4,020 research outputs found

    An Optimized Medical Image Watermarking Approach for E-Health Applications

    Get PDF
    Background: In recent years, information and communication technologies have been widely used in the healthcare sector. This development enables E-Health applications to transmit medical data, as well as their sharing and remote access by healthcare professionals. However, due to their sensitivity, medical data in general, and medical images in particular, are vulnerable to a variety of illegitimate attacks. Therefore, suitable security and effective protection are necessary during transmission. Method: In consideration of these challenges, we put forth a security system relying on digital watermarking with the aim of ensuring the integrity and authenticity of medical images. The proposed approach is based on Integer Wavelet Transform as an embedding algorithm; furthermore, Particles Swarm Optimization was employed to select the optimal scaling factor, which allows the system to be compatible with different medical imaging modalities. Results: The experimental results demonstrate that the method provides a high imperceptibility and robustness for both secret watermark and watermarked images. In addition, the proposed scheme performs better for medical images compared with similar watermarking algorithms. Conclusion: As it is suitable for a lossless-data application, IWT is the best choice for medical images integrity. Furthermore, using the PSO algorithm enables the algorithm to be compatible with different medical imaging modalities

    Combining Blockchain and Swarm Robotics to Deploy Surveillance Missions

    Get PDF
    Current swarm robotics systems are not utilized as frequently in surveillance missions due to the limitations of the existing distributed systems\u27 designs. The main limitation of swarm robotics is the absence of a framework for robots to be self-governing, secure, and scalable. As of today, a swarm of robots is not able to communicate and perform tasks in transparent and autonomous ways. Many believe blockchain is the imminent future of distributed autonomous systems. A blockchain is a system of computers that stores and distributes data among all participants. Every single participant is a validator and protector of the data in the blockchain system. The data cannot be modified since all participants are storing and watching the same records. In this thesis, we will focus on blockchain applications in swarm robotics using Ethereum smart contracts because blockchain can make a swarm globally connected and secure. A decentralized application (DApp) is used to deploy surveillance missions. After mission deployment, the swarm uses blockchain to communicate and make decisions on appropriate tasks within Ethereum private networks. We set a test swarm robotics system and evaluate the blockchain for its performance, scalability, recoverability, and responsiveness. We conclude that, although blockchain enables a swarm to be globally connected and secure, there are performance limitations that can become a critical issue

    Adoption of vehicular ad hoc networking protocols by networked robots

    Get PDF
    This paper focuses on the utilization of wireless networking in the robotics domain. Many researchers have already equipped their robots with wireless communication capabilities, stimulated by the observation that multi-robot systems tend to have several advantages over their single-robot counterparts. Typically, this integration of wireless communication is tackled in a quite pragmatic manner, only a few authors presented novel Robotic Ad Hoc Network (RANET) protocols that were designed specifically with robotic use cases in mind. This is in sharp contrast with the domain of vehicular ad hoc networks (VANET). This observation is the starting point of this paper. If the results of previous efforts focusing on VANET protocols could be reused in the RANET domain, this could lead to rapid progress in the field of networked robots. To investigate this possibility, this paper provides a thorough overview of the related work in the domain of robotic and vehicular ad hoc networks. Based on this information, an exhaustive list of requirements is defined for both types. It is concluded that the most significant difference lies in the fact that VANET protocols are oriented towards low throughput messaging, while RANET protocols have to support high throughput media streaming as well. Although not always with equal importance, all other defined requirements are valid for both protocols. This leads to the conclusion that cross-fertilization between them is an appealing approach for future RANET research. To support such developments, this paper concludes with the definition of an appropriate working plan

    Deep learning cardiac motion analysis for human survival prediction

    Get PDF
    Motion analysis is used in computer vision to understand the behaviour of moving objects in sequences of images. Optimising the interpretation of dynamic biological systems requires accurate and precise motion tracking as well as efficient representations of high-dimensional motion trajectories so that these can be used for prediction tasks. Here we use image sequences of the heart, acquired using cardiac magnetic resonance imaging, to create time-resolved three-dimensional segmentations using a fully convolutional network trained on anatomical shape priors. This dense motion model formed the input to a supervised denoising autoencoder (4Dsurvival), which is a hybrid network consisting of an autoencoder that learns a task-specific latent code representation trained on observed outcome data, yielding a latent representation optimised for survival prediction. To handle right-censored survival outcomes, our network used a Cox partial likelihood loss function. In a study of 302 patients the predictive accuracy (quantified by Harrell's C-index) was significantly higher (p < .0001) for our model C=0.73 (95%\% CI: 0.68 - 0.78) than the human benchmark of C=0.59 (95%\% CI: 0.53 - 0.65). This work demonstrates how a complex computer vision task using high-dimensional medical image data can efficiently predict human survival

    Smart random neural network controller for HVAC using cloud computing technology

    Get PDF

    TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-based Intrusion Detection System

    Get PDF
    Intrusion detection systems (IDS) play a pivotal role in computer security by discovering and repealing malicious activities in computer networks. Anomaly-based IDS, in particular, rely on classification models trained using historical data to discover such malicious activities. In this paper, an improved IDS based on hybrid feature selection and two-level classifier ensembles is proposed. An hybrid feature selection technique comprising three methods, i.e. particle swarm optimization, ant colony algorithm, and genetic algorithm, is utilized to reduce the feature size of the training datasets (NSL-KDD and UNSW-NB15 are considered in this paper). Features are selected based on the classification performance of a reduced error pruning tree (REPT) classifier. Then, a two-level classifier ensembles based on two meta learners, i.e., rotation forest and bagging, is proposed. On the NSL-KDD dataset, the proposed classifier shows 85.8% accuracy, 86.8% sensitivity, and 88.0% detection rate, which remarkably outperform other classification techniques recently proposed in the literature. Results regarding the UNSW-NB15 dataset also improve the ones achieved by several state of the art techniques. Finally, to verify the results, a two-step statistical significance test is conducted. This is not usually considered by IDS research thus far and, therefore, adds value to the experimental results achieved by the proposed classifier

    Air Quality Prediction in Smart Cities Using Machine Learning Technologies Based on Sensor Data: A Review

    Get PDF
    The influence of machine learning technologies is rapidly increasing and penetrating almost in every field, and air pollution prediction is not being excluded from those fields. This paper covers the revision of the studies related to air pollution prediction using machine learning algorithms based on sensor data in the context of smart cities. Using the most popular databases and executing the corresponding filtration, the most relevant papers were selected. After thorough reviewing those papers, the main features were extracted, which served as a base to link and compare them to each other. As a result, we can conclude that: (1) instead of using simple machine learning techniques, currently, the authors apply advanced and sophisticated techniques, (2) China was the leading country in terms of a case study, (3) Particulate matter with diameter equal to 2.5 micrometers was the main prediction target, (4) in 41% of the publications the authors carried out the prediction for the next day, (5) 66% of the studies used data had an hourly rate, (6) 49% of the papers used open data and since 2016 it had a tendency to increase, and (7) for efficient air quality prediction it is important to consider the external factors such as weather conditions, spatial characteristics, and temporal features

    Bibliometric of Feature Selection Using Optimization Techniques in Healthcare using Scopus and Web of Science Databases

    Get PDF
    Feature selection technique is an important step in the prediction and classification process, primarily in data mining related aspects or related to medical field. Feature selection is immersive with the errand of choosing a subset of applicable features that could be utilized in developing a prototype. Medical datasets are huge in size; hence some effective optimization techniques are required to produce accurate results. Optimization algorithms are a critical function in medical data mining particularly in identifying diseases since it offers excellent effectiveness in minimum computational expense and time. The classification algorithms also produce superior outcomes when an objective function is built using the feature selection algorithm. The solitary motive of the research paper analysis is to comprehend the reach and utility of optimization algorithms such as the Genetic Algorithm (GA), the Particle Swarm Optimization (PSO) and the Ant Colony Optimization (ACO) in the field of Health care. The aim is to bring efficiency and maximum optimization in the health care sector using the vast information that is already available related to these fields. With the help of data sets that are available in the health care analysis, our focus is to extract the most important features using optimization techniques and work on different algorithms so as to get the most optimized result. Precision largely depends on usefulness of features that are taken into consideration along with finding useful patterns in those features to characterize the main problem. The Performance of the optimized algorithm finds the overall optimum with less function evaluation. The principle target of this examination is to optimize feature selection technique to bring an optimized and efficient model to cater to various health issues. In this research paper, to do bibliometric analysis Scopus and Web of Science databases are used. This bibliometric analysis considers important keywords, datasets, significance of the considered research papers. It also gives details about types, sources of publications, yearly publication trends, significant countries from Scopus and Web of Science. Also, it captures details about co-appearing keywords, authors, source titles through networked diagrams. In a way, this research paper can be useful to researchers who want to contribute in the area of feature selection and optimization in healthcare. From this research paper it is observed that there is a lot scope for research for the considered research area. This kind of research will also be helpful for analyzing pandemic scenarios like COVID-19
    • …
    corecore