Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 3 de 3
Filter
Add more filters










Database
Language
Publication year range
1.
Bioengineering (Basel) ; 11(1)2024 Jan 17.
Article in English | MEDLINE | ID: mdl-38247965

ABSTRACT

Understanding the behavior of the human postural system has become a very attractive topic for many researchers. This system plays a crucial role in maintaining balance during both stationary and moving states. Parkinson's disease (PD) is a prevalent degenerative movement disorder that significantly impacts human stability, leading to falls and injuries. This research introduces an innovative approach that utilizes a hidden Markov model (HMM) to distinguish healthy individuals and those with PD. Interestingly, this methodology employs raw data obtained from stabilometric signals without any preprocessing. The dataset used for this study comprises 60 subjects divided into healthy and PD patients. Impressively, the proposed method achieves an accuracy rate of up to 98% in effectively differentiating healthy subjects from those with PD.

2.
Bioengineering (Basel) ; 9(7)2022 Jun 28.
Article in English | MEDLINE | ID: mdl-35877334

ABSTRACT

There has recently been increasing interest in postural stability aimed at gaining a better understanding of the human postural system. This system controls human balance in quiet standing and during locomotion. Parkinson's disease (PD) is the most common degenerative movement disorder that affects human stability and causes falls and injuries. This paper proposes a novel methodology to differentiate between healthy individuals and those with PD through the empirical mode decomposition (EMD) method. EMD enables the breaking down of a complex signal into several elementary signals called intrinsic mode functions (IMFs). Three temporal parameters and three spectral parameters are extracted from each stabilometric signal as well as from its IMFs. Next, the best five features are selected using the feature selection method. The classification task is carried out using four known machine-learning methods, KNN, decision tree, Random Forest and SVM classifiers, over 10-fold cross validation. The used dataset consists of 28 healthy subjects (14 young adults and 14 old adults) and 32 PD patients (12 young adults and 20 old adults). The SVM method has a performance of 92% and the Dempster-Sahfer formalism method has an accuracy of 96.51%.

3.
Sensors (Basel) ; 23(1)2022 Dec 22.
Article in English | MEDLINE | ID: mdl-36616700

ABSTRACT

In the recent past, Distributed Denial of Service (DDoS) attacks have become more abundant and present one of the most serious security threats. In a DDoS attack, the attacker controls a botnet of daemons residing in vulnerable hosts that send a significant amount of traffic to flood the victim or the network infrastructure. In this paper, a common type of DDoS attacks known as "TCP SYN-Flood" is studied. This type of attack uses spoofed Internet Protocol (IP) addresses for SYN packets by exploiting the weakness in Transmission Control Protocol (TCP) 3-Way handshake used by the TCP/IP suite of protocols, which make the web servers unreachable for legitimate users or even worse, it might lead to server crash. In this paper, a resilient, efficient, lightweight, and robust IP traceback algorithm is proposed using an IP tracing packet for each attack path. The proposed algorithm suggests that edge routers-where the attack starts from-observe the traffic pattern passing through, and if the observed traffic carries the signature of TCP SYN-Flood DDoS attack and a high percentage of it is destined to a particular web server(s), it starts the tracing process by generating an IP trace packet, which accompanies the attack path recording the routers' IP addresses on the path between the attacker/daemon and the victim, which can extract the path and react properly upon receiving it by discarding any SYN packets originating from that attacker/daemon. To our knowledge, this is the first research that efficiently traces these kinds of attacks while they are running. The proposed solution has low computation and message overhead, efficient detection and tracing time, and converges in near optimal time. The results are validated using extensive simulation runs.


Subject(s)
Algorithms , Floods , Computer Simulation , Internet , Knowledge
SELECTION OF CITATIONS
SEARCH DETAIL
...