Diabetes Mellitus is one of the most severe diseases,and many studies have been conducted to anticipate *** research aimed to develop an intelligent mobile application based on machine learning to determine the diabet...
详细信息
Diabetes Mellitus is one of the most severe diseases,and many studies have been conducted to anticipate *** research aimed to develop an intelligent mobile application based on machine learning to determine the diabetic,pre-diabetic,or non-diabetic without the assistance of any physician or medical *** study’s methodology was classified into two the Diabetes Prediction Approach and the Proposed System Architecture *** Diabetes Prediction Approach uses a novel approach,Light Gradient Boosting Machine(LightGBM),to ensure a faster *** Proposed System ArchitectureDesign has been combined into sevenmodules;the Answering Question Module is a natural language processing Chabot that can answer all kinds of questions related to *** Doctor Consultation Module ensures free treatment related to *** this research,90%accuracy was obtained by performing K-fold cross-validation on top of the K nearest neighbor’s algorithm(KNN)&*** evaluate the model’s performance,Receiver Operating Characteristics(ROC)Curve and Area under the ROC Curve(AUC)were applied with a value of 0.948 and 0.936,*** manuscript presents some exploratory data analysis,including a correlation matrix and survey ***,the proposed solution can be adjustable in the daily activities of a diabetic patient.
Face anti-spoofing(FAS) is an important task to secure face recognition systems from presentation attacks (PAs). Most of the FAS methods use scalar(0, 1) or handcrafted pixel-wise labels(binary mask) as the ground tru...
详细信息
Aiming at the detection of blur SEM nanoparticle images, a blur instance segmentation network (BL-Mask R-CNN) based on generative adversarial network deblurring convolution block (Deblur) and Mask R-CNN instance segme...
详细信息
By 2030, there will be 500 billion devices with sensors and an Internet connection. The Internet of Things is the name of the network that links these gadgets together for data transport (IoT). In order to rapidly exc...
详细信息
ISBN:
(数字)9798350354133
ISBN:
(纸本)9798350354140
By 2030, there will be 500 billion devices with sensors and an Internet connection. The Internet of Things is the name of the network that links these gadgets together for data transport (IoT). In order to rapidly exchange medical information to connect people, resources, and organizations we have proposed paper using an IoT for Patient Health Monitoring (PHMS). For almost medical equipment having an internet connection and the capacity to track at least one patient's health parameter, including blood pressure, body temperature, heart rate, ECG, steps taken, etc. We made a prototype that carries out different procedures for example, if the patient's temperature rises above 38 degrees Celsius, it will send messages to the doctor that there is a patient who needs special care. The Arduino IDE 2.x processes the data produced by the sensors. The feedback was extremely favorable and supportive of the efficacy of monitoring patient health by the use of Arduino IDE 2.x.
Evolutionary technologies have been raised under the umbrella of the Internet, such as Cloud computing, The Internet of Things (IoT), and The Internet of Everything (IoE). All these technologies are extensively data e...
详细信息
This paper introduces a multivariate time series forecasting model that combines a sliding window technique with machine learning, incorporating a convolutional neural network to extract spatio-temporal features. This...
详细信息
Wearable gadgets are becoming a major constituent of our society due to a wide range of applications like financial transactions, unlocking automobiles, tracking health and fitness, and many more. Personal data is usu...
详细信息
Occlusion and pose variation are the biggest interference factors in real-world face expression recognition (FER). Faces are likely to be occluded by items such as sunglasses, ducktails, and scarves, which can signifi...
详细信息
Recent years have witnessed the expeditious evolution of intelligentsmart devices and autonomous software technologies with the expandeddomains of computing from workplaces to smart computing in everydayroutine life a...
详细信息
Recent years have witnessed the expeditious evolution of intelligentsmart devices and autonomous software technologies with the expandeddomains of computing from workplaces to smart computing in everydayroutine life activities. This trend has been rapidly advancing towards the newgeneration of systems where smart devices play vital roles in acting intelligently on behalf of the users. Context-awareness has emerged from the pervasive computing paradigm. Context-aware systems have the ability to acquirecontextual information from the surrounding environment autonomously,perform reasoning on it, and then adapt their behaviors accordingly. With theproliferation of context-aware systems and smart sensors, real-time monitoring of environmental situations (context) has become quite trivial. However,it is often challenging because the imperfect nature of context can cause theinconsistent behavior of the system. In this paper, we propose a contextaware intelligent decision support formalism to assist cognitively impairedpeople in managing their routine life activities. For this, we present a semanticknowledge-based framework to contextualize the information from the environment using the protégé ontology editor and Semantic Web Rule Language(SWRL) rules. The set of contextualized information and the set of rulesacquired from the ontology can be used to model Context-aware Multi-AgentSystems (CMAS) in order to autonomously plan all activities of the users andnotify users to act accordingly. To illustrate the use of the proposed formalism,we model a case study of Mild Cognitive Impaired (MCI) patients usingColored Petri Nets (CPN) to show the reasoning process on how the contextaware agents collaboratively plan activities on the user’s behalf and validatethe correctness properties of the system.
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny *** it comes to deploying IoT,everyone agrees that security is the biggest *** is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square *** research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted *** lightweight cryptography,the information sent between these gadgets may be *** order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance *** also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.
暂无评论