Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 5 de 5
Filtrar
Más filtros











Base de datos
Intervalo de año de publicación
1.
Comput Intell Neurosci ; 2022: 5624475, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-35909823

RESUMEN

The study examines the prospects and challenges of machine learning (ML) applications in academic forecasting. Predicting academic activities through machine learning algorithms presents an enhanced means to accurately forecast academic events, including the academic performances and the learning style of students. The use of machine learning algorithms such as K-nearest neighbor (KNN), random forest, bagging, artificial neural network (ANN), and Bayesian neural network (BNN) has potentials that are currently being applied in the education sector to predict future events. Many gaps in the traditional forecasting techniques have greatly been bridged by the use of artificial intelligence-based machine learning algorithms thereby aiding timely decision-making by education stakeholders. ML algorithms are deployed by educational institutions to predict students' learning behaviours and academic achievements, thereby giving them the opportunity to detect at-risk students early and then develop strategies to help them overcome their weaknesses. However, despite the benefits associated with the ML approach, there exist some limitations that could affect its correctness or deployment in forecasting academic events, e.g., proneness to errors, data acquisition, and time-consuming issues. Nonetheless, we suggest that machine learning remains one of the promising forecasting technologies with the power to enhance effective academic forecasting that would assist the education industry in planning and making better decisions to enrich the quality of education.


Asunto(s)
Inteligencia Artificial , Aprendizaje Automático , Algoritmos , Teorema de Bayes , Predicción , Humanos , Redes Neurales de la Computación
2.
Comput Intell Neurosci ; 2022: 3767912, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-35498196

RESUMEN

Cloud technology is a business strategy that aims to provide the necessary material to customers depending on their needs. Individuals and cloud businesses alike have embraced the cloud storage service, which has become the most widely used service. The industries outsource their data to cloud storage space to relieve themselves of the load of dealing with redundant data contents. This must be protected to prevent the theft of personal belongings, and privacy must be improved as well. Different research projects have been suggested to ensure the safe management of the information included within the data content. The security of current research projects, on the contrary, still needs improvement. As a result, this method has been suggested to address the security concerns associated with cloud computing. The primary goal of this study effort is to offer a safe environment for cloud users while also increasing the profit of cloud resource providers by managing and securely delivering data contents to the cloud users. The bulk of sectors, including business, finance, military, and healthcare industry, do not store data in cloud-based storage systems. This technique is used to attract these kinds of customers. Increasing public acceptance, medical researchers are drawn to cloud computing because it allows them to store their study material in a centralized location and distribute and access it in a more flexible manner. They were collected from numerous individuals who were being evaluated for medical care at the time. Scalable and enhanced key aggregate cryptosystem is a protected data protection method that provides highly effective security in the healthcare industry. When parties interested in a dispute disagree on the outflow of sensitive information, this technique manages the disputes and ensures the data security deployment of a cloud-based intelligent health monitoring system for the parties involved. The encrypted data structure of medical and healthcare prescriptions is recorded as they move through the hands of patients and healthcare facilities, according to the technique recommended. The double encryption approach is used in order to raise the overall degree of security. An encryption class is created by referring to the Ciphertext ID during the encryption procedure. The keyholder is a master secret key that facilitates in the recovery of the secret keys of various monsters and creatures by acting as a conduit between them. It is transferred and stored as a single aggregate for the benefit of the patient or customer in order to make decryption more convenient and efficient. A safe connection between cloud-based intelligent health monitoring systems and healthcare organizations and their patients may be established via the use of a key aggregation cryptosystem and a double encryption approach, according to the researchers. Because of this, when compared to earlier techniques, the findings reveal that the research methodology provides high levels of security in terms of confidentiality and integrity, in addition to excellent scalability.


Asunto(s)
Nube Computacional , Proyectos de Investigación , Comercio , Humanos , Inteligencia , Aprendizaje Automático
3.
Comput Intell Neurosci ; 2022: 8173372, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-35463278

RESUMEN

In the contemporary era of unprecedented innovations such as the Internet of Things (IoT), modern applications cannot be imagined without the presence of a wireless sensor network (WSN). Nodes in WSN use neighbor discovery (ND) protocols to have necessary communication among the nodes. The neighbor discovery process is crucial as it is to be done with energy efficiency and minimize discovery latency and maximum percentage of neighbors discovered. The current ND approaches that are indirect in nature are categorized into methods of removal of active slots from wake-up schedules and intelligent addition of new slots. This work develops a lightweight intrusion detection system (IDS) based on two machine learning approaches, namely, feature selection and feature classification, in order to improve the security of the Internet of Things (IoT) while transferring medical data through a cloud platform. In order to take advantage of the comparatively cheap processing cost of the filter-based technique, the feature selection was carried out. The two methods are found to have certain drawbacks. The first category disturbs the original integrity of wake-up schedules leading to reduced chances of discovering new nodes in WSN as neighbors. When the second category is followed, it may have inefficient slots in the wake-up schedules leading to performance degradation. Therefore, the motivation behind the work in this paper is that by combining the two categories, it is possible to reap the benefits of both and get rid of the limitations of both. Making a hybrid is achieved by introducing virtual nodes that help maximize performance by ensuring the original integrity of wake-up schedules and adding efficient active slots. Thus, a Hybrid Approach to Neighbor Discovery (HAND) protocol is realized in WSN. The simulation study revealed that HAND outperforms the existing indirect ND models.


Asunto(s)
Internet de las Cosas , Simulación por Computador , Aprendizaje Automático
4.
Comput Intell Neurosci ; 2022: 5759521, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-35295284

RESUMEN

A large amount of patient information has been gathered in Electronic Health Records (EHRs) concerning their conditions. An EHR, as an unstructured text document, serves to maintain health by identifying, treating, and curing illnesses. In this research, the technical complexities in extracting the clinical text data are removed by using machine learning and natural language processing techniques, in which an unstructured clinical text data with low data quality is recognized by Halve Progression, which uses Medical-Fissure Algorithm which provides better data quality and makes diagnosis easier by using a cross-validation approach. Moreover, to enhance the accuracy in extracting and mapping clinical text data, Clinical Data Progression uses Neg-Seq Algorithm in which the redundancy in clinical text data is removed. Finally, the extracted clinical text data is stored in the cloud with a secret key to enhance security. The proposed technique improves the data quality and provides an efficient data extraction with high accuracy of 99.6%.


Asunto(s)
Algoritmos , Procesamiento de Lenguaje Natural , Exactitud de los Datos , Registros Electrónicos de Salud , Humanos , Aprendizaje Automático
5.
Comput Intell Neurosci ; 2022: 8421434, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-36911247

RESUMEN

A significant study has been undertaken in the areas of health care and administration of cutting-edge artificial intelligence (AI) technologies throughout the previous decade. Healthcare professionals studied smart gadgets and other medical technologies, along with the AI-based Internet of Things (IoT) (AIoT). Connecting the two regions makes sense in terms of improving care for rural and isolated resident individuals. The healthcare industry has made tremendous strides in efficiency, affordability, and usefulness as a result of new research options and major cost reductions. This includes instructions (AIoT-based) medical advancements can be both beneficial and detrimental. While the IoT concept undoubtedly offers a number of benefits, it also poses fundamental security and privacy concerns regarding medical data. However, resource-constrained AIoT devices are vulnerable to a number of assaults, which can significantly impair their performance. Cryptographic algorithms used in the past are inadequate for safeguarding IoT-enabled networks, presenting substantial security risks. The AIoT is made up of three layers: perception, network, and application, all of which are vulnerable to security threats. These threats can be aggressive or passive in nature, and they can originate both within and outside the network. Numerous IoT security issues, including replay, sniffing, and eavesdropping, have the ability to obstruct network communication. The AIoT-H application is likely to be explored in this research article due to its potential to aid with existing and different technologies, as well as bring useful solutions to healthcare security challenges. Additionally, every day, several potential problems and inconsistencies with the AIoT-H technique have been discovered.


Asunto(s)
Inteligencia Artificial , Seguridad Computacional , Humanos , Atención a la Salud , Algoritmos , Privacidad
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA