Data management becomes essential component of patient *** of Medical Things(IoMT)performs a wireless communication between E-medical applications and human *** of consulting a doctor in the hospital,patients get heal...
详细信息
Data management becomes essential component of patient *** of Medical Things(IoMT)performs a wireless communication between E-medical applications and human *** of consulting a doctor in the hospital,patients get health related information remotely from the *** main issues in the E-Medical application are lack of safety,security and priv-acy preservation of patient’s health care *** overcome these issues,this work proposes block chain based IoMT Processed with Hybrid consensus protocol for secured *** health data is collected from physician,smart devices *** main goal is to store this highly valuable health related data in a secure,safety,easy access and less cost-effective *** this research we combine two smart contracts such as Practical Byzantine Fault Tolerance with proof of work(PBFT-PoW).The implementation is done using cloud technology setup with smart contracts(PBFT-PoW).The accuracy rate of PBFT is 90.15%,for PoW is 92.75%and our proposed work PBFT-PoW is 99.88%.
Cardiac arrhythmias pose a significant challenge to health care, requiring accurate and reliable detection methods to enable early diagnosis and treatment. However, traditional ECG beat classification methods often la...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
In past decades, scientific research has explored various bat detection systems methods, a common trend to identify heterogeneous species of bats. In this article, we represented an ultrasonic bat detection and protec...
详细信息
The study targets uncertain coupling faults in robotic arm actuators and proposes a new fault-tolerant visual servo control strategy. Specifically, it considers both multiplicative and additive actuator faults within ...
详细信息
Myasthenia Gravis (MG) is a neuromuscular disease causing extreme muscular fatigue, triggering problems with vision, swallowing, speech, mobility, dexterity, and breathing. However, early detection and prediction of M...
详细信息
In computer vision,emotion recognition using facial expression images is considered an important research *** learning advances in recent years have aided in attaining improved results in this *** to recent studies,mu...
详细信息
In computer vision,emotion recognition using facial expression images is considered an important research *** learning advances in recent years have aided in attaining improved results in this *** to recent studies,multiple facial expressions may be included in facial photographs representing a particular type of *** is feasible and useful to convert face photos into collections of visual words and carry out global expression *** main contribution of this paper is to propose a facial expression recognitionmodel(FERM)depending on an optimized Support Vector Machine(SVM).To test the performance of the proposed model(FERM),AffectNet is *** uses 1250 emotion-related keywords in six different languages to search three major search engines and get over 1,000,000 facial photos *** FERM is composed of three main phases:(i)the Data preparation phase,(ii)Applying grid search for optimization,and(iii)the categorization *** discriminant analysis(LDA)is used to categorize the data into eight labels(neutral,happy,sad,surprised,fear,disgust,angry,and contempt).Due to using LDA,the performance of categorization via SVM has been obviously *** search is used to find the optimal values for hyperparameters of SVM(C and gamma).The proposed optimized SVM algorithm has achieved an accuracy of 99%and a 98%F1 score.
Compression-based Dissimilarity Measure (CDM) is reported to work well in classifying strings without clues. However, CDM depends on the compression program, and its theoretical background is unclear. In this paper, w...
详细信息
Classifying the visual features in images to retrieve a specific image is a significant problem within the computer vision field especially when dealing with historical faded colored ***,there were lots of efforts try...
详细信息
Classifying the visual features in images to retrieve a specific image is a significant problem within the computer vision field especially when dealing with historical faded colored ***,there were lots of efforts trying to automate the classification operation and retrieve similar images *** reach this goal,we developed a VGG19 deep convolutional neural network to extract the visual features from the images ***,the distances among the extracted features vectors are measured and a similarity score is generated using a Siamese deep neural *** Siamese model built and trained at first from scratch but,it didn’t generated high evaluation ***,we re-built it from VGG19 pre-trained deep learning model to generate higher evaluation ***,three different distance metrics combined with the Sigmoid activation function are experimented looking for the most accurate method formeasuring the similarities among the retrieved *** that the highest evaluation parameters generated using the Cosine distance ***,the Graphics Processing Unit(GPU)utilized to run the code instead of running it on the Central Processing Unit(CPU).This step optimized the execution further since it expedited both the training and the retrieval time *** extensive experimentation,we reached satisfactory solution recording 0.98 and 0.99 F-score for the classification and for the retrieval,respectively.
Crisis management is preparing for and managing possible crises that may impact organizations and individuals at different levels. It involves effective communication, quick decision-making, and strategic planning to ...
详细信息
暂无评论