Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 2 de 2
Filter
Add more filters










Database
Language
Publication year range
1.
Comput Intell Neurosci ; 2022: 3773883, 2022.
Article in English | MEDLINE | ID: mdl-35800697

ABSTRACT

ECG (electrocardiogram) identifies and traces targets and is commonly employed in cardiac disease detection. It is necessary for monitoring precise target trajectories. Estimations of ECG are nonlinear as the parameters TDEs (time delays) and Doppler shifts are computed on receipt of echoes where EKFs (extended Kalman filters) and electrocardiogram have not been examined for computations. ECG, certain times, results in poor accuracies and low SNRs (signal-to-noise ratios), especially while encountering complicated environments. This work proposes to track online filter performances while using optimization techniques to enhance outcomes with the removal of noise in the signal. The use of cost functions can assist state corrections while lowering costs. A new parameter is optimized using IMCEHOs (Improved Mutation Chaotic Elephant Herding Optimizations) by linearly approximating system nonlinearity where multi-iterative function (Optimized Iterative UKFs) predicts a target's unknown parameters. To obtain optimal solutions theoretically, multi-iterative function takes less iteration, resulting in shorter execution times. The proposed multi-iterative function provides numerical approximations, which are derivative-free implementations. Signals are updated in the cloud environment; the updates are received by the patients from home. The simulation evaluation results with estimators show better performances in terms of reduced NMSEs (normalized mean square errors), RMSEs (root mean squared errors), SNRs, variances, and better accuracies than current approaches. Machine learning algorithms have been used to predict the stages of heart disease, which is updated to the patient in the cloud environment. The proposed work has a 91.0% accuracy rate with an error rate of 0.05% by reducing noise levels.


Subject(s)
Cloud Computing , Signal Processing, Computer-Assisted , Algorithms , Arrhythmias, Cardiac/diagnosis , Delivery of Health Care , Electrocardiography/methods , Humans , Machine Learning
2.
Comput Intell Neurosci ; 2022: 7348488, 2022.
Article in English | MEDLINE | ID: mdl-35845910

ABSTRACT

Numerous forms of disasters and vandalism can occur in transmission lines, which makes them vulnerable. As a result, the transmission pipes must be protected by a reliable monitoring system. When a wireless sensor network is built from disparate devices that are positioned at varying distances from one another, it can be used to monitor physical and environmental conditions in the surrounding environment. In addition to the built-in sensor on the exterior of a pipeline and sensors positioned to support bridge structures, wireless sensor networks have a range of other applications. Other uses include robotics, healthcare, environmental monitoring, and a variety of other areas of technology. It is feasible to use wireless sensor networks to monitor temperature and pressure, as well as leak detection and transmission line sabotage, among other applications. There are several different sorts of attacks that can be launched against wireless sensor networks. When it comes to information security in wireless sensor networks, cryptographic approaches play a critical role in ensuring the integrity of the data. Different types of cryptographic algorithms are now available for use in order to maintain network security. Specific difficulties must be addressed, though, and these are as follows: To strengthen the power of these algorithms, a unique hybrid encryption approach for monitoring energy transmission lines and increasing the security of wireless sensor networks is created in this study. While wireless sensor networks are being used to monitor transmission pipelines, the proposed hybrid encryption method ensures that data is transferred securely and promptly. The proposed method must follow three cryptographic principles: integrity, secrecy, and authenticity. All of the subtleties and underlying principles of the algorithm are explained in detail so that the algorithm can be put into action immediately after it is introduced.


Subject(s)
Computer Communication Networks , Wireless Technology , Algorithms , Computer Security , Electrocardiography , Machine Learning
SELECTION OF CITATIONS
SEARCH DETAIL
...