Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 17 de 17
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Sci Rep ; 14(1): 11703, 2024 May 22.
Artigo em Inglês | MEDLINE | ID: mdl-38778085

RESUMO

Internet of Things (IoT) technology has revolutionized modern industrial sectors. Moreover, IoT technology has been incorporated within several vital domains of applicability. However, security is overlooked due to the limited resources of IoT devices. Intrusion detection methods are crucial for detecting attacks and responding adequately to every IoT attack. Conspicuously, the current study outlines a two-stage procedure for the determination and identification of intrusions. In the first stage, a binary classifier termed an Extra Tree (E-Tree) is used to analyze the flow of IoT data traffic within the network. In the second stage, an Ensemble Technique (ET) comprising of E-Tree, Deep Neural Network (DNN), and Random Forest (RF) examines the invasive events that have been identified. The proposed approach is validated for performance analysis. Specifically, Bot-IoT, CICIDS2018, NSL-KDD, and IoTID20 dataset were used for an in-depth performance assessment. Experimental results showed that the suggested strategy was more effective than existing machine learning methods. Specifically, the proposed technique registered enhanced statistical measures of accuracy, normalized accuracy, recall measure, and stability.

2.
Sensors (Basel) ; 23(24)2023 Dec 16.
Artigo em Inglês | MEDLINE | ID: mdl-38139716

RESUMO

The Internet of Things (IoT) technology has seen substantial research in Deep Learning (DL) techniques to detect cyberattacks. Critical Infrastructures (CIs) must be able to quickly detect cyberattacks close to edge devices in order to prevent service interruptions. DL approaches outperform shallow machine learning techniques in attack detection, giving them a viable alternative for use in intrusion detection. However, because of the massive amount of IoT data and the computational requirements for DL models, transmission overheads prevent the successful implementation of DL models closer to the devices. As they were not trained on pertinent IoT, current Intrusion Detection Systems (IDS) either use conventional techniques or are not intended for scattered edge-cloud deployment. A new edge-cloud-based IoT IDS is suggested to address these issues. It uses distributed processing to separate the dataset into subsets appropriate to different attack classes and performs attribute selection on time-series IoT data. Next, DL is used to train an attack detection Recurrent Neural Network, which consists of a Recurrent Neural Network (RNN) and Bidirectional Long Short-Term Memory (LSTM). The high-dimensional BoT-IoT dataset, which replicates massive amounts of genuine IoT attack traffic, is used to test the proposed model. Despite an 85 percent reduction in dataset size made achievable by attribute selection approaches, the attack detection capability was kept intact. The models built utilizing the smaller dataset demonstrated a higher recall rate (98.25%), F1-measure (99.12%), accuracy (99.56%), and precision (99.45%) with no loss in class discrimination performance compared to models trained on the entire attribute set. With the smaller attribute space, neither the RNN nor the Bi-LSTM models experienced underfitting or overfitting. The proposed DL-based IoT intrusion detection solution has the capability to scale efficiently in the face of large volumes of IoT data, thus making it an ideal candidate for edge-cloud deployment.

3.
Front Physiol ; 14: 1143249, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-37064899

RESUMO

The new coronavirus that produced the pandemic known as COVID-19 has been going across the world for a while. Nearly every area of development has been impacted by COVID-19. There is an urgent need for improvement in the healthcare system. However, this contagious illness can be controlled by appropriately donning a facial mask. If people keep a strong social distance and wear face masks, COVID-19 can be controlled. A method for detecting these violations is proposed in this paper. These infractions include failing to wear a facemask and failing to maintain social distancing. To train a deep learning architecture, a dataset compiled from several sources is used. To compute the distance between two people in a particular area and also predicts the people wearing and not wearing the mask, The proposed system makes use of YOLOv3 architecture and computer vision. The goal of this research is to provide valuable tool for reducing the transmission of this contagious disease in various environments, including streets and supermarkets. The proposed system is evaluated using the COCO dataset. It is evident from the experimental analysis that the proposed system performs well in predicting the people wearing the mask because it has acquired an accuracy of 99.2% and an F1-score of 0.99.

4.
Comput Intell Neurosci ; 2022: 9283293, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-36177311

RESUMO

During the last few decades, the quality of water has deteriorated significantly due to pollution and many other issues. As a consequence of this, there is a need for a model that can make accurate projections about water quality. This work shows the comparative analysis of different machine learning approaches like Support Vector Machine (SVM), Decision Tree (DT), Random Forest, Gradient Boost, and Ada Boost, used for the water quality classification. The model is trained on the Water Quality Index dataset available on Kaggle. Z-score is used to normalize the dataset before beginning the training process for the model. Because the given dataset is unbalanced, Synthetic Minority Oversampling Technique (SMOTE) is used to balance the dataset. Experiments results depict that Random Forest and Gradient Boost give the highest accuracy of 81%. One of the major issues with the machine learning model is lack of transparency which makes it impossible to evaluate the results of the model. To address this issue, explainable AI (XAI) is used which assists us in determining which features are the most important. Within the context of this investigation, Local Interpretable Model-agnostic Explanations (LIME) is utilized to ascertain the significance of the features.


Assuntos
Aprendizado de Máquina , Máquina de Vetores de Suporte , Previsões
5.
Comput Intell Neurosci ; 2022: 8334927, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-36172314

RESUMO

Capital structure is an integral part of the corporate finance that sources the funds to finance growth and operations. Managers always have to maintain value of the firm to be higher than the cost of capital in order to maximize the shareholders wealth. Empirical studies have used sources of finance like debt and equity as variables of capital structure. A choice between debt and equity finance analyzes the firm's ability to perform under the financially constrained environment to attain the sustainable growth. Therefore, it gives rise to a dire need to estimate the cost of capital precisely. We examined the capital structure of top ten market capitalization of the stock markets included in MSCI Emerging index with the use of artificial neural networks, support vector regression, and linear regression in forecasting methods. The capital structure is measured as the proportion of total debt over total equity (Tang et al., 1991). Other financial ratios such as profitability, liquidity, solvent, and turnover ratios were considered as drivers of the capital structure. Applying logistic and hyperbolic tangent activation functions, it was concluded that ANN has a great potential of replacing other traditional forecasting models with the nonstationary data. This research contributes with a new dimension for estimation through different activation functions. There is a possibility of ANN dominance as compared to the other models applied for predictability in financial markets.


Assuntos
Administração Financeira , Máquina de Vetores de Suporte , Redes Neurais de Computação , Solventes
6.
Comput Intell Neurosci ; 2022: 6872045, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35990113

RESUMO

Image segmentation and computer vision are becoming more important in computer-aided design. A computer algorithm extracts image borders, colours, and textures. It also depletes resources. Technical knowledge is required to extract information about distinctive features. There is currently no medical picture segmentation or recognition software available. The proposed model has 13 layers and uses dilated convolution and max-pooling to extract small features. Ghost model deletes the duplicated features, makes the process easier, and reduces the complexity. The Convolution Neural Network (CNN) generates a feature vector map and improves the accuracy of area or bounding box proposals. Restructuring is required for healing. As a result, convolutional neural networks segment medical images. It is possible to acquire the beginning region of a segmented medical image. The proposed model gives better results as compared to the traditional models, it gives an accuracy of 96.05, Precision 98.2, and recall 95.78. The first findings are improved by thickening and categorising the image's pixels. Morphological techniques may be used to segment medical images. Experiments demonstrate that the recommended segmentation strategy is effective. This study rethinks medical image segmentation methods.


Assuntos
Aprendizado Profundo , Processamento de Imagem Assistida por Computador , Algoritmos , Processamento de Imagem Assistida por Computador/métodos , Redes Neurais de Computação , Software
7.
Comput Intell Neurosci ; 2022: 8470496, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35665301

RESUMO

A flood is defined as a surplus of water or sludge on parched soil, and a flood has originated through the runoff of water inside the water route from the various water sources like canals, etc. Intense rainfall, deforestation, urbanization, deprived water and sewerage administration, and lack of concentration toward the environment of the hydrological scheme have been the causes of urban flooding. In addition, there is a deficiency in flood assessment due to the impediment in getting data on floods to the control room from the flood-affected area. To diminish the possessions due to flooding, there ought to be an immediate move of captured statistics as of the hectic region en route to the observation room with no further wait for a completely fledged technique in the wireless settings data from the Internet of Things (IoT). The Internet of Everything (IoE) is a concept that extends the Internet of Things. In view of the fact that the wireless nodes are changeable in their environment, those effects lead to unsteadiness and uncertainty in information distribution. Therefore, there is a requirement for flood-predictable region data that may be exaggerated between the source and the control room. In the past, there were a lot of techniques set up and put into practice intended for keeping an eye on the flood spots. However, one of the biggest challenges is to have data sharing without delay and loss of data among source and destination nodes. In addition to that, the video quality also needs to be taken into consideration at the same time in receipt, as it is a tough task to determine and preplan the flood happenings completely from the normal disaster that makes scientific complicatedness more than the information being received in a wireless ad-hoc environment using IoT-based sensors. Considering all the abovementioned reasons, the proposed work comprises of three folded goals, namely, the design of a mobile ad-hoc flooding environment, the development of an urban flood high definition video surveillance system using IoT-based sensors, and experimental work on simulation.


Assuntos
Inundações , Chuva , Computação em Nuvem , Internet , Água
8.
Comput Intell Neurosci ; 2022: 8516928, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35720903

RESUMO

As a result of their natural capacity to recover harmonic current and reactive power from alternating current sources, power electronic devices utilized in conjunction with nonlinear loads have the potential to generate significant harmonic problems within the power system when employed in this way. When this occurs, voltage instability occurs, which must be avoided in order to maintain the consistency and dependability of the power system's power flow. With this approach, the series controller has been replaced by a multilevel modular controller in order to improve power handling capability and achieve higher modular levels with minimal distortions. The shunt compensator is the most effective way to achieve an extremely protected energy system as well as righteous steadiness in electric potential difference under a variety of load constraints. The DQ thesis is employed in this proposed converter to separate the harmonic components by establishing reference frame current, which is accomplished by machine learning techniques. As part of the constant mode operation, the PI controller contributes to maintaining the direct current-potential difference, which is given to the PWM generator. Optimization of the values of K p and K i is accomplished by the use of particle swarm optimization (PSO). The construction of this power system simulation model has been made feasible by the use of time-fluctuating characteristics modeling and the MATLAB programming environment. The new (unified power flow controller) UPFC research that has been made available is persuasive in its capacity to reduce distortions and watt-less power components while simultaneously enhancing efficiency and reducing costs.

9.
Comput Intell Neurosci ; 2022: 9737511, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35528349

RESUMO

The brain is the most complex organ in the human body, and it is also the most complex organ in the whole biological system, making it the most complex organ on the planet. According to the findings of current studies, modern study that properly characterises the EEG data signal provides a clear classification accuracy of human activities which is distinct from previous research. Various brain wave patterns related to common activities such as sleeping, reading, and watching a movie may be found in the Electroencephalography (EEG) data that has been collected. As a consequence of these activities, we accumulate numerous sorts of emotion signals in our brains, including the Delta, Theta, and Alpha bands. These bands will provide different types of emotion signals in our brain as a result of these activities. As a consequence of the nonstationary nature of EEG recordings, time-frequency-domain techniques, on the other hand, are more likely to provide good findings. The ability to identify different neural rhythm scales using time-frequency representation has also been shown to be a legitimate EEG marker; this ability has also been demonstrated to be a powerful tool for investigating small-scale neural brain oscillations. This paper presents the first time that a frequency analysis of EEG dynamics has been undertaken. An augmenting decomposition consisting of the "Versatile Inspiring Wavelet Transform" and the "Adaptive Wavelet Transform" is used in conjunction with the EEG rhythms that were gathered to provide adequate temporal and spectral resolutions. Children's wearable sensors are being used to collect data from a number of sources, including the Internet. The signal is conveyed over the Internet of Things (IoT). Specifically, the suggested approach is assessed on two EEG datasets, one of which was obtained in a noisy (i.e., nonshielded) environment and the other was recorded in a shielded environment. The results illustrate the resilience of the proposed training strategy. Therefore, our method contributes to the identification of specific brain activity in children who are taking part in the research as a result of their participation. On the basis of several parameters such as filtering response, accuracy, precision, recall, and F-measure, the MATLAB simulation software was used to evaluate the performance of the proposed system.


Assuntos
Internet das Coisas , Dispositivos Eletrônicos Vestíveis , Acústica , Algoritmos , Criança , Saúde da Criança , Eletroencefalografia/métodos , Humanos , Vocabulário
10.
Comput Intell Neurosci ; 2022: 1410448, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35586099

RESUMO

Artificial intelligence is an emerging technology that revolutionizes human lives. Despite the fact that this technology is used in higher education, many professors are unaware of it. In this current scenario, there is a huge need to arise, implement information bridge technology, and enhance communication in the classroom. Through this paper, the authors try to predict the future of higher education with the help of artificial intelligence. This research article throws light on the current education system the problems faced by the subject faculties, students, changing government rules, and regulations in the educational sector. Various arguments and challenges on the implementation of artificial intelligence are prevailing in the educational sector. In this concern, we have built a use case model by using a student assessment data of our students and then built a synthesized using generative adversarial network (GAN). The dataset analyzed, visualized, and fed to different machine learning algorithms such as logistic Regression (LR), linear discriminant analysis (LDA), K-nearest neighbors (KNN), classification and regression trees (CART), naive Bayes (NB), support vector machines (SVM), and finally random forest (RF) algorithm and achieved a maximum accuracy of 58%. This article aims to bridge the gap between human lecturers and the machine. We are also concerned about the psychological emotions of the faculty and the students when artificial intelligence takes control.


Assuntos
Inteligência Artificial , Aprendizado de Máquina , Algoritmos , Teorema de Bayes , Humanos , Máquina de Vetores de Suporte
11.
Artif Intell Med ; 127: 102288, 2022 05.
Artigo em Inglês | MEDLINE | ID: mdl-35430039

RESUMO

COVID-19 is a life-threatening contagious virus that has spread across the globe rapidly. To reduce the outbreak impact of COVID-19 virus illness, continual identification and remote surveillance of patients are essential. Medical service delivery based on the Internet of Things (IoT) technology backed up by the fog-cloud paradigm is an efficient and time-sensitive solution for remote patient surveillance. Conspicuously, a comprehensive framework based on Radio Frequency Identification Device (RFID) and body-wearable sensor technologies supported by the fog-cloud platform is proposed for the identification and management of COVID-19 patients. The J48 decision tree is used to assess the infection degree of the user based on corresponding symptoms. RFID is used to detect Temporal Proximity Interactions (TPI) among users. Using TPI quantification, Temporal Network Analysis is used to analyze and track the current stage of the COVID-19 spread. The statistical performance and accuracy of the framework are assessed by utilizing synthetically-generated data for 250,000 users. Based on the comparative analysis, the proposed framework acquired an enhanced measure of classification accuracy, and sensitivity of 96.68% and 94.65% respectively. Moreover, significant improvement has been registered for proposed fog-cloud-based data analysis in terms of Temporal Delay efficacy, Precision, and F-measure.


Assuntos
COVID-19 , Internet das Coisas , Dispositivos Eletrônicos Vestíveis , Inteligência Artificial , COVID-19/epidemiologia , Humanos
12.
Sensors (Basel) ; 22(7)2022 Mar 29.
Artigo em Inglês | MEDLINE | ID: mdl-35408244

RESUMO

Drone advancements have ushered in new trends and possibilities in a variety of sectors, particularly for small-sized drones. Drones provide navigational interlocation services, which are made possible by the Internet of Things (IoT). Drone networks, on the other hand, are subject to privacy and security risks due to design flaws. To achieve the desired performance, it is necessary to create a protected network. The goal of the current study is to look at recent privacy and security concerns influencing the network of drones (NoD). The current research emphasizes the importance of a security-empowered drone network to prevent interception and intrusion. A hybrid ML technique of logistic regression and random forest is used for the purpose of classification of data instances for maximal efficacy. By incorporating sophisticated artificial-intelligence-inspired techniques into the framework of a NoD, the proposed technique mitigates cybersecurity vulnerabilities while making the NoD protected and secure. For validation purposes, the suggested technique is tested against a challenging dataset, registering enhanced performance results in terms of temporal efficacy (34.56 s), statistical measures (precision (97.68%), accuracy (98.58%), recall (98.59%), F-measure (99.01%), reliability (94.69%), and stability (0.73).


Assuntos
Internet das Coisas , Segurança Computacional , Aprendizado de Máquina , Reprodutibilidade dos Testes , Dispositivos Aéreos não Tripulados
13.
J Healthc Eng ; 2022: 8928021, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35251581

RESUMO

Epileptic patients suffer from an epileptic brain seizure caused by the temporary and unpredicted electrical interruption. Conventionally, the electroencephalogram (EEG) signals are manually studied by medical practitioners as it records the electrical activities from the brain. This technique consumes a lot of time, and the outputs are unreliable. In a bid to address this problem, a new structure for detecting an epileptic seizure is proposed in this study. The EEG signals obtained from the University of Bonn, Germany, and real-time medical records from the Senthil Multispecialty Hospital, India, were used. These signals were disintegrated into six frequency subbands that employed discrete wavelet transform (DWT) and extracted twelve statistical functions. In particular, seven best features were identified and further fed into k-Nearest Neighbor (kNN), naïve Bayes, Support Vector Machine (SVM), and Decision Tree classifiers for two-type and three-type classifications. Six statistical parameters were employed to measure the performance of these classifications. It has been found that different combinations of features and classifiers produce different results. Overall, the study is a first attempt to find the best combination feature set and classifier for 16 different 2-class and 3-class classification challenges of the Bonn and Senthil real-time clinical dataset.


Assuntos
Epilepsia , Processamento de Sinais Assistido por Computador , Algoritmos , Teorema de Bayes , Eletroencefalografia/métodos , Epilepsia/diagnóstico , Humanos , Convulsões , Máquina de Vetores de Suporte
14.
Comput Intell Neurosci ; 2022: 7969389, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35281196

RESUMO

Sleep apnea is a serious sleep disorder that occurs when a person's breathing is interrupted during sleep. People with untreated sleep apnea stop breathing repeatedly during their sleep. This study provides an empirical analysis of apnea syndrome using the AI-based Granger panel model approach. Data were collected from the MIT-BIH polysomnographic database (SLPDB). The panel is composed of eighteen patients, while the implementation was done using MATLAB software. The results show that, for the eighteen patients with sleep apnea, there was a significant relationship between ECG-blood pressure (BP), ECG-EEG, and EEG-blood pressure (BP). The study concludes that the long-term interaction between physiological signals can help the physician to understand the risks associated with these interactions. The study would assist physicians to understand the mechanisms underlying obstructive sleep apnea early and also to select the right treatment for the patients by leveraging the potential of artificial intelligence. The researchers were motivated by the need to reduce the morbidity and mortality arising from sleep apnea using AI-enabled technology.


Assuntos
Síndromes da Apneia do Sono , Apneia Obstrutiva do Sono , Inteligência Artificial , Humanos , Sono , Síndromes da Apneia do Sono/diagnóstico , Apneia Obstrutiva do Sono/diagnóstico
15.
Comput Intell Neurosci ; 2022: 8421434, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-36911247

RESUMO

A significant study has been undertaken in the areas of health care and administration of cutting-edge artificial intelligence (AI) technologies throughout the previous decade. Healthcare professionals studied smart gadgets and other medical technologies, along with the AI-based Internet of Things (IoT) (AIoT). Connecting the two regions makes sense in terms of improving care for rural and isolated resident individuals. The healthcare industry has made tremendous strides in efficiency, affordability, and usefulness as a result of new research options and major cost reductions. This includes instructions (AIoT-based) medical advancements can be both beneficial and detrimental. While the IoT concept undoubtedly offers a number of benefits, it also poses fundamental security and privacy concerns regarding medical data. However, resource-constrained AIoT devices are vulnerable to a number of assaults, which can significantly impair their performance. Cryptographic algorithms used in the past are inadequate for safeguarding IoT-enabled networks, presenting substantial security risks. The AIoT is made up of three layers: perception, network, and application, all of which are vulnerable to security threats. These threats can be aggressive or passive in nature, and they can originate both within and outside the network. Numerous IoT security issues, including replay, sniffing, and eavesdropping, have the ability to obstruct network communication. The AIoT-H application is likely to be explored in this research article due to its potential to aid with existing and different technologies, as well as bring useful solutions to healthcare security challenges. Additionally, every day, several potential problems and inconsistencies with the AIoT-H technique have been discovered.


Assuntos
Inteligência Artificial , Segurança Computacional , Humanos , Atenção à Saúde , Algoritmos , Privacidade
16.
J Supercomput ; 78(2): 1783-1806, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-34177116

RESUMO

Rapid communication of viral sicknesses is an arising public medical issue across the globe. Out of these, COVID-19 is viewed as the most critical and novel infection nowadays. The current investigation gives an effective framework for the monitoring and prediction of COVID-19 virus infection (C-19VI). To the best of our knowledge, no research work is focused on incorporating IoT technology for C-19 outspread over spatial-temporal patterns. Moreover, limited work has been done in the direction of prediction of C-19 in humans for controlling the spread of COVID-19. The proposed framework includes a four-level architecture for the expectation and avoidance of COVID-19 contamination. The presented model comprises COVID-19 Data Collection (C-19DC) level, COVID-19 Information Classification (C-19IC) level, COVID-19-Mining and Extraction (C-19ME) level, and COVID-19 Prediction and Decision Modeling (C-19PDM) level. Specifically, the presented model is used to empower a person/community to intermittently screen COVID-19 Fever Measure (C-19FM) and forecast it so that proactive measures are taken in advance. Additionally, for prescient purposes, the probabilistic examination of C-19VI is quantified as degree of membership, which is cumulatively characterized as a COVID-19 Fever Measure (C-19FM). Moreover, the prediction is realized utilizing the temporal recurrent neural network. Additionally, based on the self-organized mapping technique, the presence of C-19VI is determined over a geographical area. Simulation is performed over four challenging datasets. In contrast to other strategies, altogether improved outcomes in terms of classification efficiency, prediction viability, and reliability were registered for the introduced model.

17.
Math Biosci Eng ; 18(6): 8298-8313, 2021 Sep 22.
Artigo em Inglês | MEDLINE | ID: mdl-34814300

RESUMO

Industrial Cyber-Physical Systems (CPSs) require flexible and tolerant communication networks to overcome commonly occurring security problems and denial-of-service such as links failure and networks congestion that might be due to direct or indirect network attacks. In this work, we take advantage of Software-defined networking (SDN) as an important networking paradigm that provide real-time fault resilience since it is capable of global network visibility and programmability. We consider OpenFlow as an SDN protocol that enables interaction between the SDN controller and forwarding plane of network devices. We employ multiple machine learning algorithms to enhance the decision making in the SDN controller. Integrating machine learning with network resilience solutions can effectively address the challenge of predicting and classifying network traffic and thus, providing real-time network resilience and higher security level. The aim is to address network resilience by proposing an intelligent recommender system that recommends paths in real-time based on predicting link failures and network congestions. We use statistical data of the network such as link propagation delay, the number of packets/bytes received and transmitted by each OpenFlow switch on a specific port. Different state-of-art machine learning models has been implemented such as logistic regression, K-nearest neighbors, support vector machine, and decision tree to train these models in normal state, links failure and congestion conditions. The models are evaluated on the Mininet emulation testbed and provide accuracies ranging from around 91-99% on the test data. The machine learning model with the highest accuracy is utilized in the intelligent recommender system of the SDN controller which helps in selecting resilient paths to achieve a better security and quality-of-service in the network. This real-time recommender system helps the controller to take reactive measures to improve network resilience and security by avoiding faulty paths during path discovery and establishment.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA