Sleep quality prediction in Internet of Things (IoT) involves leveraging a system of interrelated devices to gather as well as analyse related data. Smart devices like wearable devices or smart mattresses endlessly mo...
详细信息
Cardiovascular disease continues to be a predominant cause of mortality globally, requiring precise and effective strategies for early identification. This work examines the application of clinical datasets to explore...
详细信息
This research provides through method for building a recommendation system for health concerns for women the significant number of individuals' day-to-day activities are affected by menstruation symptoms including...
详细信息
Several instances of pneumonia with no clear etiology were recorded in Wuhan,China,on December 31,*** world health organization(WHO)called it COVID-19 that stands for“Coronavirus Disease 2019,”which is the second ve...
详细信息
Several instances of pneumonia with no clear etiology were recorded in Wuhan,China,on December 31,*** world health organization(WHO)called it COVID-19 that stands for“Coronavirus Disease 2019,”which is the second version of the previously known severe acute respiratory syndrome(SARS)Coronavirus and identified in short as(SARSCoV-2).There have been regular restrictions to avoid the infection spread in all countries,including Saudi *** prediction of new cases of infections is crucial for authorities to get ready for early handling of the virus ***:Analysis and forecasting of epidemic patterns in new SARSCoV-2 positive patients are presented in this research using metaheuristic optimization and long short-term memory(LSTM).The optimization method employed for optimizing the parameters of LSTM is Al-Biruni Earth Radius(BER)***:To evaluate the effectiveness of the proposed methodology,a dataset is collected based on the recorded cases in Saudi Arabia between March 7^(th),2020 and July 13^(th),*** addition,six regression models were included in the conducted experiments to show the effectiveness and superiority of the proposed *** achieved results show that the proposed approach could reduce the mean square error(MSE),mean absolute error(MAE),and R^(2)by 5.92%,3.66%,and 39.44%,respectively,when compared with the six base *** the other hand,a statistical analysis is performed to measure the significance of the proposed ***:The achieved results confirm the effectiveness,superiority,and significance of the proposed approach in predicting the infection cases of COVID-19.
Counterfactual explanations can be used as a means to explain a models decision process and to provide recommendations to users on how to improve their current status. The difficulty to apply these counterfactual reco...
详细信息
Today,security is a major challenge linked with computer network companies that cannot defend against *** vulnerable factors increase security risks and cyber-attacks,including viruses,the internet,communications,and ...
详细信息
Today,security is a major challenge linked with computer network companies that cannot defend against *** vulnerable factors increase security risks and cyber-attacks,including viruses,the internet,communications,and *** of Things(IoT)devices are more effective,and the number of devices connected to the internet is constantly increasing,and governments and businesses are also using these technologies to perform business activities ***,the increasing uses of technologies also increase risks,such as password attacks,social engineering,and phishing *** play a major role in the field of *** is observed that more than 39%of security risks are related to the human factor,and 95%of successful cyber-attacks are caused by human error,with most of them being insider *** major human factor issue in cybersecurity is a lack of user awareness of cyber *** study focuses on the human factor by surveying the vulnerabilities and reducing the risk by focusing on human nature and reacting to different *** study highlighted that most of the participants are not experienced with cybersecurity threats and how to protect their personal ***,the lack of awareness of the top three vulnerabilities related to the human factor in cybersecurity,such as phishing attacks,passwords,attacks,and social engineering,are major problems that need to be addressed and reduced through proper awareness and training.
Motivated by the growing theoretical understanding of neural networks that employ the Rectified Linear Unit (ReLU) as their activation function, we revisit the use of ReLU activation functions for learning implicit ne...
详细信息
Motivated by the growing theoretical understanding of neural networks that employ the Rectified Linear Unit (ReLU) as their activation function, we revisit the use of ReLU activation functions for learning implicit neural representations (INRs). Inspired by second order B-spline wavelets, we incorporate a set of simple constraints to the ReLU neurons in each layer of a deep neural network (DNN) to remedy the spectral bias. This in turn enables its use for various INR tasks. Empirically, we demonstrate that, contrary to popular belief, one can learn state-of-the-art INRs based on a DNN composed of only ReLU neurons. Next, by leveraging recent theoretical works which characterize the kinds of functions ReLU neural networks learn, we provide a way to quantify the regularity of the learned function. This offers a principled approach to selecting the hyperparameters in INR architectures. We substantiate our claims through experiments in signal representation, super resolution, and computed tomography, demonstrating the versatility and effectiveness of our method. The code for all experiments can be found at https://***/joeshenouda/relu-inrs. Copyright 2024 by the author(s)
Motor skills (related to the motor nerve) and neurocognitive disorders affect humans’ typing ability to an extent that is noticeable while using a keyboard, smartphone, or other electronic gadgets. These two medical ...
详细信息
Motor skills (related to the motor nerve) and neurocognitive disorders affect humans’ typing ability to an extent that is noticeable while using a keyboard, smartphone, or other electronic gadgets. These two medical conditions are Parkinson’s disease (PD), caused by malfunctions of the motor nerve, and neurocognitive disorder, caused by a deficiency of organismic responses to stimuli. A mild symptom of PD, change in fine motor skills during typing, is reflected heavily in keystroke patterns during the early stages. Similarly, Emotional stress (ES) expresses a neurocognitive disorder that affects cognitive abilities as well. Early symptoms of this disorder are reflected in the keystroke patterns according to their severity. As there is no such pathological examination, it is challenging to perceive and measure the development of such disorders already developed in human behaviour as a disease. Furthermore, early screening of these diseases is essential for future diagnosis and preventing fatal consequences, since both are progressive illnesses. A modest attempt is made here to detect two such neurodegenerative disorders in humans using the way they type, formally known as Keystroke dynamics (KD). In this study, a bootstrapped-based homogeneous ensemble classification method has been proposed to address the uncertain performance and uneven distribution of classes for the detection of such medical conditions using users’ typing tendencies. For this purpose, two recent benchmark datasets were used for the validation and confirmation of operational improvements of the proposed method, which have been validated qualitatively and quantitatively. As a result, sensitivity/specificity of 0.82/0.78 in detecting PD and 0.98/0.98 in ES have been achieved, which is robust and accurate in a more realistic evaluation. The proposed framework explores the possibilities of implementing it in web-based systems, which has significant benefits. A better diagnosis, early detection at home
Information-flow tracking is useful for preventing malicious code execution and sensitive information leakage. Unfortunately, the performance penalty of the currently available solutions is too high for real-world app...
详细信息
Web applications have become a widely accepted method to support the internet for the past *** they have been successfully installed in the business activities and there is a requirement of advanced functionalities,th...
详细信息
Web applications have become a widely accepted method to support the internet for the past *** they have been successfully installed in the business activities and there is a requirement of advanced functionalities,the configuration is growing and becoming more *** growing demand and complexity also make these web applications a preferred target for intruders on the *** with the support of security specialists,they remain highly problematic for the complexity of penetration and code reviewing *** requires considering different testing patterns in both codes reviewing and penetration *** a result,the number of hacked websites is increasing day by *** of these vulnerabilities also occur due to incorrect input validation and lack of result validation for lousy programming practices or coding *** scanners for web applications can detect a few vulnerabilities in a dynamic *** are quite easy to use;however,these often miss out on some of the unique critical vulnerabilities in a different and static *** these are time-consuming,they can find complex vulnerabilities and improve developer knowledge in coding and best *** scanners choose both dynamic and static approaches,and the developers can select them based on their requirements and *** research explores and provides details of SQL injection,operating system command injection,path traversal,and cross-site scripting vulnerabilities through dynamic and static *** also examines various security measures in web applications and selected five tools based on their features for scanning PHP,and JAVA code focuses on SQL injection,cross-site scripting,Path Traversal,operating system ***,this research discusses the approach of a cyber-security tester or a security developer finding out vulnerabilities through dynamic and static approaches using manual and automated web vulnerability scanners.
暂无评论