Elrawy, M. F., Awad, A. I., Hamed, H. F. & A Intrusion detection systems for IoT-based smart environments: a survey. J. Cloud Comput. 7 (1), 1–20. https://doi.org/10.1186/s13677-018-0123-6 (2018).
Google…

Elrawy, M. F., Awad, A. I., Hamed, H. F. & A Intrusion detection systems for IoT-based smart environments: a survey. J. Cloud Comput. 7 (1), 1–20. https://doi.org/10.1186/s13677-018-0123-6 (2018).
Google…

To evaluate the performance of this algorithm, the CEC201760 and CEC202261 benchmark function sets are chosen. The CEC2017 set comprises a total of 29 benchmark functions. Among them, F1 to F5 are unimodal functions…

A general overview of our machine learning approach is given in Fig. 1. Roughly, it consists of three steps. First, the smartwatch time series data is transformed to capture the dynamics and segmented into windows of several minutes. Then the…

To better illustrate the proposed method and demonstrate its merit, we present an engineering example in this section.
An automatic pallet changer is a significant component in CNC machining centers. Processed and pending workpieces can be swiftly…

The proposed HOGPNN approach was executed using Python 3.7 with the Pytorch library and TensorFlow44,45. The experimentation was performed in an Intel i5 processor with 16 GB RAM and a 64-bit processor in the Windows 10 OS. The…

The proposed FBCI-SHS addresses critical privacy, security, and efficiency challenges in IoMT-based smart healthcare. Integrating federated learning, blockchain, and IoT ensures secure health monitoring, intrusion detection, and proactive patient…

This paper uses 3D joint data captured by Vicon or Kinect sensors as input, and the predicted quality scores of rehabilitation movements as output. Video information is processed by the Frame Topology Fusion (FTF) block, which builds upon the…

Let V(t) be the cerebral blood volume \([\textrm{mL}]\) (per \(\,100\,\textrm{g}\)) at time \(t\,[\textrm{hr}]\). We suppose that the hypoxic-ischemic period ends at \(t=0\). Let \(t_\textrm{max}>0\) be the maximum time (

We explore the dynamical properties inherent to a vehicle fleet operating within a transportation system. Consider a fleet of vehicles comprising N vehicles traversing a single-lane road, wherein each vehicle…

This study provides a structured and systematic approach to identifying, evaluating, and prioritizing risks in digital healthcare systems using FMEA. The analysis deliberately relied on lightweight, widely available tooling rather than custom…