Accurate prediction of electricity generation from diverse renewable energy sources (RES) plays a pivotal role in optimizing power schedules within RES, contributing to the collective effort to combat climate change. While prior research often focused on individual energy sources in isolation, neglecting intricate interactions among multiple sources, this limitation frequently leads to inaccurate estimations of total power generation. In this study, we introduce a hybrid architecture designed to address these challenges, incorporating advanced artificial intelligence (AI) techniques.
View Article and Find Full Text PDFIn the dynamic domain of logistics, effective communication is essential for streamlined operations. Our innovative solution, the Multi-Labeling Ensemble (MLEn), tackles the intricate task of extracting multi-labeled data, employing advanced techniques for accurate preprocessing of textual data through the NLTK toolkit. This approach is carefully tailored to the prevailing language used in logistics communication.
View Article and Find Full Text PDFThis study focuses on addressing computational limits in smartphones by proposing an efficient authentication model that enables implicit authentication without requiring additional hardware and incurring less computational cost. The research explores various wrapper feature selection strategies and classifiers to enhance authentication accuracy while considering smartphone limitations such as hardware constraints, battery life, and memory size. However, the available dataset is small; thus, it cannot support a general conclusion.
View Article and Find Full Text PDFThe rapid expansion of AI-enabled Internet of Things (IoT) devices presents significant security challenges, impacting both privacy and organizational resources. The dynamic increase in big data generated by IoT devices poses a persistent problem, particularly in making decisions based on the continuously growing data. To address this challenge in a dynamic environment, this study introduces a specialized BERT-based Feed Forward Neural Network Framework (BEFNet) designed for IoT scenarios.
View Article and Find Full Text PDFThis research centres on developing a Home Electricity Management (HEM) system, a pivotal component within the modern supply chain for home electrical power. The system optimizes the scheduling of intelligent home gadgets through advanced meta-heuristics, specifically the Social Spider Algorithm (SSA) and Strawberry Algorithm (SWA), to efficiently manage home energy consumption. Within the supply chain context, HEM acts as a crucial link in the distribution and utilization of electricity within households, akin to optimizing resource allocation and demand balancing within a supply chain for efficient operation and cost-effectiveness.
View Article and Find Full Text PDFThe role that vehicular fog computing based on the Fifth Generation (5G) can play in improving traffic management and motorist safety is growing quickly. The use of wireless technology within a vehicle raises issues of confidentiality and safety. Such concerns are optimal targets for conditional privacy-preserving authentication (CPPA) methods.
View Article and Find Full Text PDFIn the era of interconnected and intelligent cyber-physical systems, preserving privacy has become a paramount concern. This paper aims a groundbreaking proof-of-concept (PoC) design that leverages consortium blockchain technology to address privacy challenges in cyber-physical systems (CPSs). The proposed design introduces a novel approach to safeguarding sensitive information and ensuring data integrity while maintaining a high level of trust among stakeholders.
View Article and Find Full Text PDFThe swift advancement of the Internet of Things (IoT), coupled with the growing application of healthcare software in this area, has given rise to significant worries about the protection and confidentiality of critical health data. To address these challenges, blockchain technology has emerged as a promising solution, providing decentralized and immutable data storage and transparent transaction records. However, traditional blockchain systems still face limitations in terms of preserving data privacy.
View Article and Find Full Text PDFFifth-generation (5G)-enabled vehicular fog computing technologies have always been at the forefront of innovation because they support smart transport like the sharing of traffic data and cooperative processing in the urban fabric. Nevertheless, the most important factors limiting progress are concerns over message protection and safety. To cope with these challenges, several scholars have proposed certificateless authentication schemes with pseudonyms and traceability.
View Article and Find Full Text PDFFor the betterment of human life, smart Internet of Things (IoT)-based systems are needed for the new era. IoT is evolving swiftly for its applications in the smart environment, including smart airports, smart buildings, smart manufacturing, smart homes, etc. A smart home environment includes resource-constrained devices that are interlinked, monitored, controlled, and analyzed with the help of the Internet.
View Article and Find Full Text PDFDementia is a condition in which cognitive ability deteriorates beyond what can be anticipated with natural ageing. Characteristically it is recurring and deteriorates gradually with time affecting a person's ability to remember, think logically, to move about, to learn, and to speak just to name a few. A decline in a person's ability to control emotions or to be social can result in demotivation which can severely affect the brain's ability to perform optimally.
View Article and Find Full Text PDFUntil now most of the studies concerning eHealth in Saudi Arabia are about the exploration of the national benefits from eHealth and the technical and infrastructural challenges in implementing eHealth rather than finding the factors influencing the users in adopting eHealth services. Further, the eHealth adoption rate in Saudi Arabia is low despite the scope of potential growth for the eHealth market. In this study, the authors added Trust, Privacy and System Quality factors to Technology Acceptance Model by considering the research context to examine the factors influencing eHealth services adoption.
View Article and Find Full Text PDFMobile communication has become a dominant medium of communication over the past two decades. New technologies and competitors are emerging rapidly and churn prediction has become a great concern for telecom companies. A customer churn prediction model can provide the accurate identification of potential churners so that a retention solution may be provided to them.
View Article and Find Full Text PDFText Classification problem has been thoroughly studied in information retrieval problems and data mining tasks. It is beneficial in multiple tasks including medical diagnose health and care department, targeted marketing, entertainment industry, and group filtering processes. A recent innovation in both data mining and natural language processing gained the attention of researchers from all over the world to develop automated systems for text classification.
View Article and Find Full Text PDFMath Biosci Eng
January 2022
Cardiovascular diseases are regarded as the most common reason for worldwide deaths. As per World Health Organization, nearly 17.9 million people die of heart-related diseases each year.
View Article and Find Full Text PDFInternet of Things (IoT) and 5G are enabling intelligent transportation systems (ITSs). ITSs promise to improve road safety in smart cities. Therefore, ITSs are gaining earnest devotion in the industry as well as in academics.
View Article and Find Full Text PDFBreast cancer is becoming more dangerous by the day. The death rate in developing countries is rapidly increasing. As a result, early detection of breast cancer is critical, leading to a lower death rate.
View Article and Find Full Text PDFCryptocurrencies such as Bitcoin (BTC) have seen a surge in value in the recent past and appeared as a useful investment opportunity for traders. However, their short term profitability using algorithmic trading strategies remains unanswered. In this work, we focus on the short term profitability of BTC against the euro and the yen for an eight-year period using seven trading algorithms over trading periods of length 15 and 30 days.
View Article and Find Full Text PDF