期刊文献+
共找到59篇文章
< 1 2 3 >
每页显示 20 50 100
Evaluating and Addressing Interoperability Constraints in Health Information Systems for Enhanced Healthcare Delivery in Zimbabwe
1
作者 Prosper Tafadzwa Denhere Nelson Matanana +2 位作者 Munyaradzi Zhou Caleb Manjeese Talent Mawere 《Journal of Computer and Communications》 2024年第7期133-154,共22页
Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and ... Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and address these constraints to enhance healthcare delivery. The study examines the current state of interoperability in health information systems, identifies the key constraints, and explores their impact on healthcare outcomes. Various approaches and strategies for addressing interoperability constraints are discussed, including the adoption of standardized data formats, implementation of interoperability frameworks, and establishment of robust data governance mechanisms. Furthermore, the study highlights the importance of stakeholder collaboration, policy development, and technical advancements in achieving enhanced interoperability. The findings emphasize the need for a comprehensive evaluation of interoperability constraints and the implementation of targeted interventions to promote seamless data exchange, improve care coordination, and enhance patient outcomes in healthcare settings. 展开更多
关键词 Health Information System INTEROPERABILITY Interoperability Constraints
下载PDF
Performance evaluation of deep neural networks for forecasting time-series with multiple structural breaks and high volatility 被引量:2
2
作者 Rohit Kaushik Shikhar Jain +1 位作者 Siddhant Jain Tirtharaj Dash 《CAAI Transactions on Intelligence Technology》 EI 2021年第3期265-280,共16页
The problem of automatic and accurate forecasting of time-series data has always been an interesting challenge for the machine learning and forecasting community.A majority of the real-world time-series problems have ... The problem of automatic and accurate forecasting of time-series data has always been an interesting challenge for the machine learning and forecasting community.A majority of the real-world time-series problems have non-stationary characteristics that make the understanding of trend and seasonality difficult.The applicability of the popular deep neural networks(DNNs)as function approximators for non-stationary TSF is studied.The following DNN models are evaluated:Multi-layer Perceptron(MLP),Convolutional Neural Network(CNN),and RNN with Long Short-Term Memory(LSTM-RNN)and RNN with Gated-Recurrent Unit(GRU-RNN).These DNN methods have been evaluated over 10 popular Indian financial stocks data.Further,the performance evaluation of these DNNs has been carried out in multiple independent runs for two settings of forecasting:(1)single-step forecasting,and(2)multi-step forecasting.These DNN methods show convincing performance for single-step forecasting(one-day ahead forecast).For the multi-step forecasting(multiple days ahead forecast),the methods for different forecast periods are evaluated.The performance of these methods demonstrates that long forecast periods have an adverse effect on performance. 展开更多
关键词 NETWORKS NEURAL forecasting
下载PDF
Novel Solution Based on Face Recognition to Address Identity Theft and Cheating in Online Examination Systems 被引量:1
3
作者 Ayham Fayyoumi Anis Zarrad 《Advances in Internet of Things》 2014年第2期5-12,共8页
The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with sho... The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with short time intervals), checks for learner identity during the whole exam period to ensure that the learner who started the exam is the same one who continued until the end and prevent the possibility of cheating by looking at adjacent PC or reading from an external paper. The system will issue an early warning to the learners if suspicious behavior has been noticed by the system. The proposed system has been presented to eight e-learning instructors and experts in addition to 32 students to gather feedback and to study the impact and the benefit of such system in e-learning environment. 展开更多
关键词 Online EXAM FACE Recognition AUTHENTICATION EXAM CHEATING
下载PDF
Application of intelligence-based computational techniques for classification and early differential diagnosis of COVID-19 disease 被引量:1
4
作者 Boluwaji A.Akinnuwesi Stephen G.Fashoto +7 位作者 Elliot Mbunge Adedoyin Odumabo Andile S.Metfula Petros Mashwama Faith-Michael Uzoka Olumide Owolabi Moses Okpeku Oluwaseun O.Amusa 《Data Science and Management》 2021年第4期10-18,共9页
Clinical methods are used for diagnosing COVID-19 infected patients,but reports posit that,several people who were initially tested positive of COVID-19,and who had some underlying diseases,turned out having negative ... Clinical methods are used for diagnosing COVID-19 infected patients,but reports posit that,several people who were initially tested positive of COVID-19,and who had some underlying diseases,turned out having negative results after further tests.Therefore,the performance of clinical methods is not always guaranteed.Moreover,chest X-ray image data of COVID-19 infected patients are mostly used in the computational models for COVID-19 diagnosis,while the use of common symptoms,such as fever,cough,fatigue,muscle aches,headache,etc.in computational models is not yet reported.In this study,we employed seven classification algorithms to empirically test and verify their efficacy when applied to diagnose COVID-19 using the aforementioned symptoms.We experimented with Logistic Regression(LR),Support Vector Machine(SVM),Naïve Byes(NB),Decision Tree(DT),Multilayer Perceptron(MLP),Fuzzy Cognitive Map(FCM)and Deep Neural Network(DNN)algorithms.The techniques were subjected to random undersampling and oversampling.Our results showed that with class imbalance,MLP and DNN outperform others.However,without class imbalance,MLP,FCM and DNN outperform others with the use of random undersampling,but DNN has the best performance by utilizing random oversampling.This study identified MLP,FCM and DNN as better classifiers over LR,NB,DT and SVM,so that healthcare software system developers can adopt them to develop intelligence-based expert systems which both medical personnel and patients can use for differential diagnosis of COVID-19 based on the aforementioned symptoms.However,the test of performance must not be limited to the traditional performance metrics. 展开更多
关键词 COVID-19 CORONAVIRUS Machine Learning Intelligent classifier Early differential diagnosis Deep Learning
下载PDF
Test Suite Design Methodology Using Combinatorial Approach for Internet of Things Operating Systems
5
作者 Abhinandan H. Patil Neena Goveas Krishnan Rangarajan 《Journal of Software Engineering and Applications》 2015年第7期303-312,共10页
In this paper we describe how the test design can be done by using the Combinatorial Testing approach for internet of things operating systems. Contiki operating system is taken as a case study but we discuss what can... In this paper we describe how the test design can be done by using the Combinatorial Testing approach for internet of things operating systems. Contiki operating system is taken as a case study but we discuss what can be the approach for RIOT and Tiny OS operating systems. We discuss how the combinatorial coverage measurement can be gathered in addition to the traditional metrics code coverage. The test design generated by using Advanced Combinatorial Testing for Software is analyzed for Contiki operating system. We elaborate the code coverage gathering technique for Contiki simulator which happens to be in Java. We explain the usage of Combinatorial Coverage Measurement tool. Although we have explained the test design methodology for internet of things operating systems, the approach explained can be followed for other open source software. 展开更多
关键词 CT ACTS CCM CODE COVER Contiki Cooja
下载PDF
Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme
6
作者 Nisreen Innab 《Computers, Materials & Continua》 SCIE EI 2024年第8期2237-2258,共22页
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t... Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes. 展开更多
关键词 Internet of things internet of health things security authentication hyperelliptic curve cryptography
下载PDF
An Assessment on the Impact of Technological Addiction on Workplace Productivity: Case of the Public Sector in Zimbabwe
7
作者 Nelson Matanana Prosper Tafadzwa Denhere +3 位作者 David Chibhoyi Allen Mutumwa Sithole Morgen Noah Ariel Mutongoreni 《World Journal of Engineering and Technology》 2024年第3期635-650,共16页
With the increasing integration of technology in modern workplaces, concerns have emerged regarding the addictive nature of technology and its potential consequences on employee productivity. This research aims to inv... With the increasing integration of technology in modern workplaces, concerns have emerged regarding the addictive nature of technology and its potential consequences on employee productivity. This research aims to investigate the impact of technological addiction on workplace productivity within the public sector of Zimbabwe. The study employed a mixed-methods approach, combining surveys, interviews, and a case study analysis, to examine the prevalence and effects of technological addiction in affecting productivity in the public sector of Zimbabwe. The findings indicate that excessive use of social media, and other digital distractions is a growing concern in the public sector, leading to decreased focus, missed deadlines, and strained teamwork. Factors such as unrestricted internet access, lack of clear usage policies, and inadequate self-regulation contribute to the problem The research outcomes also highlight the need for awareness and interventions to address social media addiction in the workplace, promote healthier technology use, and uphold productivity and employee well-being. 展开更多
关键词 Technology Addiction Workplace Productivity TECHNOLOGY Public Sector Zimbabwe
下载PDF
A Robust Security Detection Strategy for Next Generation IoT Networks
8
作者 Hafida Assmi Azidine Guezzaz +4 位作者 Said Benkirane Mourade Azrour Said Jabbour Nisreen Innab Abdulatif Alabdulatif 《Computers, Materials & Continua》 SCIE EI 2025年第1期443-466,共24页
Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities f... Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities for the emergence of unprecedented knowledge.To ensure IoT securit,various approaches have been implemented,such as authentication,encoding,as well as devices to guarantee data integrity and availability.Among these approaches,Intrusion Detection Systems(IDS)is an actual security solution,whose performance can be enhanced by integrating various algorithms,including Machine Learning(ML)and Deep Learning(DL),enabling proactive and accurate detection of threats.This study proposes to optimize the performance of network IDS using an ensemble learning method based on a voting classification algorithm.By combining the strengths of three powerful algorithms,Random Forest(RF),K-Nearest Neighbors(KNN),and Support Vector Machine(SVM)to detect both normal behavior and different categories of attack.Our analysis focuses primarily on the NSL-KDD dataset,while also integrating the recent Edge-IIoT dataset,tailored to industrial IoT environments.Experimental results show significant enhancements on the Edge-IIoT and NSL-KDD datasets,reaching accuracy levels between 72%to 99%,with precision between 87%and 99%,while recall values and F1-scores are also between 72%and 99%,for both normal and attack detection.Despite the promising results of this study,it suffers from certain limitations,notably the use of specific datasets and the lack of evaluations in a variety of environments.Future work could include applying this model to various datasets and evaluating more advanced ensemble strategies,with the aim of further enhancing the effectiveness of IDS. 展开更多
关键词 IoT security intrusion detection RF KNN SVM EL NSL-KDD Edge-IIoT
下载PDF
A Transmission and Transformation Fault Detection Algorithm Based on Improved YOLOv5 被引量:1
9
作者 Xinliang Tang Xiaotong Ru +1 位作者 Jingfang Su Gabriel Adonis 《Computers, Materials & Continua》 SCIE EI 2023年第9期2997-3011,共15页
On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line faults.Detecting these faults is of great significa... On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line faults.Detecting these faults is of great significance for the safe operation of power systems.Therefore,a YOLOv5 target detection method based on a deep convolution neural network is proposed.In this paper,Mobilenetv2 is used to replace Cross Stage Partial(CSP)-Darknet53 as the backbone.The structure uses depth-wise separable convolution to reduce the amount of calculation and parameters;improve the detection rate.At the same time,to compensate for the detection accuracy,the Squeeze-and-Excitation Networks(SENet)attention model is fused into the algorithm framework and a new detection scale suitable for small targets is added to improve the significance of the fault target area in the image.Collect pictures of foreign matters such as kites,plastic bags,balloons,and insulator defects of transmission lines,and sort theminto a data set.The experimental results on datasets show that themean Accuracy Precision(mAP)and recall rate of the algorithm can reach 92.1%and 92.4%,respectively.At the same time,by comparison,the detection accuracy of the proposed algorithm is higher than that of other methods. 展开更多
关键词 Transmission line YOLOv5 multi-scale integration SENet
下载PDF
Design of QoS Aware Routing Protocol for IoT Assisted Clustered WSN 被引量:1
10
作者 Ashit Kumar Dutta S.Srinivasan +4 位作者 Bobbili Prasada Rao B.Hemalatha Irina V.Pustokhina Denis A.Pustokhin Gyanendra Prasad Joshi 《Computers, Materials & Continua》 SCIE EI 2022年第5期3785-3801,共17页
In current days,the domain of Internet of Things(IoT)and Wireless Sensor Networks(WSN)are combined for enhancing the sensor related data transmission in the forthcoming networking applications.Clustering and routing t... In current days,the domain of Internet of Things(IoT)and Wireless Sensor Networks(WSN)are combined for enhancing the sensor related data transmission in the forthcoming networking applications.Clustering and routing techniques are treated as the effective methods highly used to attain reduced energy consumption and lengthen the lifetime of the WSN assisted IoT networks.In this view,this paper presents an Ensemble of Metaheuristic Optimization based QoS aware Clustering with Multihop Routing(EMOQoSCMR)Protocol for IoT assisted WSN.The proposed EMO-QoSCMR protocol aims to achieve QoS parameters such as energy,throughput,delay,and lifetime.The proposed model involves two stage processes namely clustering and routing.Firstly,the EMO-QoSCMR protocol involves crossentropy rain optimization algorithm based clustering(CEROAC)technique to select an optimal set of cluster heads(CHs)and construct clusters.Besides,oppositional chaos game optimization based routing(OCGOR)technique is employed for the optimal set of routes in the IoT assisted WSN.The proposed model derives a fitness function based on the parameters involved in the IoT nodes such as residual energy,distance to sink node,etc.The proposed EMOQoSCMR technique has resulted to an enhanced NAN of 64 nodes whereas the LEACH,PSO-ECHS,E-OEERP,and iCSHS methods have resulted in a lesser NAN of 2,10,42,and 51 rounds.The performance of the presented protocol has been evaluated interms of energy efficiency and network lifetime. 展开更多
关键词 Internet of things wireless sensor networks CLUSTERING ROUTING metaheuristics cluster head selection QoS parameters
下载PDF
A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems
11
作者 Tejasvi Alladi Varun Kohli +1 位作者 Vinay Chamola F.Richard Yu 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1113-1122,共10页
With the rise of the Internet of Vehicles(IoV)and the number of connected vehicles increasing on the roads,Cooperative Intelligent Transportation Systems(C-ITSs)have become an important area of research.As the number ... With the rise of the Internet of Vehicles(IoV)and the number of connected vehicles increasing on the roads,Cooperative Intelligent Transportation Systems(C-ITSs)have become an important area of research.As the number of Vehicle to Vehicle(V2V)and Vehicle to Interface(V2I)communication links increases,the amount of data received and processed in the network also increases.In addition,networking interfaces need to be made more secure for which existing cryptography-based security schemes may not be sufficient.Thus,there is a need to augment them with intelligent network intrusion detection techniques.Some machine learning-based intrusion detection and anomaly detection techniques for vehicular networks have been proposed in recent times.However,given the expected large network size,there is a necessity for extensive data processing for use in such anomaly detection methods.Deep learning solutions are lucrative options as they remove the necessity for feature selection.Therefore,with the amount of vehicular network traffic increasing at an unprecedented rate in the C-ITS scenario,the need for deep learning-based techniques is all the more heightened.This work presents three deep learning-based misbehavior classification schemes for intrusion detection in IoV networks using Long Short Term Memory(LSTM)and Convolutional Neural Networks(CNNs).The proposed Deep Learning Classification Engines(DCLE)comprise of single or multi-step classification done by deep learning models that are deployed on the vehicular edge servers.Vehicular data received by the Road Side Units(RSUs)is pre-processed and forwarded to the edge server for classifications following the three classification schemes proposed in this paper.The proposed classifiers identify 18 different vehicular behavior types,the F1-scores ranging from 95.58%to 96.75%,much higher than the existing works.By running the classifiers on testbeds emulating edge servers,the prediction performance and prediction time comparison of the proposed scheme is compared with those of the existing studies. 展开更多
关键词 Vehicular Ad-hoc Networks(VANETs) Intelligent Transportation Systems(ITS) Artificial Intelligence(AI) Deep Learning Internet of Things(IoT)
下载PDF
Visibility Enhancement of Scene Images Degraded by Foggy Weather Condition: An Application to Video Surveillance
12
作者 Ghulfam Zahra Muhammad Imran +4 位作者 Abdulrahman M.Qahtani Abdulmajeed Alsufyani Omar Almutiry Awais Mahmood Fayez Eid Alazemi 《Computers, Materials & Continua》 SCIE EI 2021年第9期3465-3481,共17页
:In recent years,video surveillance application played a significant role in our daily lives.Images taken during foggy and haze weather conditions for video surveillance application lose their authenticity and hence r... :In recent years,video surveillance application played a significant role in our daily lives.Images taken during foggy and haze weather conditions for video surveillance application lose their authenticity and hence reduces the visibility.The reason behind visibility enhancement of foggy and haze images is to help numerous computer and machine vision applications such as satellite imagery,object detection,target killing,and surveillance.To remove fog and enhance visibility,a number of visibility enhancement algorithms and methods have been proposed in the past.However,these techniques suffer from several limitations that place strong obstacles to the real world outdoor computer vision applications.The existing techniques do not perform well when images contain heavy fog,large white region and strong atmospheric light.This research work proposed a new framework to defog and dehaze the image in order to enhance the visibility of foggy and haze images.The proposed framework is based on a Conditional generative adversarial network(CGAN)with two networks;generator and discriminator,each having distinct properties.The generator network generates fog-free images from foggy images and discriminator network distinguishes between the restored image and the original fog-free image.Experiments are conducted on FRIDA dataset and haze images.To assess the performance of the proposed method on fog dataset,we use PSNR and SSIM,and for Haze dataset use e,r−,andσas performance metrics.Experimental results shows that the proposed method achieved higher values of PSNR and SSIM which is 18.23,0.823 and lower values produced by the compared method which are 13.94,0.791 and so on.Experimental results demonstrated that the proposed framework Has removed fog and enhanced the visibility of foggy and hazy images. 展开更多
关键词 Video surveillance degraded images image restoration transmission map visibility enhancement
下载PDF
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality
13
作者 Ali Arshad Muhammad Nadeem +6 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第5期3065-3089,共25页
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptog... There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptography is the best way to transmit data in a secure and reliable format.Various researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data security.Each algorithm has some data security issues.If some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original data.In this paper,various data security techniques are developed,which can be used to protect the data from attackers completely.First,a customized American Standard Code for Information Interchange(ASCII)table is developed.The value of each Index is defined in a customized ASCII table.When an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the data.After that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original data.When the number of cipher values is double the original data,the attacker tries to decrypt each value.Instead of getting the original data,the attacker gets such data that has no relation to the original data.After that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain text.The boundaries of each Hill text work up to that text.The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms.Then,the Kasiski test is used to verify the validity of the proposed algorithm and found that,if the proposed algorithm is used for data encryption,so an attacker cannot break the proposed algorithm security using any technique or algorithm. 展开更多
关键词 CRYPTOGRAPHY symmetric cipher text ENCRYPTION matrix cipher encoding decoding hill matrix 64-bit encryption
下载PDF
Intelligent Smart Grid Stability Predictive Model for Cyber-Physical Energy Systems
14
作者 Ashit Kumar Dutta Manal Al Faraj +2 位作者 Yasser Albagory Mohammad zeid M Alzamil Abdul Rahaman Wahab Sait 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1219-1231,共13页
A cyber physical energy system(CPES)involves a combination of pro-cessing,network,and physical processes.The smart grid plays a vital role in the CPES model where information technology(IT)can be related to the physic... A cyber physical energy system(CPES)involves a combination of pro-cessing,network,and physical processes.The smart grid plays a vital role in the CPES model where information technology(IT)can be related to the physical system.At the same time,the machine learning(ML)modelsfind useful for the smart grids integrated into the CPES for effective decision making.Also,the smart grids using ML and deep learning(DL)models are anticipated to lessen the requirement of placing many power plants for electricity utilization.In this aspect,this study designs optimal multi-head attention based bidirectional long short term memory(OMHA-MBLSTM)technique for smart grid stability predic-tion in CPES.The proposed OMHA-MBLSTM technique involves three subpro-cesses such as pre-processing,prediction,and hyperparameter optimization.The OMHA-MBLSTM technique employs min-max normalization as a pre-proces-sing step.Besides,the MBLSTM model is applied for the prediction of stability level of the smart grids in CPES.At the same time,the moth swarm algorithm(MHA)is utilized for optimally modifying the hyperparameters involved in the MBLSTM model.To ensure the enhanced outcomes of the OMHA-MBLSTM technique,a series of simulations were carried out and the results are inspected under several aspects.The experimental results pointed out the better outcomes of the OMHA-MBLSTM technique over the recent models. 展开更多
关键词 Stability prediction smart grid cyber physical energy systems deep learning data analytics moth swarm algorithm
下载PDF
Human Emotions Classification Using EEG via Audiovisual Stimuli and AI
15
作者 Abdullah A Asiri Akhtar Badshah +7 位作者 Fazal Muhammad Hassan A Alshamrani Khalil Ullah Khalaf A Alshamrani Samar Alqhtani Muhammad Irfan Hanan Talal Halawani Khlood M Mehdar 《Computers, Materials & Continua》 SCIE EI 2022年第12期5075-5089,共15页
Electroencephalogram(EEG)is a medical imaging technology that can measure the electrical activity of the scalp produced by the brain,measured and recorded chronologically the surface of the scalp from the brain.The re... Electroencephalogram(EEG)is a medical imaging technology that can measure the electrical activity of the scalp produced by the brain,measured and recorded chronologically the surface of the scalp from the brain.The recorded signals from the brain are rich with useful information.The inference of this useful information is a challenging task.This paper aims to process the EEG signals for the recognition of human emotions specifically happiness,anger,fear,sadness,and surprise in response to audiovisual stimuli.The EEG signals are recorded by placing neurosky mindwave headset on the subject’s scalp,in response to audiovisual stimuli for the mentioned emotions.Using a bandpass filter with a bandwidth of 1-100 Hz,recorded raw EEG signals are preprocessed.The preprocessed signals then further analyzed and twelve selected features in different domains are extracted.The Random forest(RF)and multilayer perceptron(MLP)algorithms are then used for the classification of the emotions through extracted features.The proposed audiovisual stimuli based EEG emotion classification system shows an average classification accuracy of 80%and 88%usingMLP and RF classifiers respectively on hybrid features for experimental signals of different subjects.The proposed model outperforms in terms of cost and accuracy. 展开更多
关键词 ELECTROENCEPHALOGRAPHY EMOTION CLASSIFICATION signal processing multilayer perceptron random forest
下载PDF
Optimal Machine Learning Enabled Performance Monitoring for Learning Management Systems
16
作者 Ashit Kumar Dutta Mazen Mushabab Alqahtani +2 位作者 Yasser Albagory Abdul Rahaman Wahab Sait Majed Alsanea 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2277-2292,共16页
Learning Management System(LMS)is an application software that is used in automation,delivery,administration,tracking,and reporting of courses and programs in educational sector.The LMS which exploits machine learning... Learning Management System(LMS)is an application software that is used in automation,delivery,administration,tracking,and reporting of courses and programs in educational sector.The LMS which exploits machine learning(ML)has the ability of accessing user data and exploit it for improving the learning experience.The recently developed artificial intelligence(AI)and ML models helps to accomplish effective performance monitoring for LMS.Among the different processes involved in ML based LMS,feature selection and classification processesfind beneficial.In this motivation,this study introduces Glowworm-based Feature Selection with Machine Learning Enabled Performance Monitoring(GSO-MFWELM)technique for LMS.The key objective of the proposed GSO-MFWELM technique is to effectually monitor the performance in LMS.The pro-posed GSO-MFWELM technique involves GSO-based feature selection techni-que to select the optimal features.Besides,Weighted Extreme Learning Machine(WELM)model is applied for classification process whereas the parameters involved in WELM model are optimallyfine-tuned with the help of May-fly Optimization(MFO)algorithm.The design of GSO and MFO techniques result in reduced computation complexity and improved classification performance.The presented GSO-MFWELM technique was validated for its performance against benchmark dataset and the results were inspected under several aspects.The simulation results established the supremacy of GSO-MFWELM technique over recent approaches with the maximum classification accuracy of 0.9589. 展开更多
关键词 Learning management system data mining performance monitoring machine learning feature selection
下载PDF
Determining Requirements for an Optimal Ad-Hoc Multicast Protocol in Mobile Health Care Training Systems
17
作者 Anis Zarrad Ahmed Redha Mahlous 《Communications and Network》 2015年第2期81-88,共8页
Nowadays, Health Care Training-based System (HCTS) is a vital component in the education and training of health care in 3D Virtual Environment (VE). The practice of HCTS continues to grow at rapid pace throughout all ... Nowadays, Health Care Training-based System (HCTS) is a vital component in the education and training of health care in 3D Virtual Environment (VE). The practice of HCTS continues to grow at rapid pace throughout all of the healthcare disciplines, however research in this field is still in its early stage. Increasingly, decision makers and developers look forward to offer more sophisticated, much larger, and more complex HCTS to serve the desired outcome and improve the quality and safety of patient care. Due to the rapidly increasing usage of personal mobile devices and the need of executing HCTS applications in environments that have no previous network infrastructure available, Mobile Health Care Training-based System (MHCTS) is an expected future trend. In such systems, medical staff will share and collaborate in a 3D virtual environment through their mobile devices in an ad-hoc network (MANET) in order to accomplish specific missions’ typically surgical emergency room. Users are organized into various groups (Radiologists, Maternity departments, and General surgery etc...), and need to be managed by a multicast scheme to save network bandwidth and offer immersive sense. MHCTS is sensitive to networking issues, since interactive 3D graphics requires additional load due to the use of mobile devices. Therefore, we need to emphasize on the importance and the improvement of multicast techniques for the effectiveness of MHCTS and the management of collaborative group interaction. Research so far has devoted little attention to the network communication protocols design of such systems which is crucial to preserve the sense of immersion for participating users. In this paper, we investigate the effect of multicast routing protocol in advancing the field of Health care Training-based System to the benefit of patient’s safety, and health care professional. Also, we address the issue of selecting a multicast protocol to provide the best performance for a particular e-health system at any time. Previous work has demonstrated that multicast operates at least as efficiently as traditional MAODV. A comprehensive analysis about various ad-hoc multicast routing protocols is proposed. The selection key factors for the right protocol for MHCTS applications were safety and robustness. To the best of our knowledge, this work will be the first initiative involving systematic literature reviews to identify a research gate for the use of multicast protocol in health care simulation learning community. 展开更多
关键词 AD-HOC MULTICAST Protocol HEALTH CARE Training System 3D Virtual Environment E-HEALTH
下载PDF
Cat and Mouse Optimizer with Artificial Intelligence Enabled Biomedical Data Classification
18
作者 B.Kalpana S.Dhanasekaran +4 位作者 T.Abirami Ashit Kumar Dutta Marwa Obayya Jaber S.Alzahrani Manar Ahmed Hamza 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2243-2257,共15页
Biomedical data classification has become a hot research topic in recent years,thanks to the latest technological advancements made in healthcare.Biome-dical data is usually examined by physicians for decision making ... Biomedical data classification has become a hot research topic in recent years,thanks to the latest technological advancements made in healthcare.Biome-dical data is usually examined by physicians for decision making process in patient treatment.Since manual diagnosis is a tedious and time consuming task,numerous automated models,using Artificial Intelligence(AI)techniques,have been presented so far.With this motivation,the current research work presents a novel Biomedical Data Classification using Cat and Mouse Based Optimizer with AI(BDC-CMBOAI)technique.The aim of the proposed BDC-CMBOAI technique is to determine the occurrence of diseases using biomedical data.Besides,the proposed BDC-CMBOAI technique involves the design of Cat and Mouse Optimizer-based Feature Selection(CMBO-FS)technique to derive a useful subset of features.In addition,Ridge Regression(RR)model is also utilized as a classifier to identify the existence of disease.The novelty of the current work is its designing of CMBO-FS model for data classification.Moreover,CMBO-FS technique is used to get rid of unwanted features and boosts the classification accuracy.The results of the experimental analysis accomplished by BDC-CMBOAI technique on benchmark medical dataset established the supremacy of the proposed technique under different evaluation measures. 展开更多
关键词 Artificial intelligence biomedical data feature selection cat and mouse optimizer ridge regression
下载PDF
Cloud Security: Services, Risks, and a Case Study on Amazon Cloud Services
19
作者 Patrick Mosca Yanping Zhang +1 位作者 Zhifeng Xiao Yun Wang 《International Journal of Communications, Network and System Sciences》 2014年第12期529-535,共7页
Recent advances have witnessed the success and popularity of cloud computing, which represents a new business model and computing paradigm. The feature of on-demand provisioning of computational, storage, and bandwidt... Recent advances have witnessed the success and popularity of cloud computing, which represents a new business model and computing paradigm. The feature of on-demand provisioning of computational, storage, and bandwidth resources has driven modern businesses into cloud services. The cloud is considered cutting edge technology and it is solely relied on by many large technology, business, and media companies such as Netflix or Salesforce.com. However, in addition to the benefit at hand, security issues have been a long-term concern for cloud computing and are the main barriers of the widespread use of cloud computing. In this paper, we briefly describe some basic security concerns that are of particular interest to cloud technology. We investigate some of the basic cloud concepts and discuss cloud security issues. Amazon Web Services is used as a case study for discussing common cloud terminology. Data security, as well as some cloud specific attacks is introduced. The current state and the future progression of cloud computing is discussed. 展开更多
关键词 COULD COMPUTING Security AMAZON CLOUD STORAGE
下载PDF
Securing a Scalable E-Voting System Using the RSA Algorithm: The Case of a Group Voting Process in a Tertiary School
20
作者 Stephen Gbenga Fashoto Michael Adeyeye +1 位作者 Faith-Michael Emeka Uzoka Fatima Hamza Usthman 《Computer Technology and Application》 2016年第1期11-27,共17页
E-voting (electronic voting) is a significant part of an E-election (electronic election), which refers to the use of computers or computerized voting equipment to cast ballots in an election. Due to the rapid growth ... E-voting (electronic voting) is a significant part of an E-election (electronic election), which refers to the use of computers or computerized voting equipment to cast ballots in an election. Due to the rapid growth of computer technologies and advances in cryptographic techniques, E-voting is now an applicable alternative for many non-governmental elections. However, security demands are paramount to electoral process in political arena. It was revealed that researchers show little interest in robustness of E-voting system compared to other E-voting requirements [1]. This paper shows that RSA (Ron Rivest, Adi Shamir and Leonard Adleman) cryptography algorithm can be incorporated into E-voting process as a whole. The RSA cryptography algorithm ensures that votes casted are secured, thus maintaining the privacy of votes. The performance of the cryptography algorithm is tested on a university E-voting system over a public network. The E-voting process is initiated by a server system that other computer nodes are connected to. The system is such that when the votes are cast on the nodes, the RSA technique encrypts the vote that is sent to the server system using both node and vote identity number. The system performs consistently and reliably which in return gives good level of confidence of votes count. 展开更多
关键词 CRYPTOGRAPHY RSA algorithm E-VOTING paper ballot
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部