Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 8 de 8
Filter
Add more filters










Database
Language
Publication year range
1.
Data Brief ; 50: 109355, 2023 Oct.
Article in English | MEDLINE | ID: mdl-37609648

ABSTRACT

The use of unmanned aerial vehicles (UAVs) has been rapidly increasing in both professional and recreational settings, leading to concerns about the safety and security of people and facilities. One area of research that has emerged in response to this concern is the development of detection systems for UAVs. However, many existing systems have limitations, such as detection failures or false detection of other aerial objects, including birds. To address this issue, the development of a standard dataset that provides images of both drones and birds is essential for training accurate and effective detection models. In this context, we present a dataset consisting of images of drones and birds operating in various environments. This dataset will serve as a valuable resource for researchers and developers working on UAV detection and classification systems. The dataset was created using Roboflow software, which enabled us to efficiently edit and manipulate the images using AI-assisted bounding boxes, polygons, and instance segmentation. The software supports a wide range of input and output formats, making it easy to import and export the dataset in different machine learning frameworks. To ensure the highest possible accuracy, we manually segmented each image from edge to edge, providing the YOLO model with detailed and accurate information for training. The dataset includes both training and testing sets, allowing for the evaluation of model performance and accuracy. Our dataset offers several advantages over existing datasets, including the inclusion of both drones and birds, which are commonly misclassified by detection systems. Additionally, the images in our dataset were collected in diverse environments, providing a wide range of scenarios for model training and testing. The presented dataset provides a valuable resource for researchers and developers working on UAV detection and classification systems. The inclusion of both drones and birds, as well as the diverse range of environments and scenarios, makes this dataset a unique and essential tool for training accurate and effective models. We hope that this dataset will contribute to the advancement of UAV detection and classification systems, improving safety and security in both professional and recreational settings.

2.
Data Brief ; 46: 108771, 2023 Feb.
Article in English | MEDLINE | ID: mdl-36478690

ABSTRACT

To determine the effectiveness of any defense mechanism, there is a need for comprehensive real-time network data that solely references various attack scenarios based on older software versions or unprotected ports, and so on. This presented dataset has entire network data at the time of several cyber attacks to enable experimentation on challenges based on implementing defense mechanisms on a larger scale. For collecting the data, we captured the network traffic of configured virtual machines using Wireshark and tcpdump. To analyze the impact of several cyber attack scenarios, this dataset presents a set of ten computers connected to Router1 on VLAN1 in a Docker Bridge network, that try and exploit each other. It includes browsing the web and downloading foreign packages including malicious ones. Also, services like File Transfer Protocol (FTP) and Secure Shell (SSH) were exploited using several attack mechanisms. The presented dataset shows the importance of updating and patching systems to protect themselves to a greater extent, by following attack tactics on older versions of packages as compared to the newer and updated ones. This dataset also includes an Apache Server hosted on a different subset of VLAN2 which is connected to the VLAN1 to demonstrate isolation and cross- VLAN communication. The services on this web server were also exploited by the previously stated ten computers. The attack types include Distributed Denial of Service, SQL Injection, Account Takeover, Service Exploitation (SSH, FTP), DNS and ARP Spoofing, Scanning and Firewall Searching and Indexing (using Nmap), Hammering the services to brute-force passwords and usernames, Malware attacks, Spoofing, and Man-in-the-Middle Attack. The attack scenarios also show various scanning mechanisms and the impact of Insider Threats on the entire network.

3.
Comput Electr Eng ; 102: 108276, 2022 Sep.
Article in English | MEDLINE | ID: mdl-35958351

ABSTRACT

The sudden outbreak of the novel coronavirus disease in 2019, known as COVID-19 has impacted the entire globe and has forced governments of various countries to a partial or full lockdown in the fear of the rapid spread of this disease. The major lesson learned from this pandemic is that there is a need to implement a robust system by using non-pharmaceutical interventions for the prevention and control of new contagious viruses. This goal can be achieved using the platform of the Internet of Things (IoT) because of its seamless connectivity and ubiquitous sensing ability. This technology-enabled healthcare sector is helpful to monitor COVID-19 patients properly by adopting an interconnected network. IoT is useful for improving patient satisfaction by reducing the rate of readmission in the hospital. The presented work discusses the applications and technologies of IoT like smart and wearable devices, drones, and robots which are used in healthcare systems to tackle the Coronavirus pandemic This paper focuses on applications of cognitive radio-based IoT for medical applications, which is referred to as "Cognitive Internet of Medical Things" (CIoMT). CIoMT is a disruptive and promising technology for dynamic monitoring, tracking, rapid diagnosis, and control of pandemics and to stop the spread of the virus. This paper explores the role of the CIoMT in the health domain, especially during pandemics, and also discusses the associated challenges and research directions.

4.
Math Biosci Eng ; 19(7): 7232-7247, 2022 05 16.
Article in English | MEDLINE | ID: mdl-35730304

ABSTRACT

Bio-inspired computing has progressed so far to deal with real-time multi-objective optimization problems. The Transmission expansion planning of the modern electricity grid requires finding the best and optimal routes for electricity transmission from the generation point to the endpoint while satisfying all the power and load constraints. Further, the transmission expansion cost allocation becomes a critical and pragmatic issue in the deregulated electricity industry. The prime objective is to minimize the total investment and expansion costs while considering N-1 contingency. The most optimal transmission expansion planning problem's solution is calculated using the objective function and the constraints. This optimal solution provides the total number and best locations for the candidates. The presented paper details the mathematical modeling of the shuffled frog leap algorithm with various modifications applied to the method to refine the results and finally proposes an enhanced novel approach to solve the transmission expansion planning problem. The proposed algorithm produces the expansion plans based on target-based evolution. The presented algorithm is rigorously tested on the standard Garver dataset and IEEE 24 bus system. The empirical results of the proposed algorithm led to better expansion plans while effectively considering typical electrical constraints along with modern and realistic constraints.


Subject(s)
Algorithms , Models, Theoretical , Computer Systems
5.
Comput Intell Neurosci ; 2022: 2898061, 2022.
Article in English | MEDLINE | ID: mdl-35341197

ABSTRACT

In recent times, the Internet of Medical Things (IoMT) is a new loomed technology, which has been deliberated as a promising technology designed for various and broadly connected networks. In an intelligent healthcare system, the framework of IoMT observes the health circumstances of the patients dynamically and responds to backings their needs, which helps detect the symptoms of critical rare body conditions based on the data collected. Metaheuristic algorithms have proven effective, robust, and efficient in deciphering real-world optimization, clustering, forecasting, classification, and other engineering problems. The emergence of extraordinary, very large-scale data being generated from various sources such as the web, sensors, and social media has led the world to the era of big data. Big data poses a new contest to metaheuristic algorithms. So, this research work presents the metaheuristic optimization algorithm for big data analysis in the IoMT using gravitational search optimization algorithm (GSOA) and reflective belief network with convolutional neural networks (DBN-CNNs). Here the data optimization has been carried out using GSOA for the collected input data. The input data were collected for the diabetes prediction with cardiac risk prediction based on the damage in blood vessels and cardiac nerves. Collected data have been classified to predict abnormal and normal diabetes range, and based on this range, the risk for a cardiac attack has been predicted using SVM. The performance analysis is made to reveal that GSOA-DBN_CNN performs well in predicting diseases. The simulation results illustrate that the GSOA-DBN_CNN model used for prediction improves accuracy, precision, recall, F1-score, and PSNR.


Subject(s)
Data Science , Social Media , Algorithms , Computer Simulation , Humans , Neural Networks, Computer
7.
Curr Med Imaging ; 16(4): 288-295, 2020.
Article in English | MEDLINE | ID: mdl-32410532

ABSTRACT

BACKGROUND: Physical characteristics including body size and configuration, are considered as one of the key influences on the optimum performance in athletes. Despite several analyzing methods for modeling the slimming estimation in terms of reduction in anthropometric indices, there are still weaknesses of these models such as being very demanding including time taken for analysis and accuracy. OBJECTIVES: This research proposes a novel approach for determining the slimming effect of a herbal composition as a natural medicine for weight loss. METHODS: To build an effective prediction model, a modern hybrid approach, merging adaptivenetwork- based fuzzy inference system and particle swarm optimization (ANFIS-PSO) was constructed for prediction of changes in anthropometric indices including waist circumference, waist to hip ratio, thigh circumference and mid-upper arm circumference, on female athletes after consumption of caraway extract during ninety days clinical trial. RESULTS: The outcomes showed that caraway extract intake was effective on lowering all anthropometric indices in female athletes after ninety days trial. The results of analysis by ANFIS-PSO was more accurate compared to SPSS. Also, the efficiency of the proposed approach was confirmed using the existing data. CONCLUSION: It is concluded that a development in predictive accuracy and simplification capability could be attained by hybrid adaptive neuro-fuzzy techniques as modern approaches in detecting changes in body characteristics. These developed techniques could be more useful and valid than other conventional analytical methods for clinical applications.


Subject(s)
Anthropometry/methods , Artificial Intelligence/statistics & numerical data , Athletes/statistics & numerical data , Carum , Plant Extracts/pharmacology , Adult , Body Size , Female , Fuzzy Logic , Humans , Middle Aged , Reproducibility of Results , Waist Circumference , Young Adult
8.
Curr Med Imaging ; 16(4): 296-306, 2020.
Article in English | MEDLINE | ID: mdl-32410533

ABSTRACT

BACKGROUND: Considering the increasing volume of text document information on Internet pages, dealing with such a tremendous amount of knowledge becomes totally complex due to its large size. Text clustering is a common optimization problem used to manage a large amount of text information into a subset of comparable and coherent clusters. AIMS: This paper presents a novel local clustering technique, namely, ß-hill climbing, to solve the problem of the text document clustering through modeling the ß-hill climbing technique for partitioning the similar documents into the same cluster. METHODS: The ß parameter is the primary innovation in ß-hill climbing technique. It has been introduced in order to perform a balance between local and global search. Local search methods are successfully applied to solve the problem of the text document clustering such as; k-medoid and kmean techniques. RESULTS: Experiments were conducted on eight benchmark standard text datasets with different characteristics taken from the Laboratory of Computational Intelligence (LABIC). The results proved that the proposed ß-hill climbing achieved better results in comparison with the original hill climbing technique in solving the text clustering problem. CONCLUSION: The performance of the text clustering is useful by adding the ß operator to the hill climbing.


Subject(s)
Artificial Intelligence , Data Mining/methods , Mathematical Computing , Algorithms , Cluster Analysis , Datasets as Topic , Humans
SELECTION OF CITATIONS
SEARCH DETAIL
...