1,131 Hits in 8.2 sec

ReportFlow: an application for EEG visualization and reporting using cloud platform

S. Bertuccio, G. Tardiolo, F. M. Giambò, G. Giuffrè, R. Muratore, C. Settimo, A. Raffa, S. Rigano, A. Bramanti, N. Muscarà, M. C. De Cola
2021 BMC Medical Informatics and Decision Making  
Methods We illustrate the functioning of this application through a use-case scenario occurring in an Italian hospital, and describe the corresponding key encryption and key management used for data security  ...  the number of neurophysiologic examinations performed (about 20%), guaranteeing data integrity and security.  ...  As several prediction data mining techniques used to support healthcare decision-making [7] , EEG signal processing integrated with computational algorithms based on machine learning methods may contribute  ... 
doi:10.1186/s12911-020-01369-7 pmid:33407445 fatcat:2d2jepychzg6xok7dtwhhxfmra

IEEE Access Special Section Editorial: Artificial Intelligence and Cognitive Computing for Communication and Network

Yin Zhang, Giancarlo Fortino, Limei Peng, Iztok Humar, Jianshan Sun
2020 IEEE Access  
, e.g., statistical learning, feedforward neural networks, deep recurrent neural networks, etc., for complicated decision making, network management, resource optimization, and in-depth knowledge discovery  ...  Furthermore, communications and network ecosystems must be upgraded with new capabilities such as machine learning, data analytics, and cognitive power for providing human intelligence.  ...  In the article, ''An adaptive collection scheme-based matrix completion for data gathering in energy-harvesting wireless sensor networks,'' Tan et al. propose an adaptive collection scheme based on matrix  ... 
doi:10.1109/access.2020.3014475 fatcat:z3xpk3x7ofhjbf7vmj2glozx6y

Towards an Efficient Federated Cloud Service Selection to Support Workflow Big Data Requirements

Mohamed Adel Serhani, Hadeel Al Kassabi, Ikbal Taleb
2018 Advances in Science, Technology and Engineering Systems  
Cloud Computing is considered nowadays an attractive solution to serve the Big Data storage, processing, and analytics needs.  ...  Our proposed selection scheme is performed throughout three phases: 1) capture Big Data workflow requirements using a Big Data task profile and map these to a set of QoS attributes, and prioritize cloud  ...  A CSP ranking model was proposed in [22] based on user experience, and service quality using an intuitionistic fuzzy group decision making for both quantifiable and nonquantifiable quality attributes  ... 
doi:10.25046/aj030529 fatcat:72evpy5x5jbuvpe2c4m52lcgsa


Srikanta Patnaik, Srikanta Patnaik
2018 Journal of Intelligent & Fuzzy Systems  
Next paper titled, "A security-aware data replica placement strategy based on fuzzy evaluation in the cloud" by Wu Xiuguo proposed an intelligent solution for enhancement of cloud storage system performance  ...  The next paper entitled "An Integrated Method based on Hesitant Fuzzy Theory and RFM Model to Insurance Customers' Segmentation and Lifetime Value Determination" by Yan Chun, and et al. integrates the  ... 
doi:10.3233/jifs-169562 fatcat:2qknpgafxjdaza2ppepzpwxreu

The Duo of Artificial Intelligence and Big Data for Industry 4.0: Review of Applications, Techniques, Challenges, and Future Research Directions [article]

Senthil Kumar Jagatheesaperumal, Mohamed Rahouti, Kashif Ahmad, Ala Al-Fuqaha, Mohsen Guizani
2021 arXiv   pre-print
We also highlight key challenges in a successful deployment of AI and Big Data methods in smart industries with a particular emphasis on data-related issues, such as availability, bias, auditing, management  ...  The increasing need for economic, safe, and sustainable smart manufacturing combined with novel technological enablers, has paved the way for Artificial Intelligence (AI) and Big Data in support of smart  ...  ACKNOWLEDGMENT The authors gratefully acknowledge the Management, and Faculty of Mepco Schlenk Engineering College, Sivakasi, India for their support and extending necessary facilities to carry out this  ... 
arXiv:2104.02425v2 fatcat:r25gug6wmrbyjnreiewprdvqpa

IEEE Access Special Section Editorial: Data Mining for Internet of Things

Chun-Wei Tsai, Mu-Yen Chen, Francesco Piccialli, Tie Qiu, Jason J. Jung, Patrick C. K. Hung, Sherali Zeadally
2021 IEEE Access  
Analysis of vehicle network architecture and performance optimization based on soft definition of integration of cloud and fog,'' by Zhou and Zhu; ''Design of traffic emergency response system based on  ...  Another main research direction in this topic is in the electroencephalography (EEG) data analysis, which can be found in the articles ''A WPCA-based method for detecting fatigue driving from EEG-based  ... 
doi:10.1109/access.2021.3090137 fatcat:cnleukmukfgexmkwx7tino2k5y

A Multimodal Deep Log-Based User Experience (UX) Platform for UX Evaluation

Jamil Hussain, Wajahat Ali Khan, Taeho Hur, Hafiz Syed Muhammad Bilal, Jaehun Bang, Anees Ul Hassan, Muhammad Afzal, Sungyoung Lee
2018 Sensors  
The user experience (UX) is an emerging field in user research and design, and the development of UX evaluation methods presents a challenge for both researchers and practitioners.  ...  However, this approach requires skilled UX researchers and developers to integrate multiple devices, synchronize them, analyze the data, and ultimately produce an informed decision.  ...  The Lean UX toolkit evaluates the product with respect to momentary, episodic, and cumulative UX based on the study design.  ... 
doi:10.3390/s18051622 pmid:29783712 pmcid:PMC5982399 fatcat:wltrwcuyfzebzjes5yhuo5msnm

Soft computing and intelligent systems: Techniques and applications

Sabu M. Thampi, El-Sayed M. El-Alfy, Sushmita Mitra, Ljiljana Trajkovic, Sabu M. Thampi, El-Sayed M. El-Alfy, Sushmita Mitra, Ljiljana Trajkovic
2018 Journal of Intelligent & Fuzzy Systems  
In [5] , the authors propose a data-driven intrusion detection system for Industrial Internet of Things (IIoT) to hybridize both anomaly and specification-based schemes.  ...  For preserving data confidentiality, the client employs few linear transformation schemes. The proposed verification scheme helps to maintain the integrity of the computed result.  ...  Another important area in decision making are the recommendation systems that provide suggestions based on previous usage behaviour.  ... 
doi:10.3233/jifs-169420 fatcat:cm65pxnfxffatckhhgsbfw2vje

A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems [article]

Aditya Sundararajan, Arif I. Sarwat, Alexander Pons
2019 arXiv   pre-print
It further discusses how these factors affect the design considerations for WBS, the open challenges and future directions of research in these areas.  ...  vulnerabilities, attacks and defenses for TBS and WBS.  ...  Security of TBS, on the other hand, depends on modality, sample measured, template, and feature matching/decision-making FACTORS CONTRIBUTING TO WBS DESIGN SOLUTIONS Despite numerous WBS products already  ... 
arXiv:1903.02548v1 fatcat:mkl32giawnb5lgornzq4w3ec74

IEEE Access Special Section Editorial: Machine Learning Designs, Implementations and Techniques

Shadi A. Aljawarneh, Oguz Bayat, Juan A. Lara, Robert P. Schumaker
2020 IEEE Access  
He has presented at and has been on the organizing committees for a high number of international conferences and esteemed journals.  ...  His research interests include software engineering, web and network security, e-learning, AI, machine learning, and cloud computing.  ...  uses decision trees as base models to obtain decision regions.  ... 
doi:10.1109/access.2020.3005820 fatcat:6titg5jvhff2bnyc7yby6oncue


2019 2019 IEEE Global Conference on Internet of Things (GCIoT)  
choice of the forecasting model for JFS depends heavily on the proportions of distinct IoT device classes that are present in the network.  ...  The comparison of the network throughput of Autoregressive Integrated Moving Average (ARIMA), Multi-Layer Perceptron (MLP) and Long-Short Term Memory (LSTM) forecasting models reveals that the optimal  ...  We adopt the two-parameter Weibull fading model to evaluate the performance of the proposed scheme. pp. 76-80 #3 11:40 Performance Analysis Comparison Between LoRa and Frequency Hopping-based LPWAN Minar  ... 
doi:10.1109/gciot47977.2019.9058389 fatcat:z62yf6bds5flhdatcvsuzzkj5q

Designing a Healthcare-Enabled Software-Defined Wireless Body Area Network Architecture for Secure Medical Data and Efficient Diagnosis

Jawaid Iqbal, Muhammad Adnan, Younas Khan, Hussain AlSalman, Saddam Hussain, Syed Sajid Ullah, Noor ul Amin, Abdu Gumaei, Deepak Garg
2022 Journal of Healthcare Engineering  
Moreover, a well-known Multicriteria Decision-Making (MCDM) approach known as Evaluation Based on Distance from Average Solution (EDAS) is also used to demonstrate the success of the suggested system.  ...  Among these communications, the security and privacy of patients are the prime concerns while transferring data over an open wireless channel from biosensor nodes to a Medical Server (MS) through a Base  ...  (ii) Analysis of Data. e purpose of collecting data is to perform different operations on it, for instance, diagnosis and analysis, modeling, and medical decision-making, based on requirements.  ... 
doi:10.1155/2022/9210761 fatcat:dayzb7emljdtfacxw4mxpfbe2q

The future of sleep health: a data-driven revolution in sleep science and medicine

Ignacio Perez-Pozuelo, Bing Zhai, Joao Palotti, Raghvendra Mall, Michaël Aupetit, Juan M. Garcia-Gomez, Shahrad Taheri, Yu Guan, Luis Fernandez-Luque
2020 npj Digital Medicine  
There are important outstanding questions regarding performance evaluation, as well as data storage, curation, processing, integration, modelling and interpretation.  ...  Further, we explore the strengths and limitations of current and emerging sensing methods with a particular focus on novel data-driven technologies, such as Artificial Intelligence.  ...  Once that data has been appropriately treated, the processing step takes place whereby data is transformed and integrated based on the end-model.  ... 
doi:10.1038/s41746-020-0244-4 pmid:32219183 pmcid:PMC7089984 fatcat:srzhls4bt5a6vk3yyr57sdmtta

Addressing Security and Privacy Challenges in Internet of Things [article]

Arsalan Mosenia
2018 arXiv   pre-print
protocols, and sensors were not designed to support IoT.  ...  Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a holistic and transformative approach for providing numerous services.  ...  CS-based computation and transmission As the third scheme, we evaluate an approach for computation and data transmission that can reduce the energy consumption of EEG and ECG sensors significantly.  ... 
arXiv:1807.06724v1 fatcat:f45cytbjkjgyjiytvr2ygdcsze

A Review on the Role of Machine Learning in Enabling IoT Based Healthcare Applications

Hemantha Krishna Bharadwaj, Aayush Agarwal, Vinay Chamola, Naga Rajiv Lakkaniga, Vikas Hassija, Mohsen Guizani, Biplab Sikdar
2021 IEEE Access  
Due to the large amount of data involved in healthcare, and the enormous value that accurate predictions hold, the integration of machine learning (ML) algorithms into H-IoT is imperative.  ...  The key elements of all H-IoT applications are data gathering and processing.  ...  ML model based on decision tree was integrated for defining factors, frequencies, and nodes in the correlation among the healthcare institutions and malaria cases.  ... 
doi:10.1109/access.2021.3059858 fatcat:gwdku6me2fhzbfwf7agtt5vmse
« Previous Showing results 1 — 15 out of 1,131 results