期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Machine Learning Approach for Expression Detection in Healthcare Monitoring Systems 被引量:1
1
作者 Muhammad Kashif Ayyaz Hussain +6 位作者 Asim Munir Abdul Basit Siddiqui AaqifAfzaal Abbasi Muhammad Aakif Arif Jamal Malik Fayez Eid Alazemi Oh-Young Song 《Computers, Materials & Continua》 SCIE EI 2021年第5期2123-2139,共17页
Expression detection plays a vital role to determine the patient’s condition in healthcare systems.It helps the monitoring teams to respond swiftly in case of emergency.Due to the lack of suitable methods,results are... Expression detection plays a vital role to determine the patient’s condition in healthcare systems.It helps the monitoring teams to respond swiftly in case of emergency.Due to the lack of suitable methods,results are often compromised in an unconstrained environment because of pose,scale,occlusion and illumination variations in the image of the face of the patient.A novel patch-based multiple local binary patterns(LBP)feature extraction technique is proposed for analyzing human behavior using facial expression recognition.It consists of three-patch[TPLBP]and four-patch LBPs[FPLBP]based feature engineering respectively.Image representation is encoded from local patch statistics using these descriptors.TPLBP and FPLBP capture information that is encoded to find likenesses between adjacent patches of pixels by using short bit strings contrary to pixel-based methods.Coded images are transformed into the frequency domain using a discrete cosine transform(DCT).Most discriminant features extracted from coded DCT images are combined to generate a feature vector.Support vector machine(SVM),k-nearest neighbor(KNN),and Naïve Bayes(NB)are used for the classification of facial expressions using selected features.Extensive experimentation is performed to analyze human behavior by considering standard extended Cohn Kanade(CK+)and Oulu–CASIA datasets.Results demonstrate that the proposed methodology outperforms the other techniques used for comparison. 展开更多
关键词 Detection EXPRESSIONS GESTURES ANALYTICS PAIN patch-based local binary descriptor discrete cosine transform healthcare
在线阅读 下载PDF
Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
2
作者 Vincent Omollo Nyangaresi 《High-Confidence Computing》 EI 2023年第4期60-72,共13页
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled regions.In addition,they have been deployed in civilian critical infrastructure monitoring.In this environm... Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled regions.In addition,they have been deployed in civilian critical infrastructure monitoring.In this environment,real-time and massive data is exchanged between the aerial vehicles and the ground control stations.Depending on the mission of these aerial vehicles,some of the collected and transmitted data is sensitive and private.Therefore,many security protocols have been presented to offer privacy and security protection.However,majority of these schemes fail to consider attack vectors such as side-channeling,de-synchronization and known secret session temporary information leakages.This last attack can be launched upon adversarial physical capture of these drones.In addition,some of these protocols deploy computationally intensive asymmetric cryptographic primitives that result in high overheads.In this paper,an authentication protocol based on lightweight quadratic residues and hash functions is developed.Its formal security analysis is executed using the widely deployed random oracle model.In addition,informal security analysis is carried out to show its robustness under the Dolev–Yao(DY)and Canetti–Krawczyk(CK)threat models.In terms of operational efficiency,it is shown to have relatively lower execution time,communication costs,and incurs the least storage costs among other related protocols.Specifically,the proposed protocol provides a 25%improvement in supported security and privacy features and a 6.52%reduction in storage costs.In overall,the proposed methodology offers strong security and privacy protection at lower execution time,storage and communication overheads. 展开更多
关键词 AUTHENTICATION DRONES Quadratic residues PRIVACY Security Side-channeling UAV
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部