Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 7 de 7
Filter
Add more filters










Database
Language
Publication year range
1.
Sci Rep ; 14(1): 13835, 2024 06 15.
Article in English | MEDLINE | ID: mdl-38879705

ABSTRACT

To obtain a reliable and accurate automatic speech recognition (ASR) machine learning model, it is necessary to have sufficient audio data transcribed, for training. Many languages in the world, especially the agglutinative languages of the Turkic family, suffer from a lack of this type of data. Many studies have been conducted in order to obtain better models for low-resource languages, using different approaches. The most popular approaches include multilingual training and transfer learning. In this study, we combined five agglutinative languages from the Turkic family-Kazakh, Bashkir, Kyrgyz, Sakha, and Tatar,-in order to provide multilingual training using connectionist temporal classification and an attention mechanism including a language model, because these languages have cognate words, sentence formation rules, and alphabet (Cyrillic). Data from the open-source database Common voice was used for the study, to make the experiments reproducible. The results of the experiments showed that multilingual training could improve ASR performances for all languages included in the experiment, except Bashkir language. A dramatic result was achieved for the Kyrgyz language: word error rate decreased to nearly one-fifth and character error rate decreased to one-fourth, which proves that this approach can be helpful for critically low-resource languages.


Subject(s)
Language , Multilingualism , Humans , Machine Learning , Speech Recognition Software
2.
Heliyon ; 9(12): e22823, 2023 Dec.
Article in English | MEDLINE | ID: mdl-38076082

ABSTRACT

Numerous research studies have highlighted the exponential growth of malware attacks worldwide, posing a significant threat to society. Cybercriminals are becoming increasingly merciless and show no signs of pity towards individuals or organizations. It is evident that cyber criminals will stop at nothing to gain unauthorized access to confidential information. To effectively combat malware attacks, strict cyber laws are necessary, and the use of malware is punishable in many countries. However, the literature has not addressed whether these penalties create deterrence or not. This research article has addressed this gap. In this study, the effectiveness of criminal laws related to malware-related crimes in various jurisdictions was analyzed using the doctrinal research methodology. The cyber laws of the USA, UK, Ethiopia, Pakistan, and China were examined to determine whether the penalties imposed for these crimes are appropriate given the severity of the harm caused. The study concludes that malware penalties should take into account the creation or use of malicious code, targeting individuals or organizations, and the magnitude of consequences, regardless of whether mens rea is present or not.

3.
Sensors (Basel) ; 23(18)2023 Sep 07.
Article in English | MEDLINE | ID: mdl-37765797

ABSTRACT

The rapid advancements in technology have paved the way for innovative solutions in the healthcare domain, aiming to improve scalability and security while enhancing patient care. This abstract introduces a cutting-edge approach, leveraging blockchain technology and hybrid deep learning techniques to revolutionize healthcare systems. Blockchain technology provides a decentralized and transparent framework, enabling secure data storage, sharing, and access control. By integrating blockchain into healthcare systems, data integrity, privacy, and interoperability can be ensured while eliminating the reliance on centralized authorities. In conjunction with blockchain, hybrid deep learning techniques offer powerful capabilities for data analysis and decision making in healthcare. Combining the strengths of deep learning algorithms with traditional machine learning approaches, hybrid deep learning enables accurate and efficient processing of complex healthcare data, including medical records, images, and sensor data. This research proposes a permissions-based blockchain framework for scalable and secure healthcare systems, integrating hybrid deep learning models. The framework ensures that only authorized entities can access and modify sensitive health information, preserving patient privacy while facilitating seamless data sharing and collaboration among healthcare providers. Additionally, the hybrid deep learning models enable real-time analysis of large-scale healthcare data, facilitating timely diagnosis, treatment recommendations, and disease prediction. The integration of blockchain and hybrid deep learning presents numerous benefits, including enhanced scalability, improved security, interoperability, and informed decision making in healthcare systems. However, challenges such as computational complexity, regulatory compliance, and ethical considerations need to be addressed for successful implementation. By harnessing the potential of blockchain and hybrid deep learning, healthcare systems can overcome traditional limitations, promoting efficient and secure data management, personalized patient care, and advancements in medical research. The proposed framework lays the foundation for a future healthcare ecosystem that prioritizes scalability, security, and improved patient outcomes.


Subject(s)
Blockchain , Deep Learning , Humans , Computer Security , Ecosystem , Delivery of Health Care , Electronic Health Records
4.
J Healthc Eng ; 2023: 3679829, 2023.
Article in English | MEDLINE | ID: mdl-36818384

ABSTRACT

The world has been going through the global crisis of the coronavirus (COVID-19). It is a challenging situation for every country to tackle its healthcare system. COVID-19 spreads through physical contact with COVID-positive patients and causes potential damage to the country's health and economy system. Therefore, to overcome the chance of spreading the disease, the only preventive measure is to maintain social distancing. In this vulnerable situation, virtual resources have been utilized in order to maintain social distance, i.e., the telehealth system has been proposed and developed to access healthcare services remotely and manage people's health conditions. The telehealth system could become a regular part of our healthcare system, and during any calamity or natural disaster, it could be used as an emergency response to deal with the catastrophe. For this purpose, we proposed a conceptual telehealth framework in response to COVID-19. We focused on identifying critical issues concerning the use of telehealth in healthcare setups. Furthermore, the factors influencing the implementation of the telehealth system have been explored in detail. The proposed telehealth system utilizes artificial intelligence and data science to regulate and maintain the system efficiently. Before implementing the telehealth system, it is required that prearrangements be made, such as appropriate funding measures, the skills to know technological usage, training sessions, and staff endorsement. The barriers and influencing factors provided in this article can be helpful for future developments in telehealth systems and for making fruitful progress in fighting pandemics like COVID-19. At the same time, the same approach can be used to save the lives of many frontline workers.


Subject(s)
COVID-19 , Telemedicine , Humans , SARS-CoV-2 , Artificial Intelligence , Delivery of Health Care
5.
Sensors (Basel) ; 22(17)2022 Sep 02.
Article in English | MEDLINE | ID: mdl-36081091

ABSTRACT

Human physical activity recognition from inertial sensors is shown to be a successful approach for monitoring elderly individuals and children in indoor and outdoor environments. As a result, researchers have shown significant interest in developing state-of-the-art machine learning methods capable of utilizing inertial sensor data and providing key decision support in different scenarios. This paper analyzes data-driven techniques for recognizing human daily living activities. Therefore, to improve the recognition and classification of human physical activities (for example, walking, drinking, and running), we introduced a model that integrates data preprocessing methods (such as denoising) along with major domain features (such as time, frequency, wavelet, and time-frequency features). Following that, stochastic gradient descent (SGD) is used to improve the performance of the extracted features. The selected features are catered to the random forest classifier to detect and monitor human physical activities. Additionally, the proposed HPAR system was evaluated on five benchmark datasets, namely the IM-WSHA, PAMAP-2, UCI HAR, MobiAct, and MOTIONSENSE databases. The experimental results show that the HPAR system outperformed the present state-of-the-art methods with recognition rates of 90.18%, 91.25%, 91.83%, 90.46%, and 92.16% from the IM-WSHA, PAMAP-2, UCI HAR, MobiAct, and MOTIONSENSE datasets, respectively. The proposed HPAR model has potential applications in healthcare, gaming, smart homes, security, and surveillance.


Subject(s)
Algorithms , Human Activities , Aged , Child , Exercise , Humans , Monitoring, Physiologic , Walking
6.
Sensors (Basel) ; 22(13)2022 Jun 30.
Article in English | MEDLINE | ID: mdl-35808459

ABSTRACT

Cloud computing coupled with Internet of Things technology provides a wide range of cloud services such as memory, storage, computational processing, network bandwidth, and database application to the end users on demand over the Internet. More specifically, cloud computing provides efficient services such as "pay as per usage". However, Utility providers in Smart Grid are facing challenges in the design and implementation of such architecture in order to minimize the cost of underlying hardware, software, and network services. In Smart Grid, smart meters generate a large volume of different traffics, due to which efficient utilization of available resources such as buffer, storage, limited processing, and bandwidth is required in a cost-effective manner in the underlying network infrastructure. In such context, this article introduces a QoS-aware Hybrid Queue Scheduling (HQS) model that can be seen over the IoT-based network integrated with cloud environment for different advanced metering infrastructure (AMI) application traffic, which have different QoS levels in the Smart Grid network. The proposed optimization model supports, classifies, and prioritizes the AMI application traffic. The main objective is to reduce the cost of buffer, processing power, and network bandwidth utilized by AMI applications in the cloud environment. For this, we developed a simulation model in the CloudSim simulator that uses a simple mathematical model in order to achieve the objective function. During the simulations, the effects of various numbers of cloudlets on the cost of virtual machine resources such as RAM, CPU processing, and available bandwidth have been investigated in cloud computing. The obtained simulation results exhibited that our proposed model successfully competes with the previous schemes in terms of minimizing the processing, memory, and bandwidth cost by a significant margin. Moreover, the simulation results confirmed that the proposed optimization model behaves as expected and is realistic for AMI application traffic in the Smart Grid network using cloud computing.


Subject(s)
Cloud Computing , Computer Systems , Computer Simulation , Models, Theoretical , Software
7.
Sensors (Basel) ; 22(5)2022 Feb 23.
Article in English | MEDLINE | ID: mdl-35270898

ABSTRACT

To address the problem of automatically detecting and removing the mask without user interaction, we present a GAN-based automatic approach for face de-occlusion, called Automatic Mask Generation Network for Face De-occlusion Using Stacked Generative Adversarial Networks (AFD-StackGAN). In this approach, we decompose the problem into two primary stages (i.e., Stage-I Network and Stage-II Network) and employ a separate GAN in both stages. Stage-I Network (Binary Mask Generation Network) automatically creates a binary mask for the masked region in the input images (occluded images). Then, Stage-II Network (Face De-occlusion Network) removes the mask object and synthesizes the damaged region with fine details while retaining the restored face's appearance and structural consistency. Furthermore, we create a paired synthetic face-occluded dataset using the publicly available CelebA face images to train the proposed model. AFD-StackGAN is evaluated using real-world test images gathered from the Internet. Our extensive experimental results confirm the robustness and efficiency of the proposed model in removing complex mask objects from facial images compared to the previous image manipulation approaches. Additionally, we provide ablation studies for performance comparison between the user-defined mask and auto-defined mask and demonstrate the benefits of refiner networks in the generation process.


Subject(s)
Image Processing, Computer-Assisted , Neural Networks, Computer , Face/diagnostic imaging , Image Processing, Computer-Assisted/methods
SELECTION OF CITATIONS
SEARCH DETAIL
...