期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Integrating digital twins and deep learning for medical image analysis in the era of COVID-19
1
作者 Imran AHMED Misbah AHMAD Gwanggil JEON 《Virtual Reality & Intelligent Hardware》 2022年第4期292-305,共14页
Background Digital twins are virtual representations of devices and processes that capture the physical properties of the environment and operational algorithms/techniques in the context of medical devices and tech-no... Background Digital twins are virtual representations of devices and processes that capture the physical properties of the environment and operational algorithms/techniques in the context of medical devices and tech-nologies.Digital twins may allow healthcare organizations to determine methods of improving medical processes,enhancing patient experience,lowering operating expenses,and extending the value of care.During the present COVID-19 pandemic,various medical devices,such as X-rays and CT scan machines and processes,are constantly being used to collect and analyze medical images.When collecting and processing an extensive volume of data in the form of images,machines and processes sometimes suffer from system failures,creating critical issues for hospitals and patients.Methods To address this,we introduce a digital-twin-based smart healthcare system in-tegrated with medical devices to collect information regarding the current health condition,configuration,and maintenance history of the device/machine/system.Furthermore,medical images,that is,X-rays,are analyzed by using a deep-learning model to detect the infection of COVID-19.The designed system is based on the cascade recurrent convolution neural network(RCNN)architecture.In this architecture,the detector stages are deeper and more sequentially selective against small and close false positives.This architecture is a multi-stage extension of the RCNN model and sequentially trained using the output of one stage for training the other.At each stage,the bounding boxes are adjusted to locate a suitable value of the nearest false positives during the training of the different stages.In this manner,the arrangement of detectors is adjusted to increase the intersection over union,overcoming the problem of overfitting.We train the model by using X-ray images as the model was previously trained on another dataset.Results The developed system achieves good accuracy during the detection phase of COVID-19.The experimental outcomes reveal the efficiency of the detection architecture,which yields a mean average precision rate of 0.94. 展开更多
关键词 Digital twins Deep learning Healthcare COVID-19 Chest X-rays Artificial intelligence
下载PDF
A linkable signature scheme supporting batch verification for privacy protection in crowd-sensing
2
作者 Xu Li Gwanggil Jeon +1 位作者 Wenshuo Wang Jindong Zhao 《Digital Communications and Networks》 SCIE CSCD 2024年第3期645-654,共10页
The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more ... The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more privacy security challenges,the most commom which is privacy leakage.As a privacy protection technology combining data integrity check and identity anonymity,ring signature is widely used in the field of privacy protection.However,introducing signature technology leads to additional signature verification overhead.In the scenario of crowd-sensing,the existing signature schemes have low efficiency in multi-signature verification.Therefore,it is necessary to design an efficient multi-signature verification scheme while ensuring security.In this paper,a batch-verifiable signature scheme is proposed based on the crowd-sensing background,which supports the sensing platform to verify the uploaded multiple signature data efficiently,so as to overcoming the defects of the traditional signature scheme in multi-signature verification.In our proposal,a method for linking homologous data was presented,which was valuable for incentive mechanism and data analysis.Simulation results showed that the proposed scheme has good performance in terms of security and efficiency in crowd-sensing applications with a large number of users and data. 展开更多
关键词 5G network Crowd-sensing Privacy protection Ring signature Batch verification
下载PDF
Towards Collaborative Robotics in Top View Surveillance:A Framework for Multiple Object Tracking by Detection Using Deep Learning 被引量:8
3
作者 Imran Ahmed Sadia Din +2 位作者 Gwanggil Jeon Francesco Piccialli Giancarlo Fortino 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第7期1253-1270,共18页
Collaborative Robotics is one of the high-interest research topics in the area of academia and industry.It has been progressively utilized in numerous applications,particularly in intelligent surveillance systems.It a... Collaborative Robotics is one of the high-interest research topics in the area of academia and industry.It has been progressively utilized in numerous applications,particularly in intelligent surveillance systems.It allows the deployment of smart cameras or optical sensors with computer vision techniques,which may serve in several object detection and tracking tasks.These tasks have been considered challenging and high-level perceptual problems,frequently dominated by relative information about the environment,where main concerns such as occlusion,illumination,background,object deformation,and object class variations are commonplace.In order to show the importance of top view surveillance,a collaborative robotics framework has been presented.It can assist in the detection and tracking of multiple objects in top view surveillance.The framework consists of a smart robotic camera embedded with the visual processing unit.The existing pre-trained deep learning models named SSD and YOLO has been adopted for object detection and localization.The detection models are further combined with different tracking algorithms,including GOTURN,MEDIANFLOW,TLD,KCF,MIL,and BOOSTING.These algorithms,along with detection models,help to track and predict the trajectories of detected objects.The pre-trained models are employed;therefore,the generalization performance is also investigated through testing the models on various sequences of top view data set.The detection models achieved maximum True Detection Rate 93%to 90%with a maximum 0.6%False Detection Rate.The tracking results of different algorithms are nearly identical,with tracking accuracy ranging from 90%to 94%.Furthermore,a discussion has been carried out on output results along with future guidelines. 展开更多
关键词 Collaborative robotics deep learning object detection and tracking top view video surveillance
下载PDF
Energy Theft Detection in Smart Grids:Taxonomy,Comparative Analysis,Challenges,and Future Research Directions 被引量:1
4
作者 Mohsin Ahmed Abid Khan +4 位作者 Mansoor Ahmed Mouzna Tahir Gwanggil Jeon Giancarlo Fortino Francesco Piccialli 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第4期578-600,共23页
Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new ... Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new energy theft detection(ETD)techniques have been proposed by utilising different data mining(DM)techniques,state&network(S&N)based techniques,and game theory(GT)techniques.Here,a detailed survey is presented where many state-of-the-art ETD techniques are studied and analysed for their strengths and limitations.Three levels of taxonomy are presented to classify state-of-the-art ETD techniques.Different types and ways of energy theft and their consequences are studied and summarised and different parameters to benchmark the performance of proposed techniques are extracted from literature.The challenges of different ETD techniques and their mitigation are suggested for future work.It is observed that the literature on ETD lacks knowledge management techniques that can be more effective,not only for ETD but also for theft tracking.This can help in the prevention of energy theft,in the future,as well as for ETD. 展开更多
关键词 CHALLENGES comparative analysis energy theft detection future research directions smart grid TAXONOMY
下载PDF
Fuzz-classification(p,l)-Angel:An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches
5
作者 Tehsin Kanwal Hasina Attaullah +2 位作者 Adeel Anjum Abid Khan Gwanggil Jeon 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1131-1140,共10页
The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS,SLAMSA,(p,k)-Angelization,and(p,l)-Angelizatio... The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS,SLAMSA,(p,k)-Angelization,and(p,l)-Angelization,but these were found to be insufficient in terms of robust privacy and performance.(p,l)-Angelization was successful against different privacy disclosures,but it was not efficient.To the best of our knowledge,no robust privacy model based on fuzzy logic has been proposed to protect the privacy of sensitive attributes with multiple records.In this paper,we suggest an improved version of(p,l)-Angelization based on a hybrid AI approach and privacy-preserving approach like Generalization.Fuzz-classification(p,l)-Angel uses artificial intelligence based fuzzy logic for classification,a high-dimensional segmentation technique for segmenting quasi-identifiers and multiple sensitive attributes.We demonstrate the feasibility of the proposed solution by modelling and analyzing privacy violations using High-Level Petri Nets.The results of the experiment demonstrate that the proposed approach produces better results in terms of efficiency and utility. 展开更多
关键词 Generalization FUZZY-LOGIC MSA Privacy disclosures Membership function (p l)-Angelization QT HLPN
下载PDF
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home
6
作者 Bello Musa Yakubu Majid Iqbal Khan +2 位作者 Abid Khan Farhana Jabeen Gwanggil Jeon 《Digital Communications and Networks》 SCIE CSCD 2023年第2期383-392,共10页
Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,S... Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)interactions.Tapping into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart home.The Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger system.The work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the system.The simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a time.This is done to measure the system's consistency across a variety of device capabilities.The experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times. 展开更多
关键词 DDoS attack Device-to-device Smart homes Blockchain AUTHENTICATION Ethereum smartcontract
下载PDF
Deep learning based water leakage detection for shield tunnel lining
7
作者 Shichang LIU Xu XU +2 位作者 Gwanggil JEON Junxin CHEN Ben-Guo HE 《Frontiers of Structural and Civil Engineering》 SCIE EI CSCD 2024年第6期887-898,共12页
Shield tunnel lining is prone to water leakage,which may further bring about corrosion and structural damage to the walls,potentially leading to dangerous accidents.To avoid tedious and inefficient manual inspection,m... Shield tunnel lining is prone to water leakage,which may further bring about corrosion and structural damage to the walls,potentially leading to dangerous accidents.To avoid tedious and inefficient manual inspection,many projects use artificial intelligence(Al)to detect cracks and water leakage.A novel method for water leakage inspection in shield tunnel lining that utilizes deep learning is introduced in this paper.Our proposal includes a ConvNeXt-S backbone,deconvolutional-feature pyramid network(D-FPN),spatial attention module(SPAM).and a detection head.It can extract representative features of leaking areas to aid inspection processes.To further improve the model's robustness,we innovatively use an inversed low-light enhancement method to convert normally illuminated images to low light ones and introduce them into the training samples.Validation experiments are performed,achieving the average precision(AP)score of 56.8%,which outperforms previous work by a margin of 5.7%.Visualization illustrations also support our method's practical effectiveness. 展开更多
关键词 water leakage detection deep learning deconvolutional-feature pyramid spatial attention
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部