Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 4 de 4
Filtrar
Mais filtros

Base de dados
Ano de publicação
Tipo de documento
Intervalo de ano de publicação
1.
Sensors (Basel) ; 16(5)2016 05 16.
Artigo em Inglês | MEDLINE | ID: mdl-27196906

RESUMO

In recent years, indoor positioning has emerged as a critical function in many end-user applications; including military, civilian, disaster relief and peacekeeping missions. In comparison with outdoor environments, sensing location information in indoor environments requires a higher precision and is a more challenging task in part because various objects reflect and disperse signals. Ultra WideBand (UWB) is an emerging technology in the field of indoor positioning that has shown better performance compared to others. In order to set the stage for this work, we provide a survey of the state-of-the-art technologies in indoor positioning, followed by a detailed comparative analysis of UWB positioning technologies. We also provide an analysis of strengths, weaknesses, opportunities, and threats (SWOT) to analyze the present state of UWB positioning technologies. While SWOT is not a quantitative approach, it helps in assessing the real status and in revealing the potential of UWB positioning to effectively address the indoor positioning problem. Unlike previous studies, this paper presents new taxonomies, reviews some major recent advances, and argues for further exploration by the research community of this challenging problem space.

2.
Comput Intell Neurosci ; 2022: 3304333, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35242177

RESUMO

Technology affects almost every aspect of life and is constantly changing. Digital communication technology has made it easier and faster to connect people all over the world. Digital technology is used in varies fields, including business, industries, companies, and educational institutions. There are various benefits of technology; it is also associated with a number of risks and dangerous threats known as cybercrimes. Cybercrime is a criminal activity that targets digital technology, like a computer, a computer network, or a mobile device. Cybersecurity is the way we reduce the risk of becoming a victim of cybercrime. Cybersecurity is the process of defending against cyberattacks. By using these concepts, we investigated the interval-valued complex T-spherical fuzzy relations (IVCT-spherical-FRs) introduced in this paper. We studied the relationships between different types of cybersecurity and the sources of cyberattacks. Furthermore, the Hasse diagram for the interval-valued complex T-spherical partial order set and relation is developed. The concepts of Hasse diagram are being used to examine various cybersecurity techniques and practices. The most effective method is identified using the features of Hasse diagrams. Finally, comparison tests are used to demonstrate the benefits of the proposed methods.


Assuntos
Comunicação , Segurança Computacional , Humanos
3.
Appl Bionics Biomech ; 2022: 7931729, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35154378

RESUMO

Recent advances in image processing and machine learning methods have greatly enhanced the ability of object classification from images and videos in different applications. Classification of human activities is one of the emerging research areas in the field of computer vision. It can be used in several applications including medical informatics, surveillance, human computer interaction, and task monitoring. In the medical and healthcare field, the classification of patients' activities is important for providing the required information to doctors and physicians for medication reactions and diagnosis. Nowadays, some research approaches to recognize human activity from videos and images have been proposed using machine learning (ML) and soft computational algorithms. However, advanced computer vision methods are still considered promising development directions for developing human activity classification approach from a sequence of video frames. This paper proposes an effective automated approach using feature fusion and ML methods. It consists of five steps, which are the preprocessing, feature extraction, feature selection, feature fusion, and classification steps. Two available public benchmark datasets are utilized to train, validate, and test ML classifiers of the developed approach. The experimental results of this research work show that the accuracies achieved are 99.5% and 99.9% on the first and second datasets, respectively. Compared with many existing related approaches, the proposed approach attained high performance results in terms of sensitivity, accuracy, precision, and specificity evaluation metric.

4.
Comput Math Methods Med ; 2022: 5137513, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35190751

RESUMO

Internet of Things (IoT) with deep learning (DL) is drastically growing and plays a significant role in many applications, including medical and healthcare systems. It can help users in this field get an advantage in terms of enhanced touchless authentication, especially in spreading infectious diseases like coronavirus disease 2019 (COVID-19). Even though there is a number of available security systems, they suffer from one or more of issues, such as identity fraud, loss of keys and passwords, or spreading diseases through touch authentication tools. To overcome these issues, IoT-based intelligent control medical authentication systems using DL models are proposed to enhance the security factor of medical and healthcare places effectively. This work applies IoT with DL models to recognize human faces for authentication in smart control medical systems. We use Raspberry Pi (RPi) because it has low cost and acts as the main controller in this system. The installation of a smart control system using general-purpose input/output (GPIO) pins of RPi also enhanced the antitheft for smart locks, and the RPi is connected to smart doors. For user authentication, a camera module is used to capture the face image and compare them with database images for getting access. The proposed approach performs face detection using the Haar cascade techniques, while for face recognition, the system comprises the following steps. The first step is the facial feature extraction step, which is done using the pretrained CNN models (ResNet-50 and VGG-16) along with linear binary pattern histogram (LBPH) algorithm. The second step is the classification step which can be done using a support vector machine (SVM) classifier. Only classified face as genuine leads to unlock the door; otherwise, the door is locked, and the system sends a notification email to the home/medical place with detected face images and stores the detected person name and time information on the SQL database. The comparative study of this work shows that the approach achieved 99.56% accuracy compared with some different related methods.


Assuntos
Reconhecimento Facial Automatizado , Aprendizado Profundo , Internet das Coisas , Algoritmos , COVID-19 , Segurança Computacional , Simulação por Computador , Bases de Dados Factuais , Desenho de Equipamento , Humanos , Reconhecimento Automatizado de Padrão , SARS-CoV-2 , Máquina de Vetores de Suporte
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA