检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:M.Manimaran Murali Dhar Roger Norabuena-Figueroa R.Mahaveerakannan S.Saraswathi K.Selvakumarasamy
机构地区:[1]Department of Computer Science and Engineering(AI&ML),School of Computing,Mohan Babu University,Tirupati,Andhra Pradesh,India [2]Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology,Avadi,Chennai,TN,India [3]Universidad Privada San Juan Bautista,Lima,Perú [4]Saveetha School of Engineering,Saveetha Institute of Medical and Technical Sciences,Chennai,TN,India
出 处:《Journal of Artificial Intelligence and Technology》2023年第4期162-172,共11页人工智能技术学报(英文)
摘 要:Smart homes present a serious challenge for the aged and those with mobility issues due to the environment’s inherent danger.Unwary people have the propensity to fall over when bending over in these settings.Here,they show two time-based reasoning models to identify incidents of potentially fatal falls that have not been accounted for(CM-I and CM-II).The ubiquitous use of IoT altimeter watches among the elderly provides a wealth of data that can be used by these algorithms to predict the likelihood of a fall based on categorization criteria.They compared actual and simulated data involving missteps,mishaps,and crashes to gauge the programmers’performance.Results suggest that using such logic models to help healthcare providers determine if senior people living in smart homes have fallen is a potential field for future study.The CM-II model had the highest prediction accuracy of any model identified in the literature,at 0.98 when compared to the test parameter.Since the number of devices linked to the IoT can be quickly extended in contrast to the number of devices connected to conventional computers,the number of hacks aimed at the IoT has grown dramatically.There is no way to fix the issue that hacked IoT devices create until they figure out how to track down the source of the attacks.Pursuing a deeper understanding of the technologies,protocols,and architecture of IoT systems,as well as the potential consequences of using infected IoT devices,is the overarching goal of this study.There are many Internet of Things(IoT)systems vulnerable to cybercriminal manipulation,so this study also explores a range of machine learning and deep learning-based methods that can be used to detect such compromise.
关 键 词:cyber defense healthcare devices Internet of Things(IoT) machine learning
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.13