期刊文献+
共找到206篇文章
< 1 2 11 >
每页显示 20 50 100
Erythrodermic Psoriasis: Excellent Response to Skin Treatment with Ozonated Water, through the Use of a Patented Robotic Therapy System for the Surveillance and Prevention of Hospital Infections
1
作者 Linda Pasta Massimiliano Guastella Maria Stefania Leto Barone 《Open Journal of Nursing》 2025年第1期1-8,共8页
Background: Erythrodermic psoriasis (EP) is a rare, severe variant of psoriasis characterized by widespread erythema, scaling, and systemic complications. Despite advances in systemic treatments, the management of EP ... Background: Erythrodermic psoriasis (EP) is a rare, severe variant of psoriasis characterized by widespread erythema, scaling, and systemic complications. Despite advances in systemic treatments, the management of EP remains challenging, particularly in patients with comorbidities or contraindications to standard therapies. Objectives: To evaluate the effectiveness of ozonated water as an adjunctive treatment for EP, delivered using a patented robotic therapy system designed for hygiene and infection prevention in non-self-sufficient patients. Methods: We report the case of a 90-year-old male patient with acute EP who received daily skin treatments with ozonated water in conjunction with supportive care, including rehydration and antibiotics. The intervention was facilitated by the robotic system “COPERNICO Surveillance & Prevention,” which ensured standardized hygiene practices and clinical documentation. Results: Within one week of treatment, the patient showed complete desquamation of necrotic skin, resolution of erythema, and significant metabolic recovery. Fever subsided, renal function improved, and the patient was discharged in stable condition. Follow-up confirmed sustained clinical improvement, and no adverse events were reported. Conclusions: Ozonated water demonstrated efficacy in alleviating the dermatological and systemic manifestations of EP in a high-risk elderly patient. This case highlights the potential of ozone therapy as a safe, cost-effective adjunctive treatment for EP and underscores the utility of robotic systems in managing complex dermatological conditions. Further research is warranted to validate these findings in larger cohorts. 展开更多
关键词 Erythrodermic Psoriasis Ozone Therapy Infection Prevention Patient Hygiene Dermatological Care Robotic-Assisted Hygiene
在线阅读 下载PDF
An IoT-Aware System for Managing Patients’ Waiting Time Using Bluetooth Low-Energy Technology
2
作者 Reham Alabduljabbar 《Computer Systems Science & Engineering》 SCIE EI 2022年第1期1-16,共16页
It is a common observation that whenever patients arrives at the front desk of a hospital,outpatient clinic,or other health-associated centers,they have to first queue up in a line and wait to fill in their registrati... It is a common observation that whenever patients arrives at the front desk of a hospital,outpatient clinic,or other health-associated centers,they have to first queue up in a line and wait to fill in their registration form to get admitted.The long waiting time without any status updates is the most common complaint,concerning health officials.In this paper,UrNext,a location-aware mobile-based solution using Bluetooth low-energy(BLE)technology is presented to solve the problem.Recently,a technology-oriented method,the Internet of Things(IoT),has been gaining popularity in helping to solve some of the healthcare sector’s problems.The implementation of this solution could be illustrated through a simple example of when a patient arrives at a clinic for a consultation.Instead of having to wait in long lines,that patient will be greeted automatically,receive a push notification of an admittance along with an estimated waiting time for a consultation session.This will not only provide the patients with a sense of freedom but would also reduce the uncertainty levels that are generally observed,thus saving both time and money.This work aims to improve the clinics’quality of services,organize queues and minimize waiting times,leading to patients’comfort while reducing the burden on nurses and receptionists.The results demonstrate that the presented system is successful in its performance and helps achieves a plea-sant and conducive clinic visitation process with higher productivity. 展开更多
关键词 Internetofthings(IoT) LOCATION-AWARE Bluetoothlowenergy BEACON
在线阅读 下载PDF
Challenges and Limitations in Speech Recognition Technology:A Critical Review of Speech Signal Processing Algorithms,Tools and Systems
3
作者 Sneha Basak Himanshi Agrawal +4 位作者 Shreya Jena Shilpa Gite Mrinal Bachute Biswajeet Pradhan Mazen Assiri 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第5期1053-1089,共37页
Speech recognition systems have become a unique human-computer interaction(HCI)family.Speech is one of the most naturally developed human abilities;speech signal processing opens up a transparent and hand-free computa... Speech recognition systems have become a unique human-computer interaction(HCI)family.Speech is one of the most naturally developed human abilities;speech signal processing opens up a transparent and hand-free computation experience.This paper aims to present a retrospective yet modern approach to the world of speech recognition systems.The development journey of ASR(Automatic Speech Recognition)has seen quite a few milestones and breakthrough technologies that have been highlighted in this paper.A step-by-step rundown of the fundamental stages in developing speech recognition systems has been presented,along with a brief discussion of various modern-day developments and applications in this domain.This review paper aims to summarize and provide a beginning point for those starting in the vast field of speech signal processing.Since speech recognition has a vast potential in various industries like telecommunication,emotion recognition,healthcare,etc.,this review would be helpful to researchers who aim at exploring more applications that society can quickly adopt in future years of evolution. 展开更多
关键词 Speech recognition automatic speech recognition(ASR) mel-frequency cepstral coefficients(MFCC) hidden Markov model(HMM) artificial neural network(ANN)
在线阅读 下载PDF
Analysis of a Two Category Confidentiality Modeling Information Security
4
作者 Marn-Ling Shing Chen-Chi Shing Lee-Pin Shing 《通讯和计算机(中英文版)》 2012年第5期538-546,共9页
关键词 保密性 建模分析 信息安全 网络供应商 马尔可夫链 最佳组合 相关信息 系统入侵
在线阅读 下载PDF
Fuzzy VIKOR Approach to Evaluate the Information Security Policies and Analyze the Content of Press Agencies in Gulf Countries
5
作者 Amir Mohamed Talib 《Journal of Information Security》 2020年第4期189-200,共12页
A news agency is an organization that gathers news reports and sells them to subscribing news organization, such as newspapers, magazines, radio and television broadcasters. A news agency may also be referred to as a ... A news agency is an organization that gathers news reports and sells them to subscribing news organization, such as newspapers, magazines, radio and television broadcasters. A news agency may also be referred to as a wire service, newswire, or news service. The main purpose of this paper is to evaluate the security policies and analyze the content of five press agencies in gulf countries which are (Kuwait News Agency (KUNA), Emirates News Agency (WAM), Saudi Press Agency (SPA), Bahrain News Agency (BNA), and Oman News Agency (OMA)) by using a fuzzy VIKOR approach where linguistic variables are applied to solve the uncertainties and subjectivities in expert decision making. Fuzzy VIKOR approach is one of the best Multi-Criteria Decision Making (MCDM) techniques working in fuzzy environment. This study benefits security and content analysis experts know which press agency has the mandate and the competence to educate the public on news agencies. Besides, this paper contributes to Gulf agencies in helping them in their resolve to ensure the quality of content information and information security policies over the internet. 展开更多
关键词 Content Analysis Fuzzy VIKOR Approach Gulf Countries Information Security Policy Press Agencies Multi-Criteria Decision Making (MCDM) Online Information Quality
在线阅读 下载PDF
THAPE: A Tunable Hybrid Associative Predictive Engine Approach for Enhancing Rule Interpretability in Association Rule Learning for the Retail Sector
6
作者 Monerah Alawadh Ahmed Barnawi 《Computers, Materials & Continua》 SCIE EI 2024年第6期4995-5015,共21页
Association rule learning(ARL)is a widely used technique for discovering relationships within datasets.However,it often generates excessive irrelevant or ambiguous rules.Therefore,post-processing is crucial not only f... Association rule learning(ARL)is a widely used technique for discovering relationships within datasets.However,it often generates excessive irrelevant or ambiguous rules.Therefore,post-processing is crucial not only for removing irrelevant or redundant rules but also for uncovering hidden associations that impact other factors.Recently,several post-processing methods have been proposed,each with its own strengths and weaknesses.In this paper,we propose THAPE(Tunable Hybrid Associative Predictive Engine),which combines descriptive and predictive techniques.By leveraging both techniques,our aim is to enhance the quality of analyzing generated rules.This includes removing irrelevant or redundant rules,uncovering interesting and useful rules,exploring hidden association rules that may affect other factors,and providing backtracking ability for a given product.The proposed approach offers a tailored method that suits specific goals for retailers,enabling them to gain a better understanding of customer behavior based on factual transactions in the target market.We applied THAPE to a real dataset as a case study in this paper to demonstrate its effectiveness.Through this application,we successfully mined a concise set of highly interesting and useful association rules.Out of the 11,265 rules generated,we identified 125 rules that are particularly relevant to the business context.These identified rules significantly improve the interpretability and usefulness of association rules for decision-making purposes. 展开更多
关键词 Association rule learning POST-PROCESSING PREDICTIVE machine learning rule interpretability
在线阅读 下载PDF
AMachine Learning Approach to User Profiling for Data Annotation of Online Behavior
7
作者 Moona Kanwal Najeed AKhan Aftab A.Khan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2419-2440,共22页
The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interest... The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater. 展开更多
关键词 User intent CLUSTER user profile online search information sharing user behavior search reasons
在线阅读 下载PDF
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
8
作者 Islam Zada Mohammed Naif Alatawi +4 位作者 Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi 《Computers, Materials & Continua》 SCIE EI 2024年第8期2917-2939,共23页
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malwar... Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malware detection.However,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection.Addressing this gap can provide valuable insights for enhancing cybersecurity strategies.While numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware detection.Understanding the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security measures.This study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows systems.The objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows malware.Evaluating the accuracy,efficiency,and suitability of each classifier for real-world malware detection scenarios.Identifying the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and researchers.Offering recommendations for selecting the most effective classifier for Windows malware detection based on empirical evidence.The study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and evaluation.Exploratory data analysis involves understanding the dataset’s characteristics and identifying preprocessing requirements.Data preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for training.Model training utilizes various supervised classifiers,and their performance is evaluated using metrics such as accuracy,precision,recall,and F1 score.The study’s outcomes comprise a comparative analysis of supervised machine learning classifiers for Windows malware detection.Results reveal the effectiveness and efficiency of each classifier in detecting different types of malware.Additionally,insights into their strengths and limitations provide practical guidance for enhancing cybersecurity defenses.Overall,this research contributes to advancing malware detection techniques and bolstering the security posture of Windows systems against evolving cyber threats. 展开更多
关键词 Security and privacy challenges in the context of requirements engineering supervisedmachine learning malware detection windows systems comparative analysis Gaussian Naive Bayes K Nearest Neighbors Stochastic Gradient Descent Classifier Decision Tree
在线阅读 下载PDF
A comparative in vitro study on the effect of SGLT2 inhibitors on chemosensitivity to doxorubicin in MCF-7 breast cancer cells
9
作者 SHAHID KARIM ALANOUD NAHER ALGHANMI +5 位作者 MAHA JAMAL HUDA ALKREATHY ALAM JAMAL HIND A.ALKHATABI MOHAMMED BAZUHAIR AFTAB AHMAD 《Oncology Research》 SCIE 2024年第5期817-830,共14页
Cancer frequently develops resistance to the majority of chemotherapy treatments.This study aimed to examine the synergistic cytotoxic and antitumor effects of SGLT2 inhibitors,specifically Canagliflozin(CAN),Dapaglif... Cancer frequently develops resistance to the majority of chemotherapy treatments.This study aimed to examine the synergistic cytotoxic and antitumor effects of SGLT2 inhibitors,specifically Canagliflozin(CAN),Dapagliflozin(DAP),Empagliflozin(EMP),and Doxorubicin(DOX),using in vitro experimentation.The precise combination of CAN+DOX has been found to greatly enhance the cytotoxic effects of doxorubicin(DOX)in MCF-7 cells.Interestingly,it was shown that cancer cells exhibit an increased demand for glucose and ATP in order to support their growth.Notably,when these medications were combined with DOX,there was a considerable inhibition of glucose consumption,as well as reductions in intracellular ATP and lactate levels.Moreover,this effect was found to be dependent on the dosages of the drugs.In addition to effectively inhibiting the cell cycle,the combination of CAN+DOX induces substantial modifications in both cell cycle and apoptotic gene expression.This work represents the initial report on the beneficial impact of SGLT2 inhibitor medications,namely CAN,DAP,and EMP,on the responsiveness to the anticancer properties of DOX.The underlying molecular mechanisms potentially involve the suppression of the function of SGLT2. 展开更多
关键词 SGLT2 Cancer CYTOTOXICITY ATP Cell cycle
在线阅读 下载PDF
Ensemble Deep Learning Based Air Pollution Prediction for Sustainable Smart Cities
10
作者 Maha Farouk Sabir Mahmoud Ragab +2 位作者 Adil O.Khadidos Khaled H.Alyoubi Alaa O.Khadidos 《Computer Systems Science & Engineering》 2024年第3期627-643,共17页
Big data and information and communication technologies can be important to the effectiveness of smart cities.Based on the maximal attention on smart city sustainability,developing data-driven smart cities is newly ob... Big data and information and communication technologies can be important to the effectiveness of smart cities.Based on the maximal attention on smart city sustainability,developing data-driven smart cities is newly obtained attention as a vital technology for addressing sustainability problems.Real-time monitoring of pollution allows local authorities to analyze the present traffic condition of cities and make decisions.Relating to air pollution occurs a main environmental problem in smart city environments.The effect of the deep learning(DL)approach quickly increased and penetrated almost every domain,comprising air pollution forecast.Therefore,this article develops a new Coot Optimization Algorithm with an Ensemble Deep Learning based Air Pollution Prediction(COAEDL-APP)system for Sustainable Smart Cities.The projected COAEDL-APP algorithm accurately forecasts the presence of air quality in the sustainable smart city environment.To achieve this,the COAEDL-APP technique initially performs a linear scaling normalization(LSN)approach to pre-process the input data.For air quality prediction,an ensemble of three DL models has been involved,namely autoencoder(AE),long short-term memory(LSTM),and deep belief network(DBN).Furthermore,the COA-based hyperparameter tuning procedure can be designed to adjust the hyperparameter values of the DL models.The simulation outcome of the COAEDL-APP algorithm was tested on the air quality database,and the outcomes stated the improved performance of the COAEDL-APP algorithm over other existing systems with maximum accuracy of 98.34%. 展开更多
关键词 SUSTAINABILITY smart cities air pollution prediction ensemble learning coot optimization algorithm
在线阅读 下载PDF
Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions,and Future Directions
11
作者 Ahmad Rahdari Ahmad Jalili +8 位作者 Mehdi Esnaashari Mehdi Gheisari Alisa A.Vorobeva Zhaoxi Fang Panjun Sun Viktoriia M.Korzhuk Ilya Popov Zongda Wu Hamid Tahaei 《Computers, Materials & Continua》 SCIE EI 2024年第8期2511-2533,共23页
Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize deployment.Concur-r... Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize deployment.Concur-rently,the Internet of Things(IoT)connects numerous devices to the Internet,enabling autonomous interactions with minimal human intervention.However,implementing and managing an SDN-IoT system is inherently complex,particularly for those with limited resources,as the dynamic and distributed nature of IoT infrastructures creates security and privacy challenges during SDN integration.The findings of this study underscore the primary security and privacy challenges across application,control,and data planes.A comprehensive review evaluates the root causes of these challenges and the defense techniques employed in prior works to establish sufficient secrecy and privacy protection.Recent investigations have explored cutting-edge methods,such as leveraging blockchain for transaction recording to enhance security and privacy,along with applying machine learning and deep learning approaches to identify and mitigate the impacts of Denial of Service(DoS)and Distributed DoS(DDoS)attacks.Moreover,the analysis indicates that encryption and hashing techniques are prevalent in the data plane,whereas access control and certificate authorization are prominently considered in the control plane,and authentication is commonly employed within the application plane.Additionally,this paper outlines future directions,offering insights into potential strategies and technological advancements aimed at fostering a more secure and privacy-conscious SDN-based IoT ecosystem. 展开更多
关键词 Security PRIVACY-PRESERVING software-defined network internet of things
在线阅读 下载PDF
Optimizing Spatial Pattern Analysis in Serial Remote Sensing Images through Empirical Mode Decomposition and Ant Colony Optimization
12
作者 J Srinivasan S Uma +1 位作者 Saleem Raja Abdul Samad Jayabrabu Ramakrishnan 《Journal of Harbin Institute of Technology(New Series)》 CAS 2024年第4期52-60,共9页
Serial remote sensing images offer a valuable means of tracking the evolutionary changes and growth of a specific geographical area over time.Although the original images may provide limited insights,they harbor consi... Serial remote sensing images offer a valuable means of tracking the evolutionary changes and growth of a specific geographical area over time.Although the original images may provide limited insights,they harbor considerable potential for identifying clusters and patterns.The aggregation of these serial remote sensing images(SRSI)becomes increasingly viable as distinct patterns emerge in diverse scenarios,such as suburbanization,the expansion of native flora,and agricultural activities.In a novel approach,we propose an innovative method for extracting sequential patterns by combining Ant Colony Optimization(ACD)and Empirical Mode Decomposition(EMD).This integration of the newly developed EMD and ACO techniques proves remarkably effective in identifying the most significant characteristic features within serial remote sensing images,guided by specific criteria.Our findings highlight a substantial improvement in the efficiency of sequential pattern mining through the application of this unique hybrid method,seamlessly integrating EMD and ACO for feature selection.This study exposes the potential of our innovative methodology,particularly in the realms of urbanization,native vegetation expansion,and agricultural activities. 展开更多
关键词 spatial pattern analysis EMD ACO
在线阅读 下载PDF
Robust Machine Learning Technique to Classify COVID-19 Using Fusion of Texture and Vesselness of X-Ray Images
13
作者 Shaik Mahaboob Basha Victor Hugo Cde Albuquerque +3 位作者 Samia Allaoua Chelloug Mohamed Abd Elaziz Shaik Hashmitha Mohisin Suhail Parvaze Pathan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1981-2004,共24页
Manual investigation of chest radiography(CXR)images by physicians is crucial for effective decision-making in COVID-19 diagnosis.However,the high demand during the pandemic necessitates auxiliary help through image a... Manual investigation of chest radiography(CXR)images by physicians is crucial for effective decision-making in COVID-19 diagnosis.However,the high demand during the pandemic necessitates auxiliary help through image analysis and machine learning techniques.This study presents a multi-threshold-based segmentation technique to probe high pixel intensity regions in CXR images of various pathologies,including normal cases.Texture information is extracted using gray co-occurrence matrix(GLCM)-based features,while vessel-like features are obtained using Frangi,Sato,and Meijering filters.Machine learning models employing Decision Tree(DT)and RandomForest(RF)approaches are designed to categorize CXR images into common lung infections,lung opacity(LO),COVID-19,and viral pneumonia(VP).The results demonstrate that the fusion of texture and vesselbased features provides an effective ML model for aiding diagnosis.The ML model validation using performance measures,including an accuracy of approximately 91.8%with an RF-based classifier,supports the usefulness of the feature set and classifier model in categorizing the four different pathologies.Furthermore,the study investigates the importance of the devised features in identifying the underlying pathology and incorporates histogrambased analysis.This analysis reveals varying natural pixel distributions in CXR images belonging to the normal,COVID-19,LO,and VP groups,motivating the incorporation of additional features such as mean,standard deviation,skewness,and percentile based on the filtered images.Notably,the study achieves a considerable improvement in categorizing COVID-19 from LO,with a true positive rate of 97%,further substantiating the effectiveness of the methodology implemented. 展开更多
关键词 Chest radiography(CXR)image COVID-19 CLASSIFIER machine learning random forest texture analysis
在线阅读 下载PDF
Implementation of Robotic Hygiene System for Surveillance and Prevention of Hospital Infections in Non-Self-Sufficient Patients
14
作者 Massimiliano Guastella Linda Pasta +1 位作者 Andrea Cuvello Mariano Frittitta 《Open Journal of Nursing》 2024年第11期579-590,共12页
Background: Personal hygiene in non-self-sufficient patients is essential to prevent the proliferation and spread of bacteria from one patient to another, both through inanimate objects (fomites) and directly through ... Background: Personal hygiene in non-self-sufficient patients is essential to prevent the proliferation and spread of bacteria from one patient to another, both through inanimate objects (fomites) and directly through healthcare workers. The first 1000 bed hygiene treatments performed by the collaborative robot “COPERNICO Surveillance & Prevention” in 229 non-self-sufficient patients were analyzed. Materials and Methods: A total of 229 patients were included: 215 patients came from emergency contexts or home, and 14 from long-term care facilities;the presence of sepsis, venous or urinary catheters, non-invasive ventilation, bedsores, clinical condition at discharge, and treatment sessions performed were recorded. All patients were hospitalized in the Geriatrics, Medicine and Pneumology departments. The system is able to collect and process data in real time. Results: Seventy-one patients with community-acquired sepsis and fourteen with healthcare-associated infections were treated;sixty-two had pressure ulcers. The analysis of the first 1000 treatments shows the healing of almost all sepsis cases, positive evolution of pressure ulcers, and hospital stays comparable to those of the entire group of 1008 hospitalized in the same period. There was no onset of side effects or complications. Conclusions: Although the healthcare setting is not among those at greatest risk of infections, the clinical efficacy, along with excellent evaluations from patients, family members, and healthcare personnel and the absence of side effects and complications, makes the system exceptionally manageable and user-friendly for non-self-sufficient patients. 展开更多
关键词 Infection Prevention Healthcare-Associated Infections Collaborative Robot Geriatric Nursing Personal Hygiene Missed Nursing Care
在线阅读 下载PDF
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks
15
作者 Vincent Omollo Nyangaresi Arkan A.Ghaib +6 位作者 Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah 《Computers, Materials & Continua》 SCIE EI 2024年第10期1029-1057,共29页
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages ov... Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations.To address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently.However,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many attacks.As such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)operations.The formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably secure.The proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and unlinkability.Moreover,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and impersonations.From the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security features.Therefore,the proposed scheme can be deployed in VANETs to provide robust security at low overheads. 展开更多
关键词 ATTACKS BILINEAR elliptic curve cryptography(ECC) PRIVACY SECURITY vehicular ad hoc network(VANET)
在线阅读 下载PDF
Evaluating the Effectiveness of Graph Convolutional Network for Detection of Healthcare Polypharmacy Side Effects
16
作者 Omer Nabeel Dara Tareq Abed Mohammed Abdullahi Abdu Ibrahim 《Intelligent Automation & Soft Computing》 2024年第6期1007-1033,共27页
Healthcare polypharmacy is routinely used to treat numerous conditions;however,it often leads to unanticipated bad consequences owing to complicated medication interactions.This paper provides a graph convolutional ne... Healthcare polypharmacy is routinely used to treat numerous conditions;however,it often leads to unanticipated bad consequences owing to complicated medication interactions.This paper provides a graph convolutional network(GCN)-based model for identifying adverse effects in polypharmacy by integrating pharmaceutical data from electronic health records(EHR).The GCN framework analyzes the complicated links between drugs to forecast the possibility of harmful drug interactions.Experimental assessments reveal that the proposed GCN model surpasses existing machine learning approaches,reaching an accuracy(ACC)of 91%,an area under the receiver operating characteristic curve(AUC)of 0.88,and an F1-score of 0.83.Furthermore,the overall accuracy of the model achieved 98.47%.These findings imply that the GCN model is helpful for monitoring individuals receiving polypharmacy.Future research should concentrate on improving the model and extending datasets for therapeutic applications. 展开更多
关键词 POLYPHARMACY side effects drug-drug interactions graph convolutional networks deep learning medication network
在线阅读 下载PDF
Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine
17
作者 Arslan Akram Imran Khan +4 位作者 Javed Rashid Mubbashar Saddique Muhammad Idrees Yazeed Yasin Ghadi Abdulmohsen Algarni 《Computers, Materials & Continua》 SCIE EI 2024年第1期1311-1328,共18页
Algorithms for steganography are methods of hiding data transfers in media files.Several machine learning architectures have been presented recently to improve stego image identification performance by using spatial i... Algorithms for steganography are methods of hiding data transfers in media files.Several machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image analysis.Images with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for classification.To address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of images.Support Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or cover.The Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the proposedmethod.Using WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods. 展开更多
关键词 CURVELETS fast fourier transformation support vector machine high pass filters STEGANOGRAPHY
在线阅读 下载PDF
The User Analysis of Amazon Using Artificial Intelligence at Customer Churn
18
作者 Mohammed Ali Alzahrani 《Journal of Data Analysis and Information Processing》 2024年第1期40-48,共9页
Customer churns remains a key focus in this research, using artificial intelligence-based technique of machine learning. Research is based on the feature-based analysis four main features were used that are selected o... Customer churns remains a key focus in this research, using artificial intelligence-based technique of machine learning. Research is based on the feature-based analysis four main features were used that are selected on the basis of our customer churn to deduct the meaning full analysis of the data set. Data-set is taken from the Kaggle that is about the fine food review having more than half a million records in it. This research remains on feature based analysis that is further concluded using confusion matrix. In this research we are using confusion matrix to conclude the customer churn results. Such specific analysis helps e-commerce business for real time growth in their specific products focusing more sales and to analyze which product is getting outage. Moreover, after applying the techniques, Support Vector Machine and K-Nearest Neighbour perform better than the random forest in this particular scenario. Using confusion matrix for obtaining the results three things are obtained that are precision, recall and accuracy. The result explains feature-based analysis on fine food reviews, Amazon at customer churn Support Vector Machine performed better as in overall comparison. 展开更多
关键词 Customer Churn Machine Learning Amazon Fine Food Reviews Data Science Artificial Intelligence
在线阅读 下载PDF
Research on Determining the Weights of Key Influencing Factors Based on Multi-Grained Binary Semantics
19
作者 Yun Li Weizhe Shu 《Journal of Electronic Research and Application》 2024年第6期157-161,共5页
To effectively address the complexity of the environment,information uncertainty,and variability among decision-makers in the event of an enterprise emergency,a multi-granularity binary semantic-based emergency decisi... To effectively address the complexity of the environment,information uncertainty,and variability among decision-makers in the event of an enterprise emergency,a multi-granularity binary semantic-based emergency decision-making method is proposed.Decision-makers use preferred multi-granularity non-uniform linguistic scales combined with binary semantics to represent the evaluation information of key influencing factors.Secondly,the weights were determined based on the proposed method.Finally,the proposed method’s effectiveness is validated using a case study of a fire incident in a chemical company. 展开更多
关键词 Multi-grained binary semantics EMERGENCY Key influencing factor
在线阅读 下载PDF
Evaluating Logistics Systems in the Context of Mass Customization Based on Goal Expectation
20
作者 Yun Li Zengqiang Wang 《Proceedings of Business and Economic Studies》 2024年第6期54-59,共6页
Given the complexity and uncertainty of logistics systems in a mass customization environment,decision-making teams often rely on linguistic phrases rather than quantifiable evaluation indices when selecting an evalua... Given the complexity and uncertainty of logistics systems in a mass customization environment,decision-making teams often rely on linguistic phrases rather than quantifiable evaluation indices when selecting an evaluation system.This paper proposes a logistics system evaluation method based on index goal expectation.First,linguistic phrases are processed through an integration method to derive standardized weight vectors.Next,the decision-making team establishes the expected compliance degree for each alternative,which is processed using an axiomatic design to calculate the final evaluation index for each option.The options are then ranked based on these indices to identify the most appropriate logistics system.Applying this method to a company’s logistics system selection demonstrates its effectiveness and feasibility. 展开更多
关键词 Logistics system Goal expectation Axiomatic design
在线阅读 下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部