract":"The Kahoot program now provides more than forty million pre-packaged games in all subjects and in various languages and levels. It is also available to all learners, which makes starting learning on it quickly, easy and appropriate, especially in the distance learning process when the time and conditions are not available to reach the educational institution. Since Kahoot is completely free, it simply requires you to create an account to start working on it. Students can use it through most electronic devices from anywhere and at any time after connecting to the Internet. This study aimed to identify the effectiveness of using Kahoot application in increasing motivation and achievement. The study was done on the faculty of communication and media- King Abdulaziz University. The most important results indicate that the use of the Kahoot application had a positive impact on increasing learning motivation and learning the offensive skills under discussion in a short time. The leaderboards for learners applying Kahoot had a positive impact on indirect learning among learners. Also, the results indicate that although teachers believe that Kahoot is qualified with several positive features, it still suffers from several disadvantages in which it can definitely improve. Finally it was found that the most important advantage of Kahoot application is immediate feedback. The teacher can gather information about how many students get the right answer at once and can compare that information with students’ current level of knowledge about a topic. Kahoot also frees both the teachers and students from traditional assessment and evaluation models","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134068385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-07DOI: 10.30534/ijccn/2021/011042021
O. BabalolaG., Oguntimilehin
Cloud-based Internet of Things environments exhibit different architectures based on the services they provide, thus making it even harder to find ‘global’ security measures. Many of the security issues in relations to Cloud Computing architecture, governance, portability and interoperability, have been addressed in other systems. The specific characteristics of Internet of Things application in Cloud environments result into new security concerns. Various security models have been proposed to deal with security threats ranging from authentication, access control, lightweight security, data privacy and so on. However, users are not aware of the degree of security integrated with the CloudInternet of Things application system thereby limiting the perceived trustworthiness of such systems. Therefore, the need to provide aCloud-based Internet of Things application reporting system that can predict and monitor the effectiveness of such applications cannot be overemphasized. In this paper, reviews of existing Cloud-based Internet of Things security approaches are presented. This paper is concluded by highlighting the future research direction with respect to improving the acceptability of secured Cloud-based Internet of Things deployment
{"title":"Secured Cloud-Based Internet Of Things Application Reporting System: A Review","authors":"O. BabalolaG., Oguntimilehin","doi":"10.30534/ijccn/2021/011042021","DOIUrl":"https://doi.org/10.30534/ijccn/2021/011042021","url":null,"abstract":"Cloud-based Internet of Things environments exhibit different architectures based on the services they provide, thus making it even harder to find ‘global’ security measures. Many of the security issues in relations to Cloud Computing architecture, governance, portability and interoperability, have been addressed in other systems. The specific characteristics of Internet of Things application in Cloud environments result into new security concerns. Various security models have been proposed to deal with security threats ranging from authentication, access control, lightweight security, data privacy and so on. However, users are not aware of the degree of security integrated with the CloudInternet of Things application system thereby limiting the perceived trustworthiness of such systems. Therefore, the need to provide aCloud-based Internet of Things application reporting system that can predict and monitor the effectiveness of such applications cannot be overemphasized. In this paper, reviews of existing Cloud-based Internet of Things security approaches are presented. This paper is concluded by highlighting the future research direction with respect to improving the acceptability of secured Cloud-based Internet of Things deployment","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133457311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-15DOI: 10.30534/ijccn/2021/011022021
Dona Lal, Jothika Mohan, S. RenjishaT, Saviya Davis, Divya Mohan
In India, majority of people are speaking the language Hindi, but a major portion of signboards are in English. On a business or pleasure trip, the travelers get confused by the various sign boards written in English. As smartphones becomes most popular inrecent years,they canrely on smartphone for the same. This paper explains the work intended to build a mobile application that can recognize the English content and sign present on the signboard image, detect and translate the content and symbols from English to Hindi and display the translated Hindi text back to the screen of the phone. The system uses pre-trained faster regional convolutional neural networkusing pre-trained CNN for object detection, tesseract OCR for text extraction and English-to-Hindi dictionary for translation.
{"title":"Improved Real time Signboard Detection and Translation Using FRCNN","authors":"Dona Lal, Jothika Mohan, S. RenjishaT, Saviya Davis, Divya Mohan","doi":"10.30534/ijccn/2021/011022021","DOIUrl":"https://doi.org/10.30534/ijccn/2021/011022021","url":null,"abstract":"In India, majority of people are speaking the language Hindi, but a major portion of signboards are in English. On a business or pleasure trip, the travelers get confused by the various sign boards written in English. As smartphones becomes most popular inrecent years,they canrely on smartphone for the same. This paper explains the work intended to build a mobile application that can recognize the English content and sign present on the signboard image, detect and translate the content and symbols from English to Hindi and display the translated Hindi text back to the screen of the phone. The system uses pre-trained faster regional convolutional neural networkusing pre-trained CNN for object detection, tesseract OCR for text extraction and English-to-Hindi dictionary for translation.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134521569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-20DOI: 10.30534/ijccn/2020/01942019
This study aims to implement SOA in the field of digital distribution games, besides that theapplication of SOA in digital distribution games also has several benefits including helping the users of this game with the effectiveness of time used, besides using SOA on digital distribution games also increases connectivity with providers services ingame service providers are more dynamic. In addition, using SOA in digital distribution games can also speed up standardization servers and application applications and provide bridges (data-bridges) between incompatible technologies
{"title":"SOA Architecture for Games Digital Distribution","authors":"","doi":"10.30534/ijccn/2020/01942019","DOIUrl":"https://doi.org/10.30534/ijccn/2020/01942019","url":null,"abstract":"This study aims to implement SOA in the field of digital distribution games, besides that theapplication of SOA in digital distribution games also has several benefits including helping the users of this game with the effectiveness of time used, besides using SOA on digital distribution games also increases connectivity with providers services ingame service providers are more dynamic. In addition, using SOA in digital distribution games can also speed up standardization servers and application applications and provide bridges (data-bridges) between incompatible technologies","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123072305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-25DOI: 10.30534/ijccn/2020/01932019
{"title":"Logical Review on Educational Data Mining","authors":"","doi":"10.30534/ijccn/2020/01932019","DOIUrl":"https://doi.org/10.30534/ijccn/2020/01932019","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123930107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-02DOI: 10.30534/ijccn/2020/08922019
Ashlin k Benny
In this decade the main challenge facing in the entire treatment sketch and the evaluation is how vast a brain tumor.one of the most dangerous reason for cancer. Accuracy in quantitative analysis and segmentation of brain are crucial for the treatment sketch. Even though many manual segmentations and magnetic resonance image has emerged they are highly time consuming and error prone.2D and 3D convolutions using neural networks cannot satisfy the whole treating plans of brain tumors even though if possible they are highly expensive in cost of its computation and the demand in its memory .Here we propose 3D UNet architecture using separable 2D convolutions.
{"title":"3D-UNet Architecture Using Separable 2D Convolutions","authors":"Ashlin k Benny","doi":"10.30534/ijccn/2020/08922019","DOIUrl":"https://doi.org/10.30534/ijccn/2020/08922019","url":null,"abstract":"In this decade the main challenge facing in the entire treatment sketch and the evaluation is how vast a brain tumor.one of the most dangerous reason for cancer. Accuracy in quantitative analysis and segmentation of brain are crucial for the treatment sketch. Even though many manual segmentations and magnetic resonance image has emerged they are highly time consuming and error prone.2D and 3D convolutions using neural networks cannot satisfy the whole treating plans of brain tumors even though if possible they are highly expensive in cost of its computation and the demand in its memory .Here we propose 3D UNet architecture using separable 2D convolutions.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134371653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}