期刊文献+
共找到79篇文章
< 1 2 4 >
每页显示 20 50 100
Differential Evolution with Improved Equilibrium Optimizer for Combined Heat and Power Economic Dispatch Problem
1
作者 Yuanfei Wei Panpan Song +1 位作者 Qifang Luo Yongquan Zhou 《Computers, Materials & Continua》 2025年第10期1235-1265,共31页
The combined heat and power economic dispatch(CHPED)problem is a highly intricate energy dispatch challenge that aims to minimize fuel costs while adhering to various constraints.This paper presents a hybrid different... The combined heat and power economic dispatch(CHPED)problem is a highly intricate energy dispatch challenge that aims to minimize fuel costs while adhering to various constraints.This paper presents a hybrid differential evolution(DE)algorithm combined with an improved equilibrium optimizer(DE-IEO)specifically for the CHPED problem.The DE-IEO incorporates three enhancement strategies:a chaotic mechanism for initializing the population,an improved equilibrium pool strategy,and a quasi-opposite based learning mechanism.These strategies enhance the individual utilization capabilities of the equilibrium optimizer,while differential evolution boosts local exploitation and escape capabilities.The IEO enhances global search to enrich the solution space,and DE focuses on local exploitation for more accurate solutions.The effectiveness of DE-IEO is demonstrated through comparative analysis with other metaheuristic optimization algorithms,including PSO,DE,ABC,GWO,WOA,SCA,and equilibrium optimizer(EO).Additionally,improved algorithms such as the enhanced chaotic gray wolf optimization(ACGWO),improved particle swarm with adaptive strategy(MPSO),and enhanced SCA with elite and dynamic opposite learning(EDOLSCA)were tested on the CEC2017 benchmark suite and four CHPED systems with 24,84,96,and 192 units,respectively.The results indicate that the proposed DE-IEO algorithm achieves satisfactory solutions for both the CEC2017 test functions and real-world CHPED optimization problems,offering a viable approach to complex optimization challenges. 展开更多
关键词 CHPED DE EO large-scale system CEC2017 test suite metaheuristic optimization
在线阅读 下载PDF
Survey on AI-Enabled Resource Management for 6G Heterogeneous Networks:Recent Research,Challenges,and Future Trends
2
作者 Hayder Faeq Alhashimi Mhd Nour Hindia +4 位作者 Kaharudin Dimyati Effariza Binti Hanafi Feras Zen Alden Faizan Qamar Quang Ngoc Nguyen 《Computers, Materials & Continua》 2025年第6期3585-3622,共38页
The forthcoming 6G wireless networks have great potential for establishing AI-based networks that can enhance end-to-end connection and manage massive data of real-time networks.Artificial Intelligence(AI)advancements... The forthcoming 6G wireless networks have great potential for establishing AI-based networks that can enhance end-to-end connection and manage massive data of real-time networks.Artificial Intelligence(AI)advancements have contributed to the development of several innovative technologies by providing sophisticated specific AI mathematical models such as machine learning models,deep learning models,and hybrid models.Furthermore,intelligent resource management allows for self-configuration and autonomous decision-making capabilities of AI methods,which in turn improves the performance of 6G networks.Hence,6G networks rely substantially on AI methods to manage resources.This paper comprehensively surveys the recent work of AI methods-based resource management for 6G networks.Firstly,the AI methods are categorized into Deep Learning(DL),Federated Learning(FL),Reinforcement Learning(RL),and Evolutionary Learning(EL).Then,we analyze the AI approaches according to optimization issues such as user association,channel allocation,power allocation,and mode selection.Thereafter,we provide appropriate solutions to the most significant problems with the existing approaches of AI-based resource management.Finally,various open issues and potential trends related to AI-based resource management applications are presented.In summary,this survey enables researchers to understand these advancements thoroughly and quickly identify remaining challenges that need further investigation. 展开更多
关键词 Artificial intelligence(AI) resource management deep learning(DL) federated learning(FL) reinforcement learning(RL) evolutionary learning(EL)
在线阅读 下载PDF
SOME DISCRETE NONLINEAR INEQUALITIES AND APPLICATIONS TO DIFFERENCE EQUATIONS 被引量:3
3
作者 Cheung Wing-Sum Ma Qing-Hua Josip Pecaric 《Acta Mathematica Scientia》 SCIE CSCD 2008年第2期417-430,共14页
In this article, the authors establish some new nonlinear difference inequalities in two independent variables, which generalize some existing results and can be used as handy tools in the study of qualitative as well... In this article, the authors establish some new nonlinear difference inequalities in two independent variables, which generalize some existing results and can be used as handy tools in the study of qualitative as well as quantitative properties of solutions of certain classes of difference equations. 展开更多
关键词 Discrete Gronwll-Bellman-Ou-Iang type inequalities a Priori bound difference equation boundary value problems
在线阅读 下载PDF
Protecting Against Address Space Layout Randomisation (ASLR) Compromises and Return-to-Libc Attacks Using Network Intrusion Detection Systems 被引量:2
4
作者 David J Day Zheng-Xu Zhao 《International Journal of Automation and computing》 EI 2011年第4期472-483,共12页
Writable XOR executable (W⊕X) and address space layout randomisation (ASLR) have elevated the understanding necessary to perpetrate buffer overflow exploits [1] . However, they have not proved to be a panacea [1 ... Writable XOR executable (W⊕X) and address space layout randomisation (ASLR) have elevated the understanding necessary to perpetrate buffer overflow exploits [1] . However, they have not proved to be a panacea [1 3] , and so other mechanisms, such as stack guards and prelinking, have been introduced. In this paper, we show that host-based protection still does not offer a complete solution. To demonstrate the protection inadequacies, we perform an over the network brute force return-to-libc attack against a preforking concurrent server to gain remote access to a shell. The attack defeats host protection including W⊕X and ASLR. We then demonstrate that deploying a network intrusion detection systems (NIDS) with appropriate signatures can detect this attack efficiently. 展开更多
关键词 Buffer overflow stack overflow intrusion detection systems (IDS) signature rules return-to-libc attack pre-forking.
在线阅读 下载PDF
Wind Driven Butterfly Optimization Algorithm with Hybrid Mechanism Avoiding Natural Enemies for Global Optimization and PID Controller Design 被引量:1
5
作者 Yang He Yongquan Zhou +2 位作者 Yuanfei Wei Qifang Luo Wu Deng 《Journal of Bionic Engineering》 SCIE EI CSCD 2023年第6期2935-2972,共38页
This paper presents a Butterfly Optimization Algorithm(BOA)with a wind-driven mechanism for avoiding natural enemies known as WDBOA.To further balance the basic BOA algorithm's exploration and exploitation capabil... This paper presents a Butterfly Optimization Algorithm(BOA)with a wind-driven mechanism for avoiding natural enemies known as WDBOA.To further balance the basic BOA algorithm's exploration and exploitation capabilities,the butterfly actions were divided into downwind and upwind states.The algorithm of exploration ability was improved with the wind,while the algorithm of exploitation ability was improved against the wind.Also,a mechanism of avoiding natural enemies based on Lévy flight was introduced for the purpose of enhancing its global searching ability.Aiming at improving the explorative performance at the initial stages and later stages,the fragrance generation method was modified.To evaluate the effectiveness of the suggested algorithm,a comparative study was done with six classical metaheuristic algorithms and three BOA variant optimization techniques on 18 benchmark functions.Further,the performance of the suggested technique in addressing some complicated problems in various dimensions was evaluated using CEC 2017 and CEC 2020.Finally,the WDBOA algorithm is used proportional-integral-derivative(PID)controller parameter optimization.Experimental results demonstrate that the WDBOA based PID controller has better control performance in comparison with other PID controllers tuned by the Genetic Algorithm(GA),Flower Pollination Algorithm(FPA),Cuckoo Search(CS)and BOA. 展开更多
关键词 Butterfly Optimization Algorithm(BOA) Wind Driven Optimization(WDO) Benchmark functions Global optimization Proportional integral derivative(PID) METAHEURISTIC
在线阅读 下载PDF
Single and Mitochondrial Gene Inheritance Disorder Prediction Using Machine Learning 被引量:2
6
作者 Muhammad Umar Nasir Muhammad Adnan Khan +3 位作者 Muhammad Zubair Taher MGhazal Raed A.Said Hussam Al Hamadi 《Computers, Materials & Continua》 SCIE EI 2022年第10期953-963,共11页
One of the most difficult jobs in the post-genomic age is identifying a genetic disease from a massive amount of genetic data.Furthermore,the complicated genetic disease has a very diverse genotype,making it challengi... One of the most difficult jobs in the post-genomic age is identifying a genetic disease from a massive amount of genetic data.Furthermore,the complicated genetic disease has a very diverse genotype,making it challenging to find genetic markers.This is a challenging process since it must be completed effectively and efficiently.This research article focuses largely on which patients are more likely to have a genetic disorder based on numerous medical parameters.Using the patient’s medical history,we used a genetic disease prediction algorithm that predicts if the patient is likely to be diagnosed with a genetic disorder.To predict and categorize the patient with a genetic disease,we utilize several deep and machine learning techniques such as Artificial neural network(ANN),K-nearest neighbors(KNN),and Support vector machine(SVM).To enhance the accuracy of predicting the genetic disease in any patient,a highly efficient approach was utilized to control how the model can be used.To predict genetic disease,deep and machine learning approaches are performed.The most productive tool model provides more precise efficiency.The simulation results demonstrate that by using the proposed model with the ANN,we achieve the highest model performance of 85.7%,84.9%,84.3%accuracy of training,testing and validation respectively.This approach will undoubtedly transform genetic disorder prediction and give a real competitive strategy to save patients’lives. 展开更多
关键词 Genetic disorder machine learning deep learning single gene inheritance gene disorder mitochondrial gene inheritance disorder
在线阅读 下载PDF
Convolutional Neural Network Based Intelligent Handwritten Document Recognition 被引量:3
7
作者 Sagheer Abbas Yousef Alhwaiti +6 位作者 Areej Fatima Muhammad A.Khan Muhammad Adnan Khan Taher M.Ghazal Asma Kanwal Munir Ahmad Nouh Sabri Elmitwally 《Computers, Materials & Continua》 SCIE EI 2022年第3期4563-4581,共19页
This paper presents a handwritten document recognition system based on the convolutional neural network technique.In today’s world,handwritten document recognition is rapidly attaining the attention of researchers du... This paper presents a handwritten document recognition system based on the convolutional neural network technique.In today’s world,handwritten document recognition is rapidly attaining the attention of researchers due to its promising behavior as assisting technology for visually impaired users.This technology is also helpful for the automatic data entry system.In the proposed systemprepared a dataset of English language handwritten character images.The proposed system has been trained for the large set of sample data and tested on the sample images of user-defined handwritten documents.In this research,multiple experiments get very worthy recognition results.The proposed systemwill first performimage pre-processing stages to prepare data for training using a convolutional neural network.After this processing,the input document is segmented using line,word and character segmentation.The proposed system get the accuracy during the character segmentation up to 86%.Then these segmented characters are sent to a convolutional neural network for their recognition.The recognition and segmentation technique proposed in this paper is providing the most acceptable accurate results on a given dataset.The proposed work approaches to the accuracy of the result during convolutional neural network training up to 93%,and for validation that accuracy slightly decreases with 90.42%. 展开更多
关键词 Convolutional neural network SEGMENTATION SKEW cursive characters RECOGNITION
在线阅读 下载PDF
Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method 被引量:1
8
作者 J.Stanly Jayaprakash Kishore Balasubramanian +3 位作者 Rossilawati Sulaiman Mohammad Kamrul Hasan B.D.Parameshachari Celestine Iwendi 《Computers, Materials & Continua》 SCIE EI 2022年第7期519-534,共16页
Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integ... Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity.In this research,an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data.Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data.Merkle Hash tree provides the efficient mapping of data and easily identifies the changesmade in the data due to proper structure.The developed model supports privacy-preserving public auditing to provide a secure cloud storage system.The data owners upload the data in the cloud and edit the data using the private key.An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches.The data files requested by the data owner are audit by a third-party auditor and the multiowner authentication method is applied during the modification process to authenticate the user.The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2–167 ms when compared to the existing Advanced Encryption Standard and Blowfish. 展开更多
关键词 Cloud computing cloud data storage cloud service provider merkle hash tree multi-owner authentication third-party auditor
在线阅读 下载PDF
A Framework for Driver DrowsinessMonitoring Using a Convolutional Neural Network and the Internet of Things 被引量:1
9
作者 Muhamad Irsan Rosilah Hassan +3 位作者 Anwar Hassan Ibrahim Mohamad Khatim Hasan Meng Chun Lam Wan Mohd Hirwani Wan Hussain 《Intelligent Automation & Soft Computing》 2024年第2期157-174,共18页
One of the major causes of road accidents is sleepy drivers.Such accidents typically result in fatalities and financial losses and disadvantage other road users.Numerous studies have been conducted to identify the dri... One of the major causes of road accidents is sleepy drivers.Such accidents typically result in fatalities and financial losses and disadvantage other road users.Numerous studies have been conducted to identify the driver’s sleepiness and integrate it into a warning system.Most studies have examined how the mouth and eyelids move.However,this limits the system’s ability to identify drowsiness traits.Therefore,this study designed an Accident Detection Framework(RPK)that could be used to reduce road accidents due to sleepiness and detect the location of accidents.The drowsiness detectionmodel used three facial parameters:Yawning,closed eyes(blinking),and an upright head position.This model used a Convolutional Neural Network(CNN)consisting of two phases.The initial phase involves video processing and facial landmark coordinate detection.The second phase involves developing the extraction of frame-based features using normalization methods.All these phases used OpenCV and TensorFlow.The dataset contained 5017 images with 874 open eyes images,850 closed eyes images,723 open-mouth images,725 closed-mouth images,761 sleepy-head images,and 1084 non-sleepy head images.The dataset of 5017 images was divided into the training set with 4505 images and the testing set with 512 images,with a ratio of 90:10.The results showed that the RPK design could detect sleepiness by using deep learning techniques with high accuracy on all three parameters;namely 98%for eye blinking,96%for mouth yawning,and 97%for head movement.Overall,the test results have provided an overview of how the developed RPK prototype can accurately identify drowsy drivers.These findings will have a significant impact on the improvement of road users’safety and mobility. 展开更多
关键词 Drowsy drivers convolutional neural network OPENCV MICROPROCESSOR face detection
在线阅读 下载PDF
IPv6 Cryptographically Generated Address:Analysis,Optimization and Protection
10
作者 Amjed Sid Ahmed Rosilah Hassan +1 位作者 Faizan Qamar Mazhar Malik 《Computers, Materials & Continua》 SCIE EI 2021年第7期247-265,共19页
In networking,one major difficulty that nodes suffer from is the need for their addresses to be generated and verified without relying on a third party or public authorized servers.To resolve this issue,the use of sel... In networking,one major difficulty that nodes suffer from is the need for their addresses to be generated and verified without relying on a third party or public authorized servers.To resolve this issue,the use of selfcertifying addresses have become a highly popular and standardized method,of which Cryptographically Generated Addresses(CGA)is a prime example.CGA was primarily designed to deter the theft of IPv6 addresses by binding the generated address to a public key to prove address ownership.Even though the CGA technique is highly effective,this method is still subject to several vulnerabilities with respect to security,in addition to certain limitations in its performance.In this study,the authors present an intensive systematic review of the literature to explore the technical specifications of CGA,its challenges,and existing proposals to enhance the protocol.Given that CGA generation is a time-consuming process,this limitation has hampered the application of CGA in mobile environments where nodes have limited energy and storage.Fulfilling Hash2 conditions in CGA is the heaviest and most timeconsuming part of SEND.To improve the performance of CGA,we replaced the Secure Hash Algorithm(SHA1)with the Message Digest(MD5)hash function.Furthermore,this study also analyzes the possible methods through which a CGA could be attacked.In conducting this analysis,Denial-of-Service(DoS)attacks were identified as the main method of attack toward the CGA verification process,which compromise and threaten the privacy of CGA.Therefore,we propose some modifications to the CGA standard verification algorithm to mitigate DoS attacks and to make CGA more security conscious. 展开更多
关键词 IPV6 GCA SEND DoS attacks RSA SHA-1
在线阅读 下载PDF
High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution
11
作者 Murad Njoum Rossilawati Sulaiman +1 位作者 Zarina Shukur Faizan Qamar 《Computers, Materials & Continua》 SCIE EI 2024年第10期183-211,共29页
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data.This property makes it difficult for steganalysts’powerful data extrac... Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data.This property makes it difficult for steganalysts’powerful data extraction tools to detect the hidden data and ensures high-quality stego image generation.However,using a seed key to generate non-repeated sequential numbers takes a long time because it requires specific mathematical equations.In addition,these numbers may cluster in certain ranges.The hidden data in these clustered pixels will reduce the image quality,which steganalysis tools can detect.Therefore,this paper proposes a data structure that safeguards the steganographic model data and maintains the quality of the stego image.This paper employs the AdelsonVelsky and Landis(AVL)tree data structure algorithm to implement the randomization pixel selection technique for data concealment.The AVL tree algorithm provides several advantages for image steganography.Firstly,it ensures balanced tree structures,which leads to efficient data retrieval and insertion operations.Secondly,the self-balancing nature of AVL trees minimizes clustering by maintaining an even distribution of pixels,thereby preserving the stego image quality.The data structure employs the pixel indicator technique for Red,Green,and Blue(RGB)channel extraction.The green channel serves as the foundation for building a balanced binary tree.First,the sender identifies the colored cover image and secret data.The sender will use the two least significant bits(2-LSB)of RGB channels to conceal the data’s size and associated information.The next step is to create a balanced binary tree based on the green channel.Utilizing the channel pixel indicator on the LSB of the green channel,we can conceal bits in the 2-LSB of the red or blue channel.The first four levels of the data structure tree will mask the data size,while subsequent levels will conceal the remaining digits of secret data.After embedding the bits in the binary tree level by level,the model restores the AVL tree to create the stego image.Ultimately,the receiver receives this stego image through the public channel,enabling secret data recovery without stego or crypto keys.This method ensures that the stego image appears unsuspicious to potential attackers.Without an extraction algorithm,a third party cannot extract the original secret information from an intercepted stego image.Experimental results showed high levels of imperceptibility and security. 展开更多
关键词 Image steganography pixel random selection(PRS) AVL tree peak signal-to-noise ratio(PSNR) IMPERCEPTIBILITY capacity
在线阅读 下载PDF
Randomization Strategies in Image Steganography Techniques:A Review
12
作者 AFM Zainul Abadin Rossilawati Sulaiman Mohammad Kamrul Hasan 《Computers, Materials & Continua》 SCIE EI 2024年第8期3139-3171,共33页
Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into ... Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography. 展开更多
关键词 Information hiding image steganography randomized embedding techniques payload capacity IMPERCEPTIBILITY
在线阅读 下载PDF
Smart Anti-Pinch Window Simulation Using H_/H_(∞)Criterion and MOPSO
13
作者 Maedeh Mohammadi Azni Mohammad Ali Sadrnia +1 位作者 Shahab S.Band Zulkefli Bin Mansor 《Computers, Materials & Continua》 SCIE EI 2022年第7期215-226,共12页
Automobile power windows are mechanisms that can be opened and shut with the press of a button.Although these windows can comfort the effort of occupancy to move the window,failure to recognize the person’s body part... Automobile power windows are mechanisms that can be opened and shut with the press of a button.Although these windows can comfort the effort of occupancy to move the window,failure to recognize the person’s body part at the right time will result in damage and in some cases,loss of that part.An anti-pinch mechanism is an excellent choice to solve this problem,which detects the obstacle in the glass path immediately and moves it down.In this paper,an optimal solution H_/H_(∞)is presented for fault detection of the anti-pinch window system.The anti-pinch makes it possible to detect an obstacle and prevent damages through sampling parameters such as current consumption,the speed and the position of DC motors.In this research,a speed-based method is used to detect the obstacles.In order to secure the anti-pinch window,an optimal algorithm based on a fault detection observer is suggested.In the residual design,the proposed fault detection algorithm uses theDCmotor angular velocity rate.Robustness against disturbances and sensitivity to the faults are considered as an optimization problem based on Multi-Objective Particle Swarm Optimization algorithm.Finally,an optimal filter for solving the fault problem is designed using the H_/H_(∞)method.The results show that the simulated anti-pinch window is pretty sensitive to the fault,in the sense that it can detect the obstacle in 50 ms after the fault occurrence. 展开更多
关键词 H_/H_(∞) anti-pinch RESIDUAL fault detection multi-objective particle swarm optimization(MOPSO) multi-objective optimization automotive power windows electric windows
在线阅读 下载PDF
Propagation Characterization and Analysis for 5G mmWave Through Field Experiments
14
作者 Faizan Qamar Mhd Nour Hindia +3 位作者 Tharek Abd Rahman Rosilah Hassan Kaharudin Dimyati Quang Ngoc Nguyen 《Computers, Materials & Continua》 SCIE EI 2021年第8期2249-2264,共16页
The 5G network has been intensively investigated to realize the ongoing early deployment stage as an effort to match the exponential growth of the number of connected users and their increasing demands for high throug... The 5G network has been intensively investigated to realize the ongoing early deployment stage as an effort to match the exponential growth of the number of connected users and their increasing demands for high throughput,bandwidth with Quality of Service(QoS),and low latency.Given that most of the spectrums below 6 GHz are nearly used up,it is not feasible to employ the traditional spectrum,which is currently in use.Therefore,a promising and highly feasible effort to satisfy this insufficient frequency spectrum is to acquire new frequency bands for next-generation mobile communications.Toward this end,the primary effort has been focused on utilizing the millimeter-wave(mmWave)as the most promising candidate for the frequency spectrum.However,though the mmWave frequency band can fulfill the desired bandwidth requirements,it has been demonstrated to endure several issues like scattering,atmospheric absorption,fading,and especially penetration losses compared to the existing sub-6 GHz frequency band.Then,it is fundamental to optimize the mmWave band propagation channel to facilitate the practical 5G implementation for the network operators.Therefore,this study intends to investigate the outdoor channel characteristics of 26,28,36,and 38 GHz frequency bands for the communication infrastructure at the building to the ground floor in both Line of Sight(LOS)and Non-Line of Sight(NLOS)environments.The experimental campaign has studied the propagation path loss models such as Floating-Intercept(FI)and Close-In(CI)for the building to ground floor environment in LOS and NLOS scenarios.The findings obtained from the field experiments clearly show that the CI propagation model delivers much better performance in comparison with the FI model,thanks to its simple setup,accuracy,and precise function. 展开更多
关键词 5G mmWave propagation channel path loss channel characterization field experiment
在线阅读 下载PDF
Epithelial Layer Estimation Using Curvatures and Textural Features for Dysplastic Tissue Detection
15
作者 Afzan Adam Abdul Hadi Abd Rahman +3 位作者 Nor Samsiah Sani Zaid Abdi Alkareem Alyessari Nur Jumaadzan Zaleha Mamat Basela Hasan 《Computers, Materials & Continua》 SCIE EI 2021年第4期761-777,共17页
Boundary effect in digital pathology is a phenomenon where the tissue shapes of biopsy samples get distorted during the sampling process.The morphological pattern of an epithelial layer is greatly affected.Theoretical... Boundary effect in digital pathology is a phenomenon where the tissue shapes of biopsy samples get distorted during the sampling process.The morphological pattern of an epithelial layer is greatly affected.Theoretically,the shape deformation model can normalise the distortions,but it needs a 2D image.Curvatures theory,on the other hand,is not yet tested on digital pathology images.Therefore,this work proposed a curvature detection to reduce the boundary effects and estimates the epithelial layer.The boundary effect on the tissue surfaces is normalised using the frequency of a curve deviates from being a straight line.The epithelial layer’s depth is estimated from the tissue edges and the connected nucleolus only.Then,the textural and spatial features along the estimated layer are used for dysplastic tissue detection.The proposed method achieved better performance compared to the whole tissue regions in terms of detecting dysplastic tissue.The result shows a leap of kappa points from fair to a substantial agreement with the expert’s ground truth classification.The improved results demonstrate that curvatures have been effective in reducing the boundary effects on the epithelial layer of tissue.Thus,quantifying and classifying the morphological patterns for dysplasia can be automated.The textural and spatial features on the detected epithelial layer can capture the changes in tissue. 展开更多
关键词 Digital pathology grading dysplasia tissue boundary effect
在线阅读 下载PDF
MEC-IoT-Healthcare: Analysis and Prospects
16
作者 Hongyuan Wang Mohammed Dauwed +4 位作者 Imran Khan Nor Samsiah Sani Hasmila Amirah Omar Hirofumi Amano Samih M.Mostafa 《Computers, Materials & Continua》 SCIE EI 2023年第6期6219-6250,共32页
Physical sensors,intelligent sensors,and output recommenda-tions are all examples of smart health technology that can be used to monitor patients’health and change their behavior.Smart health is an Internet-of-Things... Physical sensors,intelligent sensors,and output recommenda-tions are all examples of smart health technology that can be used to monitor patients’health and change their behavior.Smart health is an Internet-of-Things(IoT)-aware network and sensing infrastructure that provides real-time,intelligent,and ubiquitous healthcare services.Because of the rapid development of cloud computing,as well as related technologies such as fog computing,smart health research is progressively moving in the right direction.Cloud,fog computing,IoT sensors,blockchain,privacy and security,and other related technologies have been the focus of smart health research in recent years.At the moment,the focus in cloud and smart health research is on how to use the cloud to solve the problem of enormous health data and enhance service performance,including cloud storage,retrieval,and calculation of health big data.This article reviews state-of-the-art edge computing methods that has shifted to the collection,transmission,and calculation of health data,which includes various sensors and wearable devices used to collect health data,various wireless sensor technologies,and how to process health data and improve edge performance,among other things.Finally,the typical smart health application cases,blockchain’s application in smart health,and related privacy and security issues were reviewed,as well as future difficulties and potential for smart health services.The comparative analysis provides a reference for the the mobile edge computing in healthcare systems. 展开更多
关键词 IOT mobile-edge computing cloud computing E-HEALTH
在线阅读 下载PDF
Development of Algorithm and System for Automatic Generation of Nursing Summaries from Nursing Care Plans
17
作者 Misao Miyagawa Yuko Yasuhara +3 位作者 Tetsuya Tanioka Hirokazu Ito Motoyuki Suzuki Rozzano Locsin 《Intelligent Information Management》 2014年第3期97-103,共7页
A nursing care planning system that automatically generated nursing summaries from information entered into the Psychiatric Outcome Management System (PSYCHOMS?, Tanioka et al.), was developed to enrich the content of... A nursing care planning system that automatically generated nursing summaries from information entered into the Psychiatric Outcome Management System (PSYCHOMS?, Tanioka et al.), was developed to enrich the content of nursing summaries at psychiatric hospitals, thereby reducing the workload of nurses. Preparing nursing summaries entails finding the required information in nursing records that span a long period of time and then concisely summarizing this information. This time consuming process depends on the clinical experience and writing ability of the nurse. The system described here automatically generates the text data needed for nursing summaries using an algorithm that synthesizes patient information recorded in electronic charts, the Nursing Care Plan information or the data entered for North American Nursing Diagnosis Association (NANDA) 13 domains with predetermined fixed phrases. Advantages of this system are that it enables nursing summaries to be generated automatically in real time, simplifies the process, and permits the standardization of useful nursing summaries that reflect the course of the nursing care provided and its evaluation. Use of this system to automatically generate nursing summaries will allow more nursing time to be devoted to patient care. The system is also useful because it enables nursing summaries that contain the required information to be generated regardless of who prepares them. 展开更多
关键词 NURSING SUMMARY Document NURSING CARE PLAN AUTOMATIC GENERATION PSYCHOMS
暂未订购
Data and Ensemble Machine Learning Fusion Based Intelligent Software Defect Prediction System
18
作者 Sagheer Abbas Shabib Aftab +3 位作者 Muhammad Adnan Khan Taher MGhazal Hussam Al Hamadi Chan Yeob Yeun 《Computers, Materials & Continua》 SCIE EI 2023年第6期6083-6100,共18页
The software engineering field has long focused on creating high-quality software despite limited resources.Detecting defects before the testing stage of software development can enable quality assurance engineers to ... The software engineering field has long focused on creating high-quality software despite limited resources.Detecting defects before the testing stage of software development can enable quality assurance engineers to con-centrate on problematic modules rather than all the modules.This approach can enhance the quality of the final product while lowering development costs.Identifying defective modules early on can allow for early corrections and ensure the timely delivery of a high-quality product that satisfies customers and instills greater confidence in the development team.This process is known as software defect prediction,and it can improve end-product quality while reducing the cost of testing and maintenance.This study proposes a software defect prediction system that utilizes data fusion,feature selection,and ensemble machine learning fusion techniques.A novel filter-based metric selection technique is proposed in the framework to select the optimum features.A three-step nested approach is presented for predicting defective modules to achieve high accuracy.In the first step,three supervised machine learning techniques,including Decision Tree,Support Vector Machines,and Naïve Bayes,are used to detect faulty modules.The second step involves integrating the predictive accuracy of these classification techniques through three ensemble machine-learning methods:Bagging,Voting,and Stacking.Finally,in the third step,a fuzzy logic technique is employed to integrate the predictive accuracy of the ensemble machine learning techniques.The experiments are performed on a fused software defect dataset to ensure that the developed fused ensemble model can perform effectively on diverse datasets.Five NASA datasets are integrated to create the fused dataset:MW1,PC1,PC3,PC4,and CM1.According to the results,the proposed system exhibited superior performance to other advanced techniques for predicting software defects,achieving a remarkable accuracy rate of 92.08%. 展开更多
关键词 Ensemble machine learning fusion software defect prediction fuzzy logic
在线阅读 下载PDF
Reliability Verification and Practical Effectiveness Evaluation of the Nursing Administration Analysis Formulae Based on PSYCHOMS^(■)
19
作者 Misao Miyagawa Kaori Katou +5 位作者 Yuko Yasuhara Kazuyuki Matsumoto Motoyuki Suzuki Takako Takebayashi Tetsuya Tanioka Rozzano Locsin 《Health》 2014年第21期3013-3021,共9页
In psychiatric hospitals, the ratios between patients versus physician and patients versus nurse are low as compared to those in general hospitals. Furthermore, usages of electronic medical records are also low so tha... In psychiatric hospitals, the ratios between patients versus physician and patients versus nurse are low as compared to those in general hospitals. Furthermore, usages of electronic medical records are also low so that nurse administrators are limited in their ability to compile, analyze, and generate patient care staffing information for their administrative use. Psychiatric nurse administrators anticipate the development of a nursing administration analysis system that could perform personnel data simulation, manage information on nursing staff, and manage ward/ practice operations. Responding to this situation, the authors developed a nursing administration analysis system utilizing formulae from the Psychiatric Outcome Management System, PSYCHOMS&reg;to aid nurse administrators. Such formulae are awaiting patent approval. The purpose of this study was to examine the validity of the formulae and the Structured Query Language (SQL) statement, and its practical effectiveness of analyzing data. The study findings showed that two kinds of computation expressions—a classification and extraction were able to display required information desired by nurse administrators. Moreover, significant information critical to assigning staff was validated to ensure high quality of nursing care according to the function and characteristic of the hospital ward. 展开更多
关键词 Analysis Formulae Nursing Administration Analysis Psychiatric Hospital PSYCHOMS^(■)
暂未订购
Enhancing Vehicle Overtaking System via LoRa-Enabled Vehicular Communication Approach
20
作者 Kwang Chee Seng Siti Fatimah Abdul Razak Sumendra Yogarayan 《Computer Systems Science & Engineering》 2025年第1期239-258,共20页
Vehicle overtaking poses significant risks and leads to injuries and losses on Malaysia’s roads.In most scenarios,insufficient and untimely information available to drivers for accessing road conditions and their sur... Vehicle overtaking poses significant risks and leads to injuries and losses on Malaysia’s roads.In most scenarios,insufficient and untimely information available to drivers for accessing road conditions and their surrounding environment is the primary factor that causes these incidents.To address these issues,a comprehensive system is required to provide real-time assistance to drivers.Building upon our previous research on a LoRa-based lane change decision-aid system,this study proposes an enhanced Vehicle Overtaking System(VOS).This system utilizes long-range(LoRa)communication for reliable real-time data exchange between vehicles(V2V)and the cloud(V2C).By providing drivers with critical information,including surrounding vehicle movements,through visual and audible warnings,the VOS aims to support vehicle overtaking decisions by calculating the safe distance between vehicles as per the Association of State Highway and Transportation Officials(AASHTO)guidelines.This study also examines the performance of LoRa communication strength and data transmission at various distances using a cloud monitoring tool or dashboard. 展开更多
关键词 Connected vehicle internet of things LoRa vehicle overtaking vehicle-to-cloud vehicle-to-vehicle V2V
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部