Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications最新文献

筛选
英文 中文
Blockchain Technology in Enhancing Health Care Ecosystem for Sustainable Development 区块链技术增强卫生保健生态系统,促进可持续发展
Sofiene Mansouri, Souhir Chabchoub, Yousef Alharbi, Abdulrahman Alqahtani
{"title":"Blockchain Technology in Enhancing Health Care Ecosystem for Sustainable Development","authors":"Sofiene Mansouri, Souhir Chabchoub, Yousef Alharbi, Abdulrahman Alqahtani","doi":"10.58346/jowua.2023.i3.018","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.018","url":null,"abstract":"The analysis and interpretation portion of the study concentrated on managing blockchain technology and on comprehending the rate of technological advancement in actions that support the development of the sustainability and healthcare ecosystems. The study reports results of a survey from 50 respondents who were directly handling activities in the healthcare industry. The study's discussion and findings section also included information on the analysis of the survey data that was acquired. This information is crucial for raising the healthcare ecosystem's to sustainability level. Blockchain technology is one of the most significant breakthroughs of recent times. By consistently changing the healthcare industry, it advances the entire field. It is seen as a series of building blocks that preserves interpersonal trust and covers vital information. The rapid development of blockchain technology is enabling a wide variety of uses across many industries. The potential of blockchain technology will be revolutionised by the systematic production of literature evaluations. One illustration of how swiftly the world has gone digital is the emergence of countless electronic records in the healthcare industry. Blockchain technology has made it possible to eliminate third-party administration's risks in the medical industry.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135081321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Support Vector Machine and Convolutional Neural Network for Malaria Parasite Classification and Feature Extraction 支持向量机与卷积神经网络在疟疾寄生虫分类与特征提取中的比较分析
Rika Rosnelly, Bob Subhan Riza, Suparni S.
{"title":"Comparative Analysis of Support Vector Machine and Convolutional Neural Network for Malaria Parasite Classification and Feature Extraction","authors":"Rika Rosnelly, Bob Subhan Riza, Suparni S.","doi":"10.58346/jowua.2023.i3.015","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.015","url":null,"abstract":"Malaria is a dangerous infectious disease because, if it is slow to handle, it can even cause death. Malaria is caused by a parasite called plasmodium, which is transmitted through the bite of a malaria mosquito called Anopheles. Parasites transmitted by mosquitoes attack human blood cells. The inspection method used to identify the type of malaria parasite is microscopic examination, whose accuracy and efficiency depend on human expertise. Examination methods using the Rapid Diagnostic Test (RDT) and Polymerase Chain Reaction (PCR) are not affordable, especially in underprivileged areas. This study compares the performance of classification methods, namely Support Vector Machine (SVM) and Convolutional Neural Network (CNN), to identify the type of malaria parasite and its stage and develop a feature extraction algorithm. The method of feature extraction is a decisive step to identifying the type of malaria parasite. The feature extraction process by developing a feature extraction algorithm is called the PEMA and KEHE feature tracking algorithm, or feature tracking with perimeter, eccentricity, metric, area, contrast, energy, homogeneity, and entropy. The classifier uses a convolutional neural network (CNN) to divide the samples into 16 classes. The experiment used 446 images of malaria parasites. The outcome of identification showed that by tracking the PEMA and KEHE features with the SVM classifier, the best accuracy value was 85.08%, compared to CNN with an accuracy value of 61.40%.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-aware and Context-aware Fault Detection Framework for Wireless Sensor Networks 无线传感器网络能量感知和环境感知故障检测框架
Rosa Clavijo-López, Jesús Merino Velásquez, Wayky Alfredo Luy Navarrete, Cesar Augusto Flores Tananta, Dorothy Luisa Meléndez Morote, Maria Aurora Gonzales Vigo, Doris Fuster- Guillén
{"title":"Energy-aware and Context-aware Fault Detection Framework for Wireless Sensor Networks","authors":"Rosa Clavijo-López, Jesús Merino Velásquez, Wayky Alfredo Luy Navarrete, Cesar Augusto Flores Tananta, Dorothy Luisa Meléndez Morote, Maria Aurora Gonzales Vigo, Doris Fuster- Guillén","doi":"10.58346/jowua.2023.i3.001","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.001","url":null,"abstract":"Wireless sensor networks (WSNs) consist of many sensor nodes that are densely deployed throughout a randomized geographical area to monitor, detect, and analyze various physical phenomena. The primary obstacle encountered in WSNs pertains to the significant reliance of sensor nodes on finite battery power for wireless data transfer. Sensors as a crucial element inside Cyber-Physical Systems (CPS) renders them vulnerable to failures arising from intricate surroundings, substandard manufacturing, and the passage of time. Various anomalies can appear within WSNs, mostly attributed to defects such as hardware and software malfunctions and anomalies and assaults initiated by unauthorized individuals. These anomalies significantly impact the overall integrity and completeness of the data gathered by the networks. Therefore, it is imperative to provide a critical mechanism for the early detection of faults, even in the presence of constraints imposed by the sensor nodes. Machine Learning (ML) techniques encompass a range of approaches that may be employed to identify and diagnose sensor node faults inside a network. This paper presents a novel Energy-aware and Context-aware fault detection framework (ECFDF) that utilizes the Extra-Trees algorithm (ETA) for fault detection in WSNs. To assess the effectiveness of the suggested methodology for identifying context-aware faults (CAF), a simulated WSN scenario is created. This scenario consists of data from humidity and temperature sensors and is designed to emulate severe low-intensity problems. This study examines six often-seen categories of sensor fault, including drift, hard-over/bias, spike, erratic/precision, stuck, and data loss. The ECFDF approach utilizes an Energy-Efficient Fuzzy Logic Adaptive Clustering Hierarchy (EE-FLACH) algorithm to select a Super Cluster Head (SCH) within WSNs. The SCH is responsible for achieving optimal energy consumption within the network, and this selection process facilitates the early detection of faults. The results of the simulation indicate that the ECFDF technique has superior performance in terms of Fault Detection Accuracy (FDA), False-Positive Rate (FPR), and Mean Residual Energy (MRE) when compared to other detection and classification methods.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Security in Mobile Ad Hoc Networks: Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm 增强移动自组织网络的安全性:增强粒子群优化驱动的入侵检测和安全路由算法
Nikitina Vlada, Raúl A. Sánchez-Ancajima, Miguel Ángel Torres Rubio, Walter Antonio Campos- Ugaz, Anibal Mejía Benavides, María Del Rocío Hende-Santolaya, Jacqueline C. Ponce-Meza
{"title":"Enhancing Security in Mobile Ad Hoc Networks: Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm","authors":"Nikitina Vlada, Raúl A. Sánchez-Ancajima, Miguel Ángel Torres Rubio, Walter Antonio Campos- Ugaz, Anibal Mejía Benavides, María Del Rocío Hende-Santolaya, Jacqueline C. Ponce-Meza","doi":"10.58346/jowua.2023.i3.006","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.006","url":null,"abstract":"Wireless technologies have grown in popularity and are used in many applications. Transient Mobile Ad hoc Networks (MANETs) serve specific goals without infrastructure. The dynamism of these networks makes them useful for ubiquitous computing. However, high mobility, the lack of a centralized authority, and open media make MANETs vulnerable to various security risks. Thus, an Intrusion Detection System (IDS) should be used to monitor and detect system security issues. To prevent and improve security against unauthorized access, intrusion screening is crucial. The depletion of a mobile node's power supply can impact its capacity to transmit packets, as this functionality is contingent upon the system's overall lifespan. Computational Optimization-driven solutions have been prevalent in the context of IDS and secure routing inside MANETs. This research employs the Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm (EPSO-IDSRA). Enhanced Particle Swarm Optimization technique (EPSO) has provided confidence-based, secure, and energy-efficient routing in MANETs. The EPSO technique is applied to identify optimal hops for enhancing the routing process. The initial step involves the activation of the fuzzy clustering algorithm, followed by selecting Cluster Heads (CHs) based on assessing their indirect, direct, and recent confidence values. Furthermore, the identification of value nodes was contingent upon assessing confidence levels. Also, the CHs are involved in multi-hop routing, and determining the optimal route depends on the anticipated protocol, which chooses the most favorable paths considering factors such as latency, throughput, and connectivity within the designated area. The EPSO method, presented for secure routing (at time 50ms), yielded an optimal energy consumption of 0.15 millijoules, a minimal delay of 0.008 milliseconds, a maximum throughput of 0.8 bits per second, and an 89% detection rate.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135038433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Distance Measure to Perform Optimal Mapping with the K-Medoids Method on Medicinal Plants, Aromatics, and Spices Export 用距离度量对药用植物、香料和香料出口进行k - mediids方法的最优映射
Dessy Adriani, Ratna Dewi, Leni Saleh, D. Yadi Heryadi, Fatma Sarie, I Gede Iwan Sudipa, Robbi Rahim
{"title":"Using Distance Measure to Perform Optimal Mapping with the K-Medoids Method on Medicinal Plants, Aromatics, and Spices Export","authors":"Dessy Adriani, Ratna Dewi, Leni Saleh, D. Yadi Heryadi, Fatma Sarie, I Gede Iwan Sudipa, Robbi Rahim","doi":"10.58346/jowua.2023.i3.008","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.008","url":null,"abstract":"About 80% of the world's medicinal plants grow in Indonesia. The Negeri Rempah Foundation also said that Indonesia has more kinds of spices than any other country in Southeast Asia. To figure out the best way to export plants, you need to do a study that groups them by their main destination country. This is called \"clustering,\" and it can be done by doing regional mapping. In the clustering process, measuring deviation/distance or distance space is a key part of figuring out how similar or regular data and items are. K-Medoids is one way to group things together. K-Medoids is an algorithm that groups data based on how far apart they are. Distance Measure is a way to measure the distance between two points. It can help an algorithm sort object into groups based on how similar their variables are. The dataset used comes from the Customs Documents of the Directorate General of Customs and Excise on the official website of the Central Bureau of Statistics for the period of 2012-2021 about the Export of Medicinal, Aromatic, and Spices Plants. This study uses mixed measures (mixed euclideandistance), numerical measures (camberradistance), and bregmandivergences (generalizeddivergence). The mapping results are compared with the validation of the Davies Bouldin Index (DBI). With the help of the rapidminer software, a number of tests were done. The results showed that using mixed measures (mixed euclideandistance) with a value of k=4 gave a DBI value of 0.021. Because it gives a DBI value close to 0, the K-Medoids algorithm with mixed measures (mixedeuclideandistance) is thought to work better than other distance measures.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the Impact of Communicative Artificial Intelligence Based Accounting Information Systems on Small and Medium Enterprises 评估基于通信人工智能的会计信息系统对中小企业的影响
Yus Hermansyah
{"title":"Assessing the Impact of Communicative Artificial Intelligence Based Accounting Information Systems on Small and Medium Enterprises","authors":"Yus Hermansyah","doi":"10.58346/jowua.2023.i3.017","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.017","url":null,"abstract":"Recent breakthroughs in deep learning have led to the development of cutting-edge industrial applications of Communicative Artificial Intelligence (AI), making it indispensable for businesses aiming to maintain a competitive edge. Consequently, artificial intelligence is no longer exclusive to large corporations; it now impacts businesses of all sizes, including small and medium-sized enterprises (SMEs), serving as a tool for command in the production and communication of crucial business aspects. This article delves into the extent of Communicative AI adoption by SMEs in Indonesia, shedding light on issues related to implementing industrial AI applications. To achieve this, a sample of SMEs participated in a structured online survey. Currently, AI adoption among SMEs in Indonesia is minimal. The reluctance is primarily attributed to high costs, extended duration, and inherent risks of developing proprietary applications. Instead, SMEs are heavily relying on AI-as-a-service and other cloud-based solutions. Various factors contribute to businesses' hesitancy. The slow progress in SME implementation indicates misunderstandings related to data and a lack of knowledge, influencing how these enterprises perceive the obstacles they encounter.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135040237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Document Vector Representation with Enhanced Features Based on Doc2VecC 基于Doc2VecC的增强特征文档向量表示
Li Gang, Huanbin Zhao, Tongzhou Zhao
{"title":"Document Vector Representation with Enhanced Features Based on Doc2VecC","authors":"Li Gang, Huanbin Zhao, Tongzhou Zhao","doi":"10.1007/s11036-023-02205-8","DOIUrl":"https://doi.org/10.1007/s11036-023-02205-8","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"112 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87688123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving User Experience (UX) by Applying (Interactive) Infographic in the Human Computer Interaction Context 通过在人机交互环境中应用(交互式)信息图来改善用户体验
W.V. Siricharoen
{"title":"Improving User Experience (UX) by Applying (Interactive) Infographic in the Human Computer Interaction Context","authors":"W.V. Siricharoen","doi":"10.1007/s11036-023-02179-7","DOIUrl":"https://doi.org/10.1007/s11036-023-02179-7","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82252973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contact Tracing App Privacy: What Data is Shared by Non-GAEN Contact Tracing Apps 联系人跟踪应用隐私:非gaen联系人跟踪应用共享哪些数据
D. Leith
{"title":"Contact Tracing App Privacy: What Data is Shared by Non-GAEN Contact Tracing Apps","authors":"D. Leith","doi":"10.1007/s11036-023-02136-4","DOIUrl":"https://doi.org/10.1007/s11036-023-02136-4","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82560340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video Resources Recommendation for Online Tourism Teaching in Interactive Network 交互式网络下在线旅游教学视频资源推荐
Yang Yang, Haitao Shang, Nasir Jamal, Farhan Ullah
{"title":"Video Resources Recommendation for Online Tourism Teaching in Interactive Network","authors":"Yang Yang, Haitao Shang, Nasir Jamal, Farhan Ullah","doi":"10.1007/s11036-023-02193-9","DOIUrl":"https://doi.org/10.1007/s11036-023-02193-9","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88416576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信