Now showing items 2631-2640 of 2682
Towards Knowledge Driven Decision Support for Personalized Home-based Self-management of Chronic Diseases
(IEEE Press, 2015-08)
The use of ICT technologies to facilitate self-management for patients with chronic diseases attracts increasing attention in smart healthcare. Existing research has mainly focused on sensing and data processing technologies ...
A T1OWA Fuzzy Linguistic Aggregation Methodology for Searching Feature-based Opinions.
Online services such as Amazon, Tripadvisor, Ebay, etc., allow users to express sentiments about different products or services. Not only that, in some cases it is also possible to express sentiments about the different ...
Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study
In this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review of intrusion detection systems based on ...
An attitudinal trust recommendation mechanism to balance consensus and harmony in group decision making
This article puts forward a trust based framework for building a recommendation mechanism for consensus in group decision making with interval-valued intuitionistic fuzzy information. To do that, it first presents an ...
Policy-Based Security Management System for 5G Heterogeneous Networks
(Wiley Hindawi, 2019-11-14)
Advances in mobile phone technology and the growth of associated networks have been phenomenal over the last decade. Therefore, they have been the focus of much academic research, driven by commercial and end-user demands ...
The Business of Robots and AI
(Palgrave Macmillan, 2020-01-01)
The paper studies the involvement of business in the development of ethics for robots and AI
A novel multi-objective evolutionary algorithm based on space partitioning
To design an e ective multi-objective optimization evolutionary algorithms (MOEA), we need to address the following issues: 1) the sensitivity to the shape of true Pareto front (PF) on decomposition-based MOEAs; 2) the ...
DL-Droid: Deep learning based android malware detection using real devices
The Android operating system has been the most popular for smartphones and tablets since 2012. This popularity has led to a rapid raise of Android malware in recent years. The sophistication of Android malware obfuscation ...
Resource Efficient Authentication and Session Key Establishment Procedure for Low-Resource IoT Devices
The Internet of Things (IoT) can includes many resource-constrained devices, with most usually needing to securely communicate with their network managers, which are more resource-rich devices in the IoT network. We propose ...
Smart Antennas and Intelligent Sensors Based Systems: Enabling Technologies and Applications
The growing communication and computing capabilities in the devices enlarge the connected world and improve the human life comfort level. The evolution of intelligent sensor networks and smart antennas has led to the ...