首页 > 最新文献

International Journal of Online and Biomedical Engineering最新文献

英文 中文
Anomaly Detection from Crowded Video by Convolutional Neural Network and Descriptors Algorithm: Survey 基于卷积神经网络和描述子算法的拥挤视频异常检测研究综述
IF 1.3 Q2 Engineering Pub Date : 2023-06-13 DOI: 10.3991/ijoe.v19i07.38871
Ali Abid Hussan Altalbi, Shaimaa Hameed Shaker, Akbas Ezaldeen Ali
Depending on the context of interest, an anomaly is defined differently. In the case when a video event isn't expected to take place in the video, it is seen as anomaly. It can be difficult to describe uncommon events in complicated scenes, but this problem is frequently resolved by using high-dimensional features as well as descriptors. There is a difficulty in creating reliable model to be trained with these descriptors because it needs a huge number of training samples and is computationally complex. Spatiotemporal changes or trajectories are typically represented by features that are extracted. The presented work presents numerous investigations to address the issue of abnormal video detection from crowded video and its methodology. Through the use of low-level features, like global features, local features, and feature features. For the most accurate detection and identification of anomalous behavior in videos, and attempting to compare the various techniques, this work uses a more crowded and difficult dataset and require light weight for diagnosing anomalies in objects through recording and tracking movements as well as extracting features; thus, these features should be strong and differentiate objects. After reviewing previous works, this work noticed that there is more need for accuracy in video modeling and decreased time, and since attempted to work on real-time and outdoor scenes.
根据感兴趣的上下文,异常的定义不同。在视频中不期望发生视频事件的情况下,它被视为异常。在复杂的场景中描述不常见的事件可能很困难,但这个问题通常通过使用高维特征和描述符来解决。用这些描述符创建可靠的模型是很困难的,因为它需要大量的训练样本,而且计算很复杂。时空变化或轨迹通常由提取的特征表示。提出的工作提出了大量的调查,以解决从拥挤的视频异常视频检测及其方法的问题。通过使用低级特征,如全局特征、局部特征和特征特征。为了最准确地检测和识别视频中的异常行为,并试图比较各种技术,这项工作使用了一个更拥挤和困难的数据集,并且需要通过记录和跟踪运动以及提取特征来诊断物体中的异常;因此,这些特征应该是强大的,并区分对象。在回顾之前的作品后,本作品注意到视频建模的准确性和时间的减少,因此尝试在实时和户外场景上工作。
{"title":"Anomaly Detection from Crowded Video by Convolutional Neural Network and Descriptors Algorithm: Survey","authors":"Ali Abid Hussan Altalbi, Shaimaa Hameed Shaker, Akbas Ezaldeen Ali","doi":"10.3991/ijoe.v19i07.38871","DOIUrl":"https://doi.org/10.3991/ijoe.v19i07.38871","url":null,"abstract":"Depending on the context of interest, an anomaly is defined differently. In the case when a video event isn't expected to take place in the video, it is seen as anomaly. It can be difficult to describe uncommon events in complicated scenes, but this problem is frequently resolved by using high-dimensional features as well as descriptors. There is a difficulty in creating reliable model to be trained with these descriptors because it needs a huge number of training samples and is computationally complex. Spatiotemporal changes or trajectories are typically represented by features that are extracted. The presented work presents numerous investigations to address the issue of abnormal video detection from crowded video and its methodology. Through the use of low-level features, like global features, local features, and feature features. For the most accurate detection and identification of anomalous behavior in videos, and attempting to compare the various techniques, this work uses a more crowded and difficult dataset and require light weight for diagnosing anomalies in objects through recording and tracking movements as well as extracting features; thus, these features should be strong and differentiate objects. After reviewing previous works, this work noticed that there is more need for accuracy in video modeling and decreased time, and since attempted to work on real-time and outdoor scenes.","PeriodicalId":36900,"journal":{"name":"International Journal of Online and Biomedical Engineering","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70113256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Review of the Intelligent Digital Storytelling Process in Disseminating Health Information 健康信息传播中智能数字故事讲述过程的系统评价
IF 1.3 Q2 Engineering Pub Date : 2023-06-13 DOI: 10.3991/ijoe.v19i07.37431
Kawitsara Eambunnapong, P. Nilsook, P. Wannapiroon
Digital storytelling is a new concept in education that involves creating meaning. It is a tool with great potential, but in Thailand, it is currently not very popular in terms of sharing stories about disease. This review analyzes the components and processes of intelligent digital storytelling to aid the development of an intelligent digital storytelling platform for disseminating health information. Based on the synthesis of relevant documents, the research process involves 9 main steps: 1) identifying the review objectives, 2) reviewing research questions, 3) determining inclusion criteria, 4) finding relevant studies, 5) selecting documents, 6) data extraction, 7) arriving at a conclusion, 8) document synthesis and 9) discussion of the results. A study of articles from the PRISMA Checklist published between 2017 and 2022 revealed that ultimately only 47 articles met the inclusion criteria. From the analysis of the data, it was found that there are four main elements and 16 sub-components of intelligent digital storytelling. There are 12 steps in the process of intelligent digital storytelling with regard to health information dissemination. The optimal length of an intelligent digital narrative video clip relating to health information dissemination is approximately 2-5 minutes when it comes to achieving the best knowledge of health information.
数字讲故事是教育中的一个新概念,涉及创造意义。这是一个极具潜力的工具,但在泰国,它目前在分享疾病故事方面并不太受欢迎。这篇综述分析了智能数字讲故事的组成部分和过程,以帮助开发用于传播健康信息的智能数字讲讲故事平台。在综合相关文件的基础上,研究过程包括9个主要步骤:1)确定审查目标,2)审查研究问题,3)确定纳入标准,4)寻找相关研究,5)选择文件,6)数据提取,7)得出结论,8)文件综合和9)讨论结果。一项对2017年至2022年间发表的PRISMA检查表中的文章的研究显示,最终只有47篇文章符合入选标准。通过对数据的分析发现,智能数字讲故事有四个主要元素和16个子组成部分。在健康信息传播方面,智能数字讲故事的过程有12个步骤。当涉及到获得健康信息的最佳知识时,与健康信息传播有关的智能数字叙事视频剪辑的最佳长度约为2-5分钟。
{"title":"A Systematic Review of the Intelligent Digital Storytelling Process in Disseminating Health Information","authors":"Kawitsara Eambunnapong, P. Nilsook, P. Wannapiroon","doi":"10.3991/ijoe.v19i07.37431","DOIUrl":"https://doi.org/10.3991/ijoe.v19i07.37431","url":null,"abstract":"Digital storytelling is a new concept in education that involves creating meaning. It is a tool with great potential, but in Thailand, it is currently not very popular in terms of sharing stories about disease. This review analyzes the components and processes of intelligent digital storytelling to aid the development of an intelligent digital storytelling platform for disseminating health information. Based on the synthesis of relevant documents, the research process involves 9 main steps: 1) identifying the review objectives, 2) reviewing research questions, 3) determining inclusion criteria, 4) finding relevant studies, 5) selecting documents, 6) data extraction, 7) arriving at a conclusion, 8) document synthesis and 9) discussion of the results. A study of articles from the PRISMA Checklist published between 2017 and 2022 revealed that ultimately only 47 articles met the inclusion criteria. From the analysis of the data, it was found that there are four main elements and 16 sub-components of intelligent digital storytelling. There are 12 steps in the process of intelligent digital storytelling with regard to health information dissemination. The optimal length of an intelligent digital narrative video clip relating to health information dissemination is approximately 2-5 minutes when it comes to achieving the best knowledge of health information.","PeriodicalId":36900,"journal":{"name":"International Journal of Online and Biomedical Engineering","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47247427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Weighting Model of Cybersecurity Parameters Used for Service Placement 用于服务布局的网络安全参数加权模型
IF 1.3 Q2 Engineering Pub Date : 2023-06-13 DOI: 10.3991/ijoe.v19i07.39285
Luan Gashi, A. Luma, M. Apostolova, Ylber Januzaj
Most cybersecurity frameworks are based on three major components such as confidentiality, integrity, and availability. All these components have their parameters that are used to secure network nodes. But finding the most cyber secure node in a network needs a measurement method. The aim of the paper is to offer a model that can be used to find the most secure network nodes considering these cybersecurity components and their parameters. This is achieved by modelling numeric values of respective weights for parameters of confidentiality, integrity, and availability. The model is applied to a simulated environment where random values standing for cybersecurity parameters are given to 30 wireless network nodes that are used as an example. Then the weighted values are processed with Python programming language by giving the most secure nodes according to needed cybersecurity components. This model can be used to recommend the right network node that can be used to deploy services securely while avoiding potential vulnerabilities and cyber-attacks.  
大多数网络安全框架基于三个主要组成部分,如机密性、完整性和可用性。所有这些组件都具有用于保护网络节点的参数。但是,要找到网络中最安全的节点,需要一种测量方法。本文的目的是提供一个模型,该模型可用于在考虑这些网络安全组件及其参数的情况下找到最安全的网络节点。这是通过对机密性、完整性和可用性参数的各个权重的数值进行建模来实现的。该模型应用于模拟环境,其中代表网络安全参数的随机值被提供给用作示例的30个无线网络节点。然后使用Python编程语言处理加权值,根据所需的网络安全组件提供最安全的节点。该模型可用于推荐正确的网络节点,用于安全部署服务,同时避免潜在的漏洞和网络攻击。
{"title":"A Weighting Model of Cybersecurity Parameters Used for Service Placement","authors":"Luan Gashi, A. Luma, M. Apostolova, Ylber Januzaj","doi":"10.3991/ijoe.v19i07.39285","DOIUrl":"https://doi.org/10.3991/ijoe.v19i07.39285","url":null,"abstract":"Most cybersecurity frameworks are based on three major components such as confidentiality, integrity, and availability. All these components have their parameters that are used to secure network nodes. But finding the most cyber secure node in a network needs a measurement method. The aim of the paper is to offer a model that can be used to find the most secure network nodes considering these cybersecurity components and their parameters. This is achieved by modelling numeric values of respective weights for parameters of confidentiality, integrity, and availability. The model is applied to a simulated environment where random values standing for cybersecurity parameters are given to 30 wireless network nodes that are used as an example. Then the weighted values are processed with Python programming language by giving the most secure nodes according to needed cybersecurity components. This model can be used to recommend the right network node that can be used to deploy services securely while avoiding potential vulnerabilities and cyber-attacks. \u0000 ","PeriodicalId":36900,"journal":{"name":"International Journal of Online and Biomedical Engineering","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44123284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Edge-Fog-Cloud Data Analysis for eHealth-IoT eHealth物联网的边缘雾云数据分析
IF 1.3 Q2 Engineering Pub Date : 2023-06-13 DOI: 10.3991/ijoe.v19i07.38903
Chaimae Zaoui, F. Benabbou, Abdelaziz Ettaoufik
Thanks to advancements in artificial intelligence and the Internet of Things (IoT), eHealth is becoming an increasingly attractive area for researchers. However, different challenges arise when sensor-generated information is stored and analyzed using cloud computing. Latency, response time, and security are critical concerns that require attention. Fog and Edge Computing technologies have emerged in response to the requirement for resources near the network edge where data is collected, to minimize cloud challenges. This paper aims to assess the effectiveness of Machine Learning (ML) and Deep Learning (DL) techniques when executed in Edge or Fog nodes within the eHealth data. We compared the most efficient baseline techniques from the state-of-the-art on three eHealth datasets: Human Activity Recognition (HAR), University of Milano Bicocca Smartphone-based Human Activity Recognition (UniMiB SHAR), and MIT-BIH Arrhythmia. The experiment showed that for the HAR dataset, the Support Vector Machines (SVM) model was the best performer among the ML techniques, with low processing time and an accuracy of 96%. In comparison, the K-Nearest Neighbors (KNN) performed 94.43, and 96%, respectively, for SHAR and MIT-BIH datasets. Among the DL techniques, the Convolutional Neural Network with Fourier (CNNF) model performed the best, with accuracies of 94.49% and 98.72% for HAR and MIT-BIH. In comparison, CNN achieved 96.90% for the SHAR dataset.  
由于人工智能和物联网(IoT)的进步,电子健康正成为研究人员越来越有吸引力的领域。然而,当使用云计算存储和分析传感器生成的信息时,会出现不同的挑战。延迟、响应时间和安全性是需要关注的关键问题。雾和边缘计算技术的出现是为了应对收集数据的网络边缘附近的资源需求,以最大限度地减少云挑战。本文旨在评估机器学习(ML)和深度学习(DL)技术在eHealth数据中的Edge或Fog节点中执行时的有效性。我们在三个eHealth数据集上比较了最先进的最有效的基线技术:人类活动识别(HAR)、米兰大学Bicocca智能手机人类活动识别系统(UniMiB SHAR)和MIT-BIH心律失常。实验表明,对于HAR数据集,支持向量机(SVM)模型是ML技术中表现最好的,处理时间较短,准确率为96%。相比之下,对于SHAR和MIT-BIH数据集,K-最近邻(KNN)分别执行了94.43%和96%。在DL技术中,具有傅立叶的卷积神经网络(CNNF)模型表现最好,HAR和MIT-BIH的准确率分别为94.49%和98.72%。相比之下,CNN对SHAR数据集的支持率为96.90%。
{"title":"Edge-Fog-Cloud Data Analysis for eHealth-IoT","authors":"Chaimae Zaoui, F. Benabbou, Abdelaziz Ettaoufik","doi":"10.3991/ijoe.v19i07.38903","DOIUrl":"https://doi.org/10.3991/ijoe.v19i07.38903","url":null,"abstract":"Thanks to advancements in artificial intelligence and the Internet of Things (IoT), eHealth is becoming an increasingly attractive area for researchers. However, different challenges arise when sensor-generated information is stored and analyzed using cloud computing. Latency, response time, and security are critical concerns that require attention. Fog and Edge Computing technologies have emerged in response to the requirement for resources near the network edge where data is collected, to minimize cloud challenges. This paper aims to assess the effectiveness of Machine Learning (ML) and Deep Learning (DL) techniques when executed in Edge or Fog nodes within the eHealth data. We compared the most efficient baseline techniques from the state-of-the-art on three eHealth datasets: Human Activity Recognition (HAR), University of Milano Bicocca Smartphone-based Human Activity Recognition (UniMiB SHAR), and MIT-BIH Arrhythmia. The experiment showed that for the HAR dataset, the Support Vector Machines (SVM) model was the best performer among the ML techniques, with low processing time and an accuracy of 96%. In comparison, the K-Nearest Neighbors (KNN) performed 94.43, and 96%, respectively, for SHAR and MIT-BIH datasets. Among the DL techniques, the Convolutional Neural Network with Fourier (CNNF) model performed the best, with accuracies of 94.49% and 98.72% for HAR and MIT-BIH. In comparison, CNN achieved 96.90% for the SHAR dataset. \u0000 ","PeriodicalId":36900,"journal":{"name":"International Journal of Online and Biomedical Engineering","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44607097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel SVM and K-NN Classifier Based Machine Learning Technique for Epileptic Seizure Detection 基于支持向量机和K-NN分类器的癫痫发作检测新方法
IF 1.3 Q2 Engineering Pub Date : 2023-06-13 DOI: 10.3991/ijoe.v19i07.37881
Gowrishankar K., M. V, S. R, D. S., C. Ang
An EEG signal is used for capturing the signals from the brain, which helps in localization of epileptogenic region, thereby which plays a vital role for a successful surgery. The focal and non-focal signals are obtained from the epileptogenic region and normal region respectively. The localization of epileptic seizure with the help of focal signal is necessary while detecting seizures. Hence, the present article provides detailed analysis of EEG signals. The Focal and Non-focal signals are decomposed using EMD-DWT. A combination of EMD-DWT decomposition method in accordance with log-energy entropy gives an efficient accuracy in comparison to other entropy in differentiating the Focal from Non-focal signals. The extracted features are subjected to SVM and KNN classifiers whose performance will be calculated and verified with respect to accuracy, sensitivity and specificity. At the end, it will be shown that KNN produces the highest accuracy when compared to SVM classifier.
EEG信号用于捕获来自大脑的信号,这有助于定位致痫区域,从而对成功的手术起着至关重要的作用。局灶性和非局灶性信号分别来自致痫区和正常区。在检测癫痫发作时,有必要借助局灶信号定位癫痫发作。因此,本文对脑电信号进行了详细的分析。使用EMD-DWT对聚焦和非聚焦信号进行分解。与其他熵相比,根据对数能量熵的EMD-DWT分解方法的组合在区分聚焦信号和非聚焦信号方面提供了有效的准确性。对提取的特征进行SVM和KNN分类器处理,计算和验证它们在准确性、敏感性和特异性方面的性能。最后,将表明与SVM分类器相比,KNN产生了最高的精度。
{"title":"Novel SVM and K-NN Classifier Based Machine Learning Technique for Epileptic Seizure Detection","authors":"Gowrishankar K., M. V, S. R, D. S., C. Ang","doi":"10.3991/ijoe.v19i07.37881","DOIUrl":"https://doi.org/10.3991/ijoe.v19i07.37881","url":null,"abstract":"An EEG signal is used for capturing the signals from the brain, which helps in localization of epileptogenic region, thereby which plays a vital role for a successful surgery. The focal and non-focal signals are obtained from the epileptogenic region and normal region respectively. The localization of epileptic seizure with the help of focal signal is necessary while detecting seizures. Hence, the present article provides detailed analysis of EEG signals. The Focal and Non-focal signals are decomposed using EMD-DWT. A combination of EMD-DWT decomposition method in accordance with log-energy entropy gives an efficient accuracy in comparison to other entropy in differentiating the Focal from Non-focal signals. The extracted features are subjected to SVM and KNN classifiers whose performance will be calculated and verified with respect to accuracy, sensitivity and specificity. At the end, it will be shown that KNN produces the highest accuracy when compared to SVM classifier.","PeriodicalId":36900,"journal":{"name":"International Journal of Online and Biomedical Engineering","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42786107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Archeological Sites Classification Through Partial Imaging and Convolutional Neural Networks 基于部分成像和卷积神经网络的考古遗址分类
IF 1.3 Q2 Engineering Pub Date : 2023-06-13 DOI: 10.3991/ijoe.v19i07.39045
Yaser Saleh, Muhanna A. Muhanna
In this paper, a novel approach for classifying archeological sites using publicly available images through the use of Convolutional Neural Networks (CNNs) is presented. To surmount the problem of having a limited amount of data to use in training and testing the CNNs, our approach employs the technique of fine tuning. We conducted an experiment with four popular CNN architectures: VGG-16, VGG-19, ResNet50, and InceptionV3. The results show that our models achieved an impressive accuracy of up to 98% using the VGG-16 and InceptionV3 models and up to 97% using the ResNet50 model, while the VGG-19 model produced results with an accuracy of 95%. The results of this study demonstrate the effectiveness of our proposed approach in classifying archeological sites using publicly available images and highlight the potential of deep learning techniques for archeological site classification.
在本文中,通过使用卷积神经网络(cnn)提出了一种利用公开可用的图像对考古遗址进行分类的新方法。为了克服训练和测试cnn时使用的数据量有限的问题,我们的方法采用了微调技术。我们对四种流行的CNN架构进行了实验:VGG-16、VGG-19、ResNet50和InceptionV3。结果表明,我们的模型使用VGG-16和InceptionV3模型达到了令人印象深刻的准确率高达98%,使用ResNet50模型达到了97%,而VGG-19模型产生的结果准确率为95%。本研究的结果证明了我们提出的方法在使用公开可用的图像对考古遗址进行分类方面的有效性,并突出了深度学习技术在考古遗址分类方面的潜力。
{"title":"Archeological Sites Classification Through Partial Imaging and Convolutional Neural Networks","authors":"Yaser Saleh, Muhanna A. Muhanna","doi":"10.3991/ijoe.v19i07.39045","DOIUrl":"https://doi.org/10.3991/ijoe.v19i07.39045","url":null,"abstract":"In this paper, a novel approach for classifying archeological sites using publicly available images through the use of Convolutional Neural Networks (CNNs) is presented. To surmount the problem of having a limited amount of data to use in training and testing the CNNs, our approach employs the technique of fine tuning. We conducted an experiment with four popular CNN architectures: VGG-16, VGG-19, ResNet50, and InceptionV3. The results show that our models achieved an impressive accuracy of up to 98% using the VGG-16 and InceptionV3 models and up to 97% using the ResNet50 model, while the VGG-19 model produced results with an accuracy of 95%. The results of this study demonstrate the effectiveness of our proposed approach in classifying archeological sites using publicly available images and highlight the potential of deep learning techniques for archeological site classification.","PeriodicalId":36900,"journal":{"name":"International Journal of Online and Biomedical Engineering","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43743130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Analysis of High Performance Frequency Divider in 32 nm CMOS Technology for Biomedical Applications 用于生物医学应用的32nm CMOS高性能分频器的设计与分析
IF 1.3 Q2 Engineering Pub Date : 2023-06-13 DOI: 10.3991/ijoe.v19i07.39145
Sanjay Grewal, O. Shah
In this paper, a 3-bit frequency divider (FD) using a novel sense amplifier based flip-flop (SAFF) is presented and demonstrated. The delay in this design was meticulously improved resulting in better values of power delay product (PDP).The latching stage of the proposed design makes use of a novel single ended structure. Comparative analysis in 32 nm CMOS technology using T-SPICE revealed significant and quantitative differences between the proposed design and the existing designs. The PDP results were obtained for ±10% voltage variation, wide temperature range of -40 ℃ to 125 ℃ and at extreme corner cases. Results indicated that the PDP of the new design at nominal operating conditions decreased by minimum of 27.28% and maximum of 57.49%. The proposed design was also at par with available design in terms of area and power. The analysis on the FD proved the assertions that the proposed design is a feasible alternative for high performance applications.
本文提出并演示了一种使用新型感测放大器触发器(SAFF)的3位分频器(FD)。该设计中的延迟得到了精心改进,从而获得了更好的功率延迟乘积(PDP)值。该设计的锁存级使用了一种新颖的单端结构。使用T-SPICE对32nm CMOS技术进行的比较分析显示,所提出的设计与现有设计之间存在显著的数量差异。在±10%的电压变化、-40℃至125℃的宽温度范围以及极端拐角情况下,获得了PDP结果。结果表明,在标称运行条件下,新设计的PDP最小下降了27.28%,最大下降了57.49%。拟议设计在面积和功率方面也与现有设计持平。对FD的分析证明了所提出的设计是高性能应用的可行替代方案。
{"title":"Design and Analysis of High Performance Frequency Divider in 32 nm CMOS Technology for Biomedical Applications","authors":"Sanjay Grewal, O. Shah","doi":"10.3991/ijoe.v19i07.39145","DOIUrl":"https://doi.org/10.3991/ijoe.v19i07.39145","url":null,"abstract":"In this paper, a 3-bit frequency divider (FD) using a novel sense amplifier based flip-flop (SAFF) is presented and demonstrated. The delay in this design was meticulously improved resulting in better values of power delay product (PDP).The latching stage of the proposed design makes use of a novel single ended structure. Comparative analysis in 32 nm CMOS technology using T-SPICE revealed significant and quantitative differences between the proposed design and the existing designs. The PDP results were obtained for ±10% voltage variation, wide temperature range of -40 ℃ to 125 ℃ and at extreme corner cases. Results indicated that the PDP of the new design at nominal operating conditions decreased by minimum of 27.28% and maximum of 57.49%. The proposed design was also at par with available design in terms of area and power. The analysis on the FD proved the assertions that the proposed design is a feasible alternative for high performance applications.","PeriodicalId":36900,"journal":{"name":"International Journal of Online and Biomedical Engineering","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48459365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Working with Students with Special Educational Needs and Predictors of Burnout. The Role of ICTs. 与有特殊教育需求的学生和倦怠的预测者合作。信通技术的作用。
IF 1.3 Q2 Engineering Pub Date : 2023-06-13 DOI: 10.3991/ijoe.v19i07.37897
Agathi Stathopoulou, Despina Spinou, Anna-Maria Driga
The purpose of this study was to examine the burnout dimensions of professionals working with students with special educational needs and the role played by their personal traits in the prevalence of the syndrome. To examine this objective a sample of Greek teachers was selected. The data was collected using the online form of Maslach Burnout Inventory. The results of this research showed that the main prognostic factors of the syndrome in each dimension are the total previous service with students with special educational needs, the specialty, as well as, the age of the sample.
本研究旨在探讨特殊教育需要专业人员的职业倦怠维度,以及其个人特质在特殊教育需要学生的职业倦怠中所起的作用。为了检验这一目标,我们选择了希腊教师的样本。数据采用在线马斯拉克职业倦怠量表收集。本研究结果显示,在各维度中,影响该综合征预后的主要因素分别是与特殊教育需要学生的总服务量、专业以及样本的年龄。
{"title":"Working with Students with Special Educational Needs and Predictors of Burnout. The Role of ICTs.","authors":"Agathi Stathopoulou, Despina Spinou, Anna-Maria Driga","doi":"10.3991/ijoe.v19i07.37897","DOIUrl":"https://doi.org/10.3991/ijoe.v19i07.37897","url":null,"abstract":"The purpose of this study was to examine the burnout dimensions of professionals working with students with special educational needs and the role played by their personal traits in the prevalence of the syndrome. To examine this objective a sample of Greek teachers was selected. The data was collected using the online form of Maslach Burnout Inventory. The results of this research showed that the main prognostic factors of the syndrome in each dimension are the total previous service with students with special educational needs, the specialty, as well as, the age of the sample.","PeriodicalId":36900,"journal":{"name":"International Journal of Online and Biomedical Engineering","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43055718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
The Comparative Study of Deep Learning Neural Network Approaches for Breast Cancer Diagnosis 深度学习神经网络方法在乳腺癌诊断中的比较研究
IF 1.3 Q2 Engineering Pub Date : 2023-05-16 DOI: 10.3991/ijoe.v19i06.34905
Haslinah Mohd Nasir, Noor Mohd Ariff Brahin, S. Zainuddin, Mohd Syafiq Mispan, Ida Syafiza Binti Md Isa, M. N. A. Sha'abani
Breast cancer is one of the life threatening cancer that leads to the most death due to cancer among the women. Early diagnosis might help to reduce mortality. Thus, this research aims to study on different approaches of the deep learning neural network model for breast cancer early detection for better prognosis. The performance of deep learning approaches such as Artificial Neural Network (ANN), Recurrent Neural Network (RNN) and Convolution Neural Network (CNN) are evaluated using the dataset from the University of Wisconsin. The findings show ANN achieved high accuracy of 99.9 % compared to others in detecting breast cancer. ANN is able to deliver better results with the provided dataset. However, more improvement needed for better performance to ensure that the approach used is reliable enough for breast cancer early diagnosis.
癌症是威胁生命的癌症之一,在女性中导致癌症死亡人数最多。早期诊断可能有助于降低死亡率。因此,本研究旨在研究深度学习神经网络模型用于乳腺癌症早期检测的不同方法,以获得更好的预后。使用威斯康星大学的数据集评估了人工神经网络(ANN)、递归神经网络(RNN)和卷积神经网络(CNN)等深度学习方法的性能。研究结果表明,与其他方法相比,人工神经网络检测癌症的准确率高达99.9%。ANN能够利用所提供的数据集提供更好的结果。然而,需要更多的改进才能获得更好的性能,以确保所使用的方法对于乳腺癌症的早期诊断足够可靠。
{"title":"The Comparative Study of Deep Learning Neural Network Approaches for Breast Cancer Diagnosis","authors":"Haslinah Mohd Nasir, Noor Mohd Ariff Brahin, S. Zainuddin, Mohd Syafiq Mispan, Ida Syafiza Binti Md Isa, M. N. A. Sha'abani","doi":"10.3991/ijoe.v19i06.34905","DOIUrl":"https://doi.org/10.3991/ijoe.v19i06.34905","url":null,"abstract":"Breast cancer is one of the life threatening cancer that leads to the most death due to cancer among the women. Early diagnosis might help to reduce mortality. Thus, this research aims to study on different approaches of the deep learning neural network model for breast cancer early detection for better prognosis. The performance of deep learning approaches such as Artificial Neural Network (ANN), Recurrent Neural Network (RNN) and Convolution Neural Network (CNN) are evaluated using the dataset from the University of Wisconsin. The findings show ANN achieved high accuracy of 99.9 % compared to others in detecting breast cancer. ANN is able to deliver better results with the provided dataset. However, more improvement needed for better performance to ensure that the approach used is reliable enough for breast cancer early diagnosis.","PeriodicalId":36900,"journal":{"name":"International Journal of Online and Biomedical Engineering","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45198421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secured Transfer and Storage Image Data for Cloud Communications 用于云通信的安全传输和存储图像数据
IF 1.3 Q2 Engineering Pub Date : 2023-05-16 DOI: 10.3991/ijoe.v19i06.37587
Mohammad K. Abdul-Hussein, H. Alrikabi
In cloud computing, resources are used to communicate instead of local servers or individual devices. However, sharing resources among several users is a difficult issue in cloud communication. Cryptography and steganography techniques are used for cloud storage to address data security challenges. This paper presents a novel method for securely encrypting image data for transmission and link exchange with a cloud storage service. There are two phases to accomplish the encryption process, the first phase encrypts the image file by XORing it with a random key that is generated by a new hybrid of the chaotic map. The second phase converts the encrypted image format to audio format to add another layer of security and improve secure image data transfer. The random key is generated using a hybrid chaotic map and has the benefit of having more than 10256 key spaces and the necessary level of security. Based on a statistical analysis of the encryption, the quality of the image is evaluated using several criteria, and the results demonstrate the algorithm's ability to accomplish resist encryption
在云计算中,资源用于通信,而不是本地服务器或单个设备。然而,在云通信中,在多个用户之间共享资源是一个难题。加密和隐写术技术用于云存储,以应对数据安全挑战。本文提出了一种新的安全加密图像数据的方法,用于与云存储服务的传输和链路交换。加密过程分为两个阶段,第一阶段通过将图像文件与混沌映射的新混合生成的随机密钥异或来加密图像文件。第二阶段将加密的图像格式转换为音频格式,以增加另一层安全性并改进安全的图像数据传输。随机密钥是使用混合混沌映射生成的,具有超过10256个密钥空间和必要的安全级别的优点。基于对加密的统计分析,使用几个标准来评估图像的质量,结果证明了该算法实现抗加密的能力
{"title":"Secured Transfer and Storage Image Data for Cloud Communications","authors":"Mohammad K. Abdul-Hussein, H. Alrikabi","doi":"10.3991/ijoe.v19i06.37587","DOIUrl":"https://doi.org/10.3991/ijoe.v19i06.37587","url":null,"abstract":"In cloud computing, resources are used to communicate instead of local servers or individual devices. However, sharing resources among several users is a difficult issue in cloud communication. Cryptography and steganography techniques are used for cloud storage to address data security challenges. This paper presents a novel method for securely encrypting image data for transmission and link exchange with a cloud storage service. There are two phases to accomplish the encryption process, the first phase encrypts the image file by XORing it with a random key that is generated by a new hybrid of the chaotic map. The second phase converts the encrypted image format to audio format to add another layer of security and improve secure image data transfer. The random key is generated using a hybrid chaotic map and has the benefit of having more than 10256 key spaces and the necessary level of security. Based on a statistical analysis of the encryption, the quality of the image is evaluated using several criteria, and the results demonstrate the algorithm's ability to accomplish resist encryption","PeriodicalId":36900,"journal":{"name":"International Journal of Online and Biomedical Engineering","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43086654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
International Journal of Online and Biomedical Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1