Voice is the king of communication in wireless cellular network (WCN). Again, WCNs provide two types of calls, i.e., new call (NC) and handoff call (HC). Generally, HCs have higher priority than NCs because call dropp...
详细信息
Electronic Medical Records (EMR) is often used to refer to as electronic personal health (EPH) records or electronic healthcare records (EHR). These are considered vivacious assets of health facilities and patients. T...
详细信息
Electronic Medical Records (EMR) is often used to refer to as electronic personal health (EPH) records or electronic healthcare records (EHR). These are considered vivacious assets of health facilities and patients. The relevance of the EMRs has motivated diverse innovations in the collecting, organizing, managing and administering for purpose of treatment primarily and other reasons. There are various concerns raised about legitimate usages, reproducibility, accuracy, and privacy breaches of EMRs across majority of health and medical facilities globally. This phenomenon became popular due to its support of electronic devices, wireless links, transmission and storage of data in the cloud, and communication across a gateway (or central-point). Therefore, physicians and medical facilities were empowered to undertake virtual consultations to patients through telemedicine applications for the remote treatment and diagnosis. Internet of Things (IoT) systems, medical wearable objects, and sensors were the basic components that collect and transmit patient data on real-time basis to a base station or centralized servers managed by hospitals. However, there is the need to improve creation and adoption of EMRs not without understanding their roles and shortfalls as well possible means of improvement. Consequently, this study conducts a systematic literature review on electronic medical records management and administration under current trends, issues, solutions and future directions. To this end, eighty-one (81) peer-reviewed articles including conferences and journals papers were included in the final stage of the study after applying Preferred Reporting Items for Systematic Review and Meta-analysis Protocols (PRIMA-P) methodology of records selection. The contributions of this study include: the recognition of the informed consent strategy as the best solution to illegitimate access to patient electronic records;the use of permissioned access strategies provided by blockc
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a uni...
详细信息
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a unidirectional manner,where a bidirectional method can maximize performance results and capture semantic and contextual information in *** addition,there are many separate models for identifying offensive texts based on monolin-gual and multilingual,but there are a few models that can detect both monolingual and multilingual-based offensive *** this study,a detection system has been developed for both monolingual and multilingual offensive texts by combining deep convolutional neural network and bidirectional encoder representations from transformers(Deep-BERT)to identify offensive posts on social media that are used to harass *** paper explores a variety of ways to deal with multilin-gualism,including collaborative multilingual and translation-based ***,the Deep-BERT is tested on the Bengali and English datasets,including the different bidirectional encoder representations from transformers(BERT)pre-trained word-embedding techniques,and found that the proposed Deep-BERT’s efficacy outperformed all existing offensive text classification algorithms reaching an accuracy of 91.83%.The proposed model is a state-of-the-art model that can classify both monolingual-based and multilingual-based offensive texts.
This research investigates the application of multisource data fusion using a Multi-Layer Perceptron (MLP) for Human Activity Recognition (HAR). The study integrates four distinct open-source datasets—WISDM, DaLiAc, ...
详细信息
This research investigates the application of multisource data fusion using a Multi-Layer Perceptron (MLP) for Human Activity Recognition (HAR). The study integrates four distinct open-source datasets—WISDM, DaLiAc, MotionSense, and PAMAP2—to develop a generalized MLP model for classifying six human activities. Performance analysis of the fused model for each dataset reveals accuracy rates of 95.83 for WISDM, 97 for DaLiAc, 94.65 for MotionSense, and 98.54 for PAMAP2. A comparative evaluation was conducted between the fused MLP model and the individual dataset models, with the latter tested on separate validation sets. The results indicate that the MLP model, trained on the fused dataset, exhibits superior performance relative to the models trained on individual datasets. This finding suggests that multisource data fusion significantly enhances the generalization and accuracy of HAR systems. The improved performance underscores the potential of integrating diverse data sources to create more robust and comprehensive models for activity recognition.
The Internet of Things (IoT) is a form of Internet-based distributed computing that allows devices and their services to interact and execute tasks for each other. Consequently, the footprint of the IoT is increasing ...
详细信息
Graph convolutional networks (GCNs) have emerged as a powerful tool for action recognition, leveraging skeletal graphs to encapsulate human motion. Despite their efficacy, a significant challenge remains the dependenc...
详细信息
Recommender systems are playing a significant role in modern society to alleviate the information/choice overload problem, since Internet users may feel hard to identify the most favorite items or products from millio...
详细信息
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti...
详细信息
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protection of mobile users’privacy *** present,mobile user authenticationmethods based on humancomputer interaction have been extensively studied due to their advantages of high precision and non-perception,but there are still shortcomings such as low data collection efficiency,untrustworthy participating nodes,and lack of *** this end,this paper proposes a privacy-enhanced mobile user authentication method with motion sensors,which mainly includes:(1)Construct a smart contract-based private chain and federated learning to improve the data collection efficiency of mobile user authentication,reduce the probability of the model being bypassed by attackers,and reduce the overhead of data centralized processing and the risk of privacy leakage;(2)Use certificateless encryption to realize the authentication of the device to ensure the credibility of the client nodes participating in the calculation;(3)Combine Variational Mode Decomposition(VMD)and Long Short-TermMemory(LSTM)to analyze and model the motion sensor data of mobile devices to improve the accuracy of model *** experimental results on the real environment dataset of 1513 people show that themethod proposed in this paper can effectively resist poisoning attacks while ensuring the accuracy and efficiency of mobile user authentication.
Brain tumors are one of the deadliest diseases and require quick and accurate methods of detection. Finding the optimum image for research goals is the first step in optimizing MRI images for pre- and post-processing....
详细信息
Addressing the issues of scarce corpora, semantic sparsity, and polysemy in the field of tender announcements, this paper proposes a bid announcement domain named entity recognition model based on a two-stage enhancem...
详细信息
暂无评论