Research Article
Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning
Table 2
Experimental results for parameters of proposed system.
| Name of the object | Sensitivity | Specificity | Accuracy | Retrieval score | Exis. | Pro. | Exis. | Pro. | Exis. | Pro. | Exis. | Pro. |
| Roses | 0.85 | 0.9 | 0.75 | 0.8 | 0.75 | 0.8 | 0.86 | 0.9 | Dinosaur | 0.88 | 0.93 | 0.8 | 0.85 | 0.85 | 0.9 | 0.9 | 0.95 | Buses | 0.9 | 0.98 | 0.85 | 0.9 | 0.9 | 0.95 | 0.95 | 0.99 | Cars | 0.75 | 0.8 | 0.7 | 0.75 | 0.68 | 0.75 | 0.75 | 0.8 | Sun X-ray | 0.75 | 0.8 | 0.65 | 0.7 | 0.65 | 0.76 | 0.7 | 0.77 | Scenery | 0.87 | 0.9 | 0.8 | 0.85 | 0.8 | 0.88 | 0.85 | 0.9 | Spectacles | 0.86 | 0.9 | 0.78 | 0.85 | 0.85 | 0.92 | 0.93 | 0.97 | Average | 0.85 | 0.882 | 0.78 | 0.814 | 0.83 | 0.851 | 0.86 | 0.897 |
|
|