Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 20 de 23
Filter
Add more filters










Publication year range
1.
Bioengineering (Basel) ; 11(5)2024 May 07.
Article in English | MEDLINE | ID: mdl-38790331

ABSTRACT

Given its detrimental effect on the brain, alcoholism is a severe disorder that can produce a variety of cognitive, emotional, and behavioral issues. Alcoholism is typically diagnosed using the CAGE assessment approach, which has drawbacks such as being lengthy, prone to mistakes, and biased. To overcome these issues, this paper introduces a novel paradigm for identifying alcoholism by employing electroencephalogram (EEG) signals. The proposed framework is divided into various steps. To begin, interference and artifacts in the EEG data are removed using a multiscale principal component analysis procedure. This cleaning procedure contributes to information quality improvement. Second, an innovative graphical technique based on fast fractional Fourier transform coefficients is devised to visualize the chaotic character and complexities of the EEG signals. This elucidates the properties of regular and alcoholic EEG signals. Third, thirty-four graphical features are extracted to interpret the EEG signals' haphazard behavior and differentiate between regular and alcoholic trends. Fourth, we propose an ensembled feature selection method for obtaining an effective and reliable feature group. Following that, we study many neural network classifiers to choose the optimal classifier for building an efficient framework. The experimental findings show that the suggested method obtains the best classification performance by employing a recurrent neural network (RNN), with 97.5% accuracy, 96.7% sensitivity, and 98.3% specificity for the sixteen selected features. The proposed framework can aid physicians, businesses, and product designers to develop a real-time system.

2.
Health Inf Sci Syst ; 11(1): 27, 2023 Dec.
Article in English | MEDLINE | ID: mdl-37337563

ABSTRACT

Background: Alcoholism is a catastrophic condition that causes brain damage as well as neurological, social, and behavioral difficulties. Limitations: This illness is often assessed using the Cut down, Annoyed, Guilty, and Eye-opener examination technique, which assesses the intensity of an alcohol problem. This technique is protracted, arduous, error-prone, and errant. Method: As a result, the intention of this paper is to design a cutting-edge system for automatically identifying alcoholism utilizing electroencephalography (EEG) signals, that can alleviate these problems and aid practitioners and investigators. First, we investigate the feasibility of using the Fast Walsh-Hadamard transform of EEG signals to explore the unpredictable essence and variability of EEG indicators in the suggested framework. Second, thirty-six linear and nonlinear features for deciphering the dynamic pattern of healthy and alcoholic EEG signals are discovered. Subsequently, we suggested a strategy for selecting powerful features. Finally, nineteen machine learning algorithms and five neural network classifiers are used to assess the overall performance of selected attributes. Results: The extensive experiments show that the suggested method provides the best classification efficiency, with 97.5% accuracy, 96.7% sensitivity, and 98.3% specificity for the features chosen using the correlation-based FS approach with Recurrent Neural Networks. With recently introduced matrix determinant features, a classification accuracy of 93.3% is also attained. Moreover, we developed a novel index that uses clinically meaningful features to differentiate between healthy and alcoholic categories with a unique integer. This index can assist health care workers, commercial companies, and design engineers in developing a real-time system with 100% classification results for the computerized framework.

3.
Sensors (Basel) ; 22(6)2022 Mar 15.
Article in English | MEDLINE | ID: mdl-35336439

ABSTRACT

Despite the benefits of smart grids, concerns about security and privacy arise when a large number of heterogeneous devices communicate via a public network. A novel privacy-preserving method for smart grid-based home area networks (HAN) is proposed in this research. To aggregate data from diverse household appliances, the proposed approach uses homomorphic Paillier encryption, Chinese remainder theorem, and one-way hash function. The privacy in Internet of things (IoT)-enabled smart homes is one of the major concerns of the research community. In the proposed scheme, the sink node not only aggregates the data but also enables the early detection of false data injection and replay attacks. According to the security analysis, the proposed approach offers adequate security. The smart grid distributes power and facilitates a two-way communications channel that leads to transparency and developing trust.


Subject(s)
Internet of Things , Privacy , Algorithms , Communication , Computer Security
4.
Sensors (Basel) ; 22(4)2022 Feb 10.
Article in English | MEDLINE | ID: mdl-35214251

ABSTRACT

In many smart devices and numerous digital applications, authentication mechanisms are widely used to validate the legitimacy of users' identification. As a result of the increased use of mobile devices, most people tend to save sensitive and secret information over such devices. Personal Identification Number (PIN)-based and alphanumeric passwords are simple to remember, but at the same time, they are vulnerable to hackers. Being difficult to guess and more user-friendly, graphical passwords have grown in popularity as an alternative to all such textual passwords. This paper describes an innovative, hybrid, and much more robust user authentication approach, named GRA-PIN (GRAphical and PIN-based), which combines the merits of both graphical and pin-based techniques. The feature of simple arithmetic operations (addition and subtraction) is incorporated in the proposed scheme, through which random passwords are generated for each login attempt. In the study, we have conducted a comparative study between the GRA-PIN scheme with existing PIN-based and pattern-based (swipe-based) authentications approaches using the standard Software Usability Scale (SUS). The usability score of GRA-PIN was analyzed to be as high as 94%, indicating that it is more reliable and user friendly. Furthermore, the security of the proposed scheme was challenged through an experiment wherein three different attackers, having a complete understanding of the proposed scheme, attempted to crack the technique via shoulder surfing, guessing, and camera attack, but they were unsuccessful.


Subject(s)
Sports , Telemedicine , Computer Security , Computers, Handheld , Confidentiality , Humans , Shoulder , Software
5.
Comput Biol Med ; 143: 105242, 2022 Apr.
Article in English | MEDLINE | ID: mdl-35093844

ABSTRACT

Identifying motor and mental imagery electroencephalography (EEG) signals is imperative to realizing automated, robust brain-computer interface (BCI) systems. In the present study, we proposed a pretrained convolutional neural network (CNN)-based new automated framework feasible for robust BCI systems with small and ample samples of motor and mental imagery EEG training data. The framework is explored by investigating the implications of different limiting factors, such as learning rates and optimizers, processed versus unprocessed scalograms, and features derived from untuned pretrained models in small, medium, and large pretrained CNN models. The experiments were performed on three public datasets obtained from BCI Competition III. The datasets were denoised with multiscale principal component analysis, and time-frequency scalograms were obtained by employing a continuous wavelet transform. The scalograms were fed into several variants of ten pretrained models for feature extraction and identification of different EEG tasks. The experimental results showed that ShuffleNet yielded the maximum average classification accuracy of 99.52% using an RMSProp optimizer with a learning rate of 0.000 1. It was observed that low learning rates converge to more optimal performances compared to high learning rates. Moreover, noisy scalograms and features extracted from untuned networks resulted in slightly lower performance than denoised scalograms and tuned networks, respectively. The overall results suggest that pretrained models are robust when identifying EEG signals because of their ability to preserve the time-frequency structure of EEG signals and promising classification outcomes.

6.
Sensors (Basel) ; 21(24)2021 Dec 17.
Article in English | MEDLINE | ID: mdl-34960535

ABSTRACT

Wireless sensor networks (WSNs) are one of the fundamental infrastructures for Internet of Things (IoTs) technology. Efficient energy consumption is one of the greatest challenges in WSNs because of its resource-constrained sensor nodes (SNs). Clustering techniques can significantly help resolve this issue and extend the network's lifespan. In clustering, WSN is divided into various clusters, and a cluster head (CH) is selected in each cluster. The selection of appropriate CHs highly influences the clustering technique, and poor cluster structures lead toward the early death of WSNs. In this paper, we propose an energy-efficient clustering and cluster head selection technique for next-generation wireless sensor networks (NG-WSNs). The proposed clustering approach is based on the midpoint technique, considering residual energy and distance among nodes. It distributes the sensors uniformly creating balanced clusters, and uses multihop communication for distant CHs to the base station (BS). We consider a four-layer hierarchical network composed of SNs, CHs, unmanned aerial vehicle (UAV), and BS. The UAV brings the advantage of flexibility and mobility; it shortens the communication range of sensors, which leads to an extended lifetime. Finally, a simulated annealing algorithm is applied for the optimal trajectory of the UAV according to the ground sensor network. The experimental results show that the proposed approach outperforms with respect to energy efficiency and network lifetime when compared with state-of-the-art techniques from recent literature.

7.
Sensors (Basel) ; 21(21)2021 Nov 05.
Article in English | MEDLINE | ID: mdl-34770672

ABSTRACT

Vehicular Ad hoc Network (VANET) is a modern concept that enables network nodes to communicate and disseminate information. VANET is a heterogeneous network, due to which the VANET environment exposes to have various security and privacy challenges. In the future, the automobile industry will progress towards assembling electric vehicles containing energy storage batteries employing these resources to travel as an alternative to gasoline/petroleum. These vehicles may have the capability to share their energy resources upon the request of vehicles having limited energy resources. In this article, we have proposed a trust management-based secure energy sharing mechanism, named vTrust, which computes the trust degree of nodes to authenticate nodes. The proposed mechanism is a multi-leveled centralized approach utilizing both the infrastructure and vehicles to sustain a secure environment. The proposed vTrust can aggregate and propagate the degree of trust to enhance scalability. The node that requests to obtain the energy resources may have to maintain a specified level of trust threshold for earning resources. We have also evaluated the performance of the proposed mechanism against several existing approaches and determine that the proposed mechanism can efficiently manage a secure environment during resource sharing by maintaining average malicious nodes detection of 91.3% and average successful energy sharing rate of 89.5%, which is significantly higher in comparison to the existing approaches.

8.
J Healthc Eng ; 2020: 6648574, 2020.
Article in English | MEDLINE | ID: mdl-33343851

ABSTRACT

For the last few years, computer-aided diagnosis (CAD) has been increasing rapidly. Numerous machine learning algorithms have been developed to identify different diseases, e.g., leukemia. Leukemia is a white blood cells- (WBC-) related illness affecting the bone marrow and/or blood. A quick, safe, and accurate early-stage diagnosis of leukemia plays a key role in curing and saving patients' lives. Based on developments, leukemia consists of two primary forms, i.e., acute and chronic leukemia. Each form can be subcategorized as myeloid and lymphoid. There are, therefore, four leukemia subtypes. Various approaches have been developed to identify leukemia with respect to its subtypes. However, in terms of effectiveness, learning process, and performance, these methods require improvements. This study provides an Internet of Medical Things- (IoMT-) based framework to enhance and provide a quick and safe identification of leukemia. In the proposed IoMT system, with the help of cloud computing, clinical gadgets are linked to network resources. The system allows real-time coordination for testing, diagnosis, and treatment of leukemia among patients and healthcare professionals, which may save both time and efforts of patients and clinicians. Moreover, the presented framework is also helpful for resolving the problems of patients with critical condition in pandemics such as COVID-19. The methods used for the identification of leukemia subtypes in the suggested framework are Dense Convolutional Neural Network (DenseNet-121) and Residual Convolutional Neural Network (ResNet-34). Two publicly available datasets for leukemia, i.e., ALL-IDB and ASH image bank, are used in this study. The results demonstrated that the suggested models supersede the other well-known machine learning algorithms used for healthy-versus-leukemia-subtypes identification.


Subject(s)
Deep Learning , Diagnosis, Computer-Assisted , Internet of Things , Leukemia/classification , Leukemia/diagnosis , Pattern Recognition, Automated , Algorithms , COVID-19/epidemiology , Cloud Computing , Databases, Factual , Diagnostic Imaging , Humans , Leukemia, Lymphocytic, Chronic, B-Cell/diagnosis , Leukemia, Myelogenous, Chronic, BCR-ABL Positive/diagnosis , Leukemia, Myeloid, Acute/diagnosis , Machine Learning , Neural Networks, Computer , Precursor Cell Lymphoblastic Leukemia-Lymphoma/diagnosis , Telemedicine
9.
Entropy (Basel) ; 22(2)2020 Feb 17.
Article in English | MEDLINE | ID: mdl-33286000

ABSTRACT

The International Energy Agency has projected that the total energy demand for electricity in sub-Saharan Africa (SSA) is expected to rise by an average of 4% per year up to 2040. It implies that ~620 million people are living without electricity in SSA. Going with the 2030 vision of the United Nations that electricity should be accessible to all, it is important that new technology and methods are provided. In comparison to other nations worldwide, smart grid (SG) is an emerging technology in SSA. SG is an information technology-enhanced power grid, which provides a two-way communication network between energy producers and customers. Also, it includes renewable energy, smart meters, and smart devices that help to manage energy demands and reduce energy generation costs. However, SG is facing inherent difficulties, such as energy theft, lack of trust, security, and privacy issues. Therefore, this paper proposes a blockchain-based decentralized energy system (BDES) to accelerate rural and urban electrification by improving service delivery while minimizing the cost of generation and addressing historical antipathy and cybersecurity risk within SSA. Additionally, energy insufficiency and fixed pricing schemes may raise concerns in SG, such as the imbalance of order. The paper also introduces a blockchain-based energy trading system, which includes price negotiation and incentive mechanisms to address the imbalance of order. Moreover, existing models for energy planning do not consider the effect of fill rate (FR) and service level (SL). A blockchain levelized cost of energy (BLCOE) is proposed as the least-cost solution that measures the impact of energy reliability on generation cost using FR and SL. Simulation results are presented to show the performance of the proposed model and the least-cost option varies with relative energy generation cost of centralized, decentralized and BDES infrastructure. Case studies of Burkina Faso, Cote d'Ivoire, Gambia, Liberia, Mali, and Senegal illustrate situations that are more suitable for BDES. For other SSA countries, BDES can cost-effectively service a large population and regions. Additionally, BLCOE reduces energy costs by approximately 95% for battery and 75% for the solar modules. The future BLCOE varies across SSA on an average of about 0.049 $/kWh as compared to 0.15 $/kWh of an existing system in the literature.

10.
Sensors (Basel) ; 20(23)2020 Nov 30.
Article in English | MEDLINE | ID: mdl-33266009

ABSTRACT

Recently, many platforms have outsourced tasks to numerous smartphone devices known as Mobile Crowd-sourcing System (MCS). The data is collected and transferred to the platform for further analysis and processing. These data needs to maintain confidentiality while moving from smartphones to the platform. Moreover, the limitations of computation resources in smartphones need to be addressed to balance the confidentiality of the data and the capabilities of the devices. For this reason, elliptic curve cryptography (ECC) is accepted, widespread, and suitable for use in limited resources environments such as smartphone devices. ECC reduces energy consumption and maximizes devices' efficiency by using small crypto keys with the same strength of the required cryptography of other cryptosystems. Thus, ECC is the preferred approach for many environments, including the MCS, Internet of Things (IoT) and wireless sensor networks (WSNs). Many implementations of ECC increase the process of encryption and/or increase the space overhead by, for instance, incorrectly mapping points to EC with extra padding bits. Moreover, the wrong mapping method used in ECC results in increasing the computation efforts. This study provides comprehensive details about the mapping techniques used in the ECC mapping phase, and presents performance results about widely used elliptic curves. In addition, it suggests an optimal enhanced mapping method and size of padding bit to secure communications that guarantee the successful mapping of points to EC and reduce the size of padding bits.

11.
Sensors (Basel) ; 20(21)2020 Nov 03.
Article in English | MEDLINE | ID: mdl-33153217

ABSTRACT

The health industry is one of the most auspicious domains for the application of Internet of Things (IoT) based technologies. Lots of studies have been carried out in the health industry field to minimize the use of resources and increase the efficiency. The use of IoT combined with other technologies has brought quality advancement in the health sector at minimum expense. One such technology is the use of wireless body area networks (WBANs), which will help patients incredibly in the future and will make them more productive because there will be no need for staying at home or a hospital for a long time. WBANs and IoT have an integrated future as WBANs, like any IoT application, are a collection of heterogeneous sensor-based devices. For the better amalgamation of the IoT and WBANs, several hindrances blocking their integration need to be addressed. One such problem is the efficient routing of data in limited resource sensor nodes (SNs) in WBANs. To solve this and other problems, such as transmission of duplicate sensed data, limited network lifetime, etc., energy harvested and cooperative-enabled efficient routing protocol (EHCRP) for IoT-WBANs is proposed. The proposed protocol considers multiple parameters of WBANs for efficient routing such as residual energy of SNs, number of hops towards the sink, node congestion levels, signal-to-noise ratio (SNR) and available network bandwidth. A path cost estimation function is calculated to select forwarder node using these parameters. Due to the efficient use of the path-cost estimation process, the proposed mechanism achieves efficient and effective multi-hop routing of data and improves the reliability and efficiency of data transmission over the network. After extensive simulations, the achieved results of the proposed protocol are compared with state-of-the-art techniques, i.e., E-HARP, EB-MADM, PCRP and EERP. The results show significant improvement in network lifetime, network throughout, and end-to-end delay.

12.
Sensors (Basel) ; 20(21)2020 Oct 29.
Article in English | MEDLINE | ID: mdl-33138018

ABSTRACT

Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems adopt asymmetric cryptography to secure their data and communications. A drawback of asymmetric cryptography is the sizeable computation and space requirements. However, elliptic curve cryptography (ECC) is widely used in constrained environments for asymmetric cryptography due its superiority in generating a powerful encryption mechanism with small key sizes. ECC increases device performance and lowers power consumption, meaning it is suitable for diverse applications ranging from the IoT to wireless sensor network (WSN) devices. To ensure the confidentiality and security of data and communications, it is necessary to implement ECC robustly. A special area of focus in this regard is the mapping phase. This study's objective was to propose a tested and trusted scheme that offers authenticated encryption (AE) via enhancing the mapping phase of a plain text to an elliptic curve to resist several encryption attacks such as Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA). The proposed scheme also undertakes evaluation and analysis related to security requirements for specific encryption attributes. Finally, results from a comparison of the proposed scheme and other schemes are presented, evaluating each one's security characteristics and performance measurements. Our scheme is efficient in a way that makes so suitable to the IoT, and in particular to the Industrial IoT and the new Urbanization where the demands for services are huge.

13.
Sensors (Basel) ; 20(21)2020 Oct 29.
Article in English | MEDLINE | ID: mdl-33138295

ABSTRACT

Internet of Things (IoT) provides a diverse platform to automate things where smart agriculture is one of the most promising concepts in the field of Internet of Agriculture Things (IoAT). Due to the requirements of more processing power for computations and predictions, the concept of Cloud-based smart agriculture is proposed for autonomic systems. This is where digital innovation and technology helps to improve the quality of life in the area of urbanization expansion. For the integration of cloud in smart agriculture, the system is shown to have security and privacy challenges, and most significantly, the identification of malicious and compromised nodes along with a secure transmission of information between sensors, cloud, and base station (BS). The identification of malicious and compromised node among soil sensors communicating with the BS is a notable challenge in the BS to cloud communications. The trust management mechanism is proposed as one of the solutions providing a lightweight approach to identify these nodes. In this article, we have proposed a novel trust management mechanism to identify malicious and compromised nodes by utilizing trust parameters. The trust mechanism is an event-driven process that computes trust based on the pre-defined time interval and utilizes the previous trust degree to develop an absolute trust degree. The system also maintains the trust degree of a BS and cloud service providers using distinct approaches. We have also performed extensive simulations to evaluate the performance of the proposed mechanism against several potential attacks. In addition, this research helps to create friendlier environments and efficient agricultural productions for the migration of people to the cities.

14.
Sensors (Basel) ; 20(9)2020 Apr 27.
Article in English | MEDLINE | ID: mdl-32349237

ABSTRACT

Nowadays, the integration of Wireless Sensor Networks (WSN) and the Internet of Things (IoT) provides a great concern for the research community for enabling advanced services. An IoT network may comprise a large number of heterogeneous smart devices for gathering and forwarding huge data. Such diverse networks raise several research questions, such as processing, storage, and management of massive data. Furthermore, IoT devices have restricted constraints and expose to a variety of malicious network attacks. This paper presents a Secure Sensor Cloud Architecture (SASC) for IoT applications to improve network scalability with efficient data processing and security. The proposed architecture comprises two main phases. Firstly, network nodes are grouped using unsupervised machine learning and exploit weighted-based centroid vectors for the development of intelligent systems. Secondly, the proposed architecture makes the use of sensor-cloud infrastructure for boundless storage and consistent service delivery. Furthermore, the sensor-cloud infrastructure is protected against malicious nodes by using a mathematically unbreakable one-time pad (OTP) encryption scheme to provide data security. To evaluate the performance of the proposed architecture, different simulation experiments are conducted using Network Simulator (NS3). It has been observed through experimental results that the proposed architecture outperforms other state-of-the-art approaches in terms of network lifetime, packet drop ratio, energy consumption, and transmission overhead.

15.
Sensors (Basel) ; 20(7)2020 Apr 07.
Article in English | MEDLINE | ID: mdl-32272801

ABSTRACT

Wireless sensor networks (WSNs) have demonstrated research and developmental interests in numerous fields, like communication, agriculture, industry, smart health, monitoring, and surveillance. In the area of agriculture production, IoT-based WSN has been used to observe the yields condition and automate agriculture precision using various sensors. These sensors are deployed in the agricultural environment to improve production yields through intelligent farming decisions and obtain information regarding crops, plants, temperature measurement, humidity, and irrigation systems. However, sensors have limited resources concerning processing, energy, transmitting, and memory capabilities that can negatively impact agriculture production. Besides efficiency, the protection and security of these IoT-based agricultural sensors are also important from malicious adversaries. In this article, we proposed an IoT-based WSN framework as an application to smart agriculture comprising different design levels. Firstly, agricultural sensors capture relevant data and determine a set of cluster heads based on multi-criteria decision function. Additionally, the strength of the signals on the transmission links is measured while using signal to noise ratio (SNR) to achieve consistent and efficient data transmissions. Secondly, security is provided for data transmission from agricultural sensors towards base stations (BS) while using the recurrence of the linear congruential generator. The simulated results proved that the proposed framework significantly enhanced the communication performance as an average of 13.5% in the network throughput, 38.5% in the packets drop ratio, 13.5% in the network latency, 16% in the energy consumption, and 26% in the routing overheads for smart agriculture, as compared to other solutions.

16.
PeerJ Comput Sci ; 6: e326, 2020.
Article in English | MEDLINE | ID: mdl-33816976

ABSTRACT

Opportunistic routing is an emerging routing technology that was proposed to overcome the drawback of unreliable transmission, especially in Wireless Sensor Networks (WSNs). Over the years, many forwarder methods were proposed to improve the performance in opportunistic routing. However, based on existing works, the findings have shown that there is still room for improvement in this domain, especially in the aspects of latency, network lifetime, and packet delivery ratio. In this work, a new relay node selection method was proposed. The proposed method used the minimum or maximum range and optimum energy level to select the best relay node to forward packets to improve the performance in opportunistic routing. OMNeT++ and MiXiM framework were used to simulate and evaluate the proposed method. The simulation settings were adopted based on the benchmark scheme. The evaluation results showed that our proposed method outperforms in the aspect of latency, network lifetime, and packet delivery ratio as compared to the benchmark scheme.

17.
Sensors (Basel) ; 19(8)2019 Apr 22.
Article in English | MEDLINE | ID: mdl-31013664

ABSTRACT

Wireless Sensor Network (WSN) is a growing area of research in terms of applications, life enhancement and security. Research interests vary from enhancing network performance and decreasing overhead computation to solving security flaws. Secure Group Communication (SGC) is gaining traction in the world of network security. Proposed solutions in this area focus on generating, sharing and distributing a group key among all group members in a timely manner to secure their communication and reduce the computation overhead. This method of security is called SGC-Shared Key. In this paper, we introduce a simple and effective way to secure the network through Hashed IDs (SGC-HIDs). In our proposed method, we distribute a shared key among the group of nodes in the network. Each node would have the ability to compute the group key each time it needs to. We provide a security analysis for our method as well as a performance evaluation. Moreover, to the best of our knowledge, we present for the first time a definition of joining or leaving attack. Furthermore, we describe several types of such an attack as well as the potential security impacts that occur when a network is being attacked.

18.
J Med Syst ; 42(6): 99, 2018 Apr 16.
Article in English | MEDLINE | ID: mdl-29663090

ABSTRACT

In recent years, human activity recognition from body sensor data or wearable sensor data has become a considerable research attention from academia and health industry. This research can be useful for various e-health applications such as monitoring elderly and physical impaired people at Smart home to improve their rehabilitation processes. However, it is not easy to accurately and automatically recognize physical human activity through wearable sensors due to the complexity and variety of body activities. In this paper, we address the human activity recognition problem as a classification problem using wearable body sensor data. In particular, we propose to utilize a Deep Belief Network (DBN) model for successful human activity recognition. First, we extract the important initial features from the raw body sensor data. Then, a kernel principal component analysis (KPCA) and linear discriminant analysis (LDA) are performed to further process the features and make them more robust to be useful for fast activity recognition. Finally, the DBN is trained by these features. Various experiments were performed on a real-world wearable sensor dataset to verify the effectiveness of the deep learning algorithm. The results show that the proposed DBN outperformed other algorithms and achieves satisfactory activity recognition performance.


Subject(s)
Machine Learning , Monitoring, Ambulatory/methods , Movement/physiology , Remote Sensing Technology/methods , Algorithms , Exercise Test , Humans , Neural Networks, Computer , Reproducibility of Results
19.
Sensors (Basel) ; 17(3)2017 Mar 13.
Article in English | MEDLINE | ID: mdl-28335377

ABSTRACT

In this paper, we propose two schemes; position-aware mobility pattern (PAMP) and cooperative PAMP (Co PAMP). The first one is an optimization scheme that avoids void hole occurrence and minimizes the uncertainty in the position estimation of glider's. The second one is a cooperative routing scheme that reduces the packet drop ratio by using the relay cooperation. Both techniques use gliders that stay at sojourn positions for a predefined time, at sojourn position self-confidence (s-confidence) and neighbor-confidence (n-confidence) regions that are estimated for balanced energy consumption. The transmission power of a glider is adjusted according to those confidence regions. Simulation results show that our proposed schemes outperform the compared existing one in terms of packet delivery ratio, void zones and energy consumption.

20.
Sensors (Basel) ; 17(3)2017 Mar 19.
Article in English | MEDLINE | ID: mdl-28335494

ABSTRACT

In this paper, three opportunistic pressure based routing techniques for underwater wireless sensor networks (UWSNs) are proposed. The first one is the cooperative opportunistic pressure based routing protocol (Co-Hydrocast), second technique is the improved Hydrocast (improved-Hydrocast), and third one is the cooperative improved Hydrocast (Co-improved Hydrocast). In order to minimize lengthy routing paths between the source and the destination and to avoid void holes at the sparse networks, sensor nodes are deployed at different strategic locations. The deployment of sensor nodes at strategic locations assure the maximum monitoring of the network field. To conserve the energy consumption and minimize the number of hops, greedy algorithm is used to transmit data packets from the source to the destination. Moreover, the opportunistic routing is also exploited to avoid void regions by making backward transmissions to find reliable path towards the destination in the network. The relay cooperation mechanism is used for reliable data packet delivery, when signal to noise ratio (SNR) of the received signal is not within the predefined threshold then the maximal ratio combining (MRC) is used as a diversity technique to improve the SNR of the received signals at the destination. Extensive simulations validate that our schemes perform better in terms of packet delivery ratio and energy consumption than the existing technique; Hydrocast.

SELECTION OF CITATIONS
SEARCH DETAIL
...