In understanding brain functioning by Electroencephalography (EEG), it is essential to be able to not only identify more active brain areas but also understand connectivity among different areas. The functional and ef...
详细信息
In today’s fast-paced world,many elderly individuals struggle to adhere to their medication schedules,especially those with memory-related conditions like Alzheimer’s disease,leading to serious health risks,hospital...
详细信息
In today’s fast-paced world,many elderly individuals struggle to adhere to their medication schedules,especially those with memory-related conditions like Alzheimer’s disease,leading to serious health risks,hospital-izations,and increased healthcare *** reminder systems often fail due to a lack of personalization and real-time *** address this critical challenge,we introduce MediServe,an advanced IoT-enabled medication management system that seamlessly integrates deep learning techniques to provide a personalized,secure,and adaptive *** features a smart medication box equipped with biometric authentication,such as fingerprint recognition,ensuring authorized access to prescribed medication while preventing misuse.A user-friendly mobile application complements the system,offering real-time notifications,adherence tracking,and emergency alerts for caregivers and healthcare *** system employs predictive deep learning models,achieving an impressive classification accuracy of 98%,to analyze user behavior,detect anomalies in medication adherence,and optimize scheduling based on an individual’s habits and health ***,MediServe enhances accessibility by employing natural language processing(NLP)models for voice-activated interactions and text-to-speech capabilities,making it especially beneficial for visually impaired users and those with cognitive ***-based data analytics and wireless connectivity facilitate remote monitoring,ensuring that caregivers receive instant alerts in case of missed doses or medication ***,machine learning-based clustering and anomaly detection refine medication reminders by adapting to users’changing health *** combining IoT,deep learning,and advanced security protocols,MediServe delivers a comprehensive,intelligent,and inclusive solution for medication *** innovative approach not only improves the quality of life for elderly
Mehta and Panigrahi (FOCS 2012, IEEE, Piscataway, NJ, 2012, pp. 728-737) introduce the problem of online matching with stochastic rewards, where edges are associated with success probabilities and a match succeeds wit...
详细信息
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t...
详细信息
Due to the exponential increase in data volume, the widespread use of intelligent information systems has created significant obstacles and issues. High dimensionality and the existence of noisy and extraneous data ar...
详细信息
Due to the exponential increase in data volume, the widespread use of intelligent information systems has created significant obstacles and issues. High dimensionality and the existence of noisy and extraneous data are a few of the difficulties. These difficulties incur high computing costs and have a considerable effect on the accuracy and efficiency of machine learning (ML) methods. A key idea used to increase classification accuracy and lower computational costs is feature selection (FS). Finding the ideal collection of features that can accurately determine class labels by removing unnecessary data is the fundamental goal of FS. However, finding an effective FS strategy is a difficult task that has given rise to a number of algorithms built using biological systems based soft computing approaches. In order to solve the difficulties faced during the FS process;this work provides a novel hybrid optimization approach that combines statistical and soft-computing intelligence. On the first dataset of diabetes disease, the suggested approach was initially tested. The approach was later tested on the Wisconsin Diagnostic Breast Cancer (WDBC) dataset after yielding encouraging results on diabetes dataset. While finding the solution, typically, data cleaning happens at the pre-processing stage. Later on, in a series of trials, different FS methods were used separately and in hybridized fashion, such as fine-tuned statistical methods like lasso (L1 regularization) and chi-square, as well as binary Harmony search algorithm (HSA) which is based on soft computing algorithmic approach. The most efficient strategy was chosen based on the performance metric data. These FS methods pick informative features, which are then used as input for a variety of traditional ML classifiers. The chosen technique is shown along with the determined influential features and associated metric values. The success of the classifiers is then evaluated using performance metrics like accuracy, preci
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential *** overcome these difficulties,different steganography and data encryption m...
详细信息
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential *** overcome these difficulties,different steganography and data encryption methods have been proposed by researchers to secure *** of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB *** this work,we have an approach that utilizes a combinationofMost SignificantBit(MSB)matching andLeast Significant Bit(LSB)*** proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of individual pixels using pair matching,enabling the storage of 6 bits in one pixel by modifying a maximum of three *** proposed technique is evaluated using embedding capacity and Peak Signal-to-Noise Ratio(PSNR)score,we compared our work with the Zakariya scheme the results showed a significant increase in data concealment *** achieved results of ourwork showthat our algorithmdemonstrates an improvement in hiding capacity from11%to 22%for different data samples while maintaining a minimumPeak Signal-to-Noise Ratio(PSNR)of 37 *** findings highlight the effectiveness and trustworthiness of the proposed algorithm in securing the communication process and maintaining visual integrity.
In the evolving landscape of smart cities, employment strategies have been steering towards a more personalized approach, aiming to enhance job satisfaction and boost economic efficiency. This paper explores an advanc...
详细信息
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Rec...
详细信息
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Recognition(HAR)***,the significant computational demands and memory requirements hinder the practical deployment of deep networks in resource-constrained *** paper introduces a novel network pruning method based on the energy spectral density of data in the frequency domain,which reduces the model’s depth and accelerates activity *** traditional pruning methods that focus on the spatial domain and the importance of filters,this method converts sensor data,such as HAR data,to the frequency domain for *** emphasizes the low-frequency components by calculating their energy spectral density ***,filters that meet the predefined thresholds are retained,and redundant filters are removed,leading to a significant reduction in model size without compromising performance or incurring additional computational ***,the proposed algorithm’s effectiveness is empirically validated on a standard five-layer CNNs backbone *** computational feasibility and data sensitivity of the proposed scheme are thoroughly ***,the classification accuracy on three benchmark HAR datasets UCI-HAR,WISDM,and PAMAP2 reaches 96.20%,98.40%,and 92.38%,***,our strategy achieves a reduction in Floating Point Operations(FLOPs)by 90.73%,93.70%,and 90.74%,respectively,along with a corresponding decrease in memory consumption by 90.53%,93.43%,and 90.05%.
Diabetic retinopathy (DR), a type of eye disease, is a danger for diabetics. Manual labour, which is prone to inaccuracy and time consuming, makes dealing with this illness considerably more difficult. Normally comput...
详细信息
Diabetic retinopathy (DR), a type of eye disease, is a danger for diabetics. Manual labour, which is prone to inaccuracy and time consuming, makes dealing with this illness considerably more difficult. Normally computer-assisted diagnosis has appeared as a promising tool for the early identification and severity grading of DR. As technologies are revolutionizing day by day, in which the most advance technology deep learning's algorithm gives a tremendous support for healthcare fields. This article proposes an efficient classification of DR models for categories the DR into different grades and to identify the severity. There various prediction techniques employed in DR detection. Radial Basics Network, Multilayer Perceptron and Recurrent Neural Network are binary classifiers employed for DR classification. Further the Bag of Visual Words and Convolutional Neural Networks implements for the stages of 3. The performance shows that Convolutional Neural Network perform superior over other methods and attains 98.3%. It is of great significance to apply deep-learning techniques for DR recognition. However, deep-learning algorithms often depend on large amounts of labeled data, which is expensive and time-consuming to obtain in the medical imaging area. In addition, the DR features are inconspicuous and spread out over high-resolution fundus images. Therefore, it is a big challenge to learn the distribution of such DR features. To overcome this, This research work proposes a multichannel-based generative adversarial network (M-GAN) for data augmentation as well as classification to grade DR The usefulness and effectiveness of GAN for classification of fundus images are explored for the first *** medical data is also a tedious and challenging one because it is quite expensive and confidential, to overcome this proposed model is acts data augmentation model, moreover the features in the input data’s are reduced by Dimensionality reduction Module (DRM) based on Pri
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this...
详细信息
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this research provides a Three-Layered Security Access model(TLSA)aligned to an intrusion detection mechanism,access control mechanism,and data encryption *** TLSA underlines the need for the protection of sensitive *** proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard(AES).For data transfer and storage,this encryption guarantees the data’s authenticity and ***,the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized ***-based access control(RBAC)implements the second strategic level,which ensures specific personnel access certain data and *** RBAC,each user is allowed a specific role and *** implies that permitted users can access some data stored in the *** layer assists in filtering granular access to data,reducing the risk that undesired data will be discovered during the *** 3 deals with intrusion detection systems(IDS),which detect and quickly deal with malicious actions and intrusion *** proposed TLSA security model of e-commerce includes conventional levels of security,such as encryption and access control,and encloses an insight intrusion detection *** method offers integrated solutions for most typical security issues of cloud computing,including data secrecy,method of access,and *** extensive performance test was carried out to confirm the efficiency of the proposed three-tier security *** have been made with state-of-art techniques,including DES,RSA,and DUAL-RSA,keeping into account Accuracy,QILV,F-Measure,Sensitivity,MSE,PSNR,SSIM,and computation time,encryption time,and decryption *** proposed
暂无评论