2021
DOI: 10.1016/j.sna.2021.113055
|View full text |Cite
|
Sign up to set email alerts
|

Absorption, fluorescence and sensing quality of Rose Bengal dye-encapsulated cinnamon nanoparticles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…The COVID-19 class contains 822 images, while the NORMAL class contains 1577 images [24][25][26][27]. However, we used the proposed method to evaluate ACC, MCC, SEN, F1, PRE, and SP metrics (equations [25][26][27][28][29][30][31][32].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The COVID-19 class contains 822 images, while the NORMAL class contains 1577 images [24][25][26][27]. However, we used the proposed method to evaluate ACC, MCC, SEN, F1, PRE, and SP metrics (equations [25][26][27][28][29][30][31][32].…”
Section: Resultsmentioning
confidence: 99%
“…In this experiment, we calculate the evaluation metrics of the SVM and the KNN classifiers for the GLCM1, GLCM2, GLCM3, GLCM4, and GLCMA datasets. Furthermore, this subsection compares the proposed method with state-of-the-art algorithms [28][29][30][31][32][33]. Furthermore, the experimental results of the proposed method are collected on the COVID GLCM dataset using SVM and KNN classifiers.…”
Section: Resultsmentioning
confidence: 99%
“…Of course, it suffers during its performance from small key spaces and the possibility of detecting its orbits in addition to its limited ranges, and several other performance limitations. The authors proposed a high-dimensional chaotic system and the possibility of more secure encryption when used in image encryption and named it Walid-Ali Chaotic Map (WAM) [26][27][28][29][30]. Based on these characteristics, this new chaotic system (WAM) has been used in this research to generate chaotic sequences, which can be described by the following equations:…”
Section: The Proposed Methodsmentioning
confidence: 99%
“…The problem is introduced in a way that only Bob can notice and fix because he has the private key. The bounded distance decoding problem is NP-Complete, making it inefficient for the hacker to fix the mistake [26][27][28].…”
Section: Code-based Cryptographymentioning
confidence: 99%