Voice signal analysis and identification of disease framework for Parkinson's disease (PD) is most required thing in the past few years. A new framework for determination and identification of PD is the world's most severe neurological disorder, was proposed in this article. It is the most dangerous infection which disables individuals' discourse, and different attributes, for example feelings and sensation. In this work, we initially examined about a new approach for determining the PD. Second, we proposed cloud based storage architecture for securing data in cloud computing environment. Cloud based system for distinguishing and checking Parkinson infection will expand its significance in social insurance benefit in low asset setting and security examination. This structure guarantees effective handling of huge information in distributed computing condition and acquires business experiences. In the creating nations, where the greater part of the general population does not get appropriate social insurance benefits and are not concerned of Parkinson's sickness, not to mention recognizing and getting human services for PD, this framework can be extremely commonsense and helpful. The framework, PD affected patient can be effortlessly identified as well as analyzed by giving their voice tests over their telephones. The proposed frameworks are profited to accomplish 95.8% precision in the cloud condition for recognizing PD. It is normal that the proposed system will possibly empower social insurance benefit for PD patients, who live in remote territories.
Artificial Intelligence (AI) ethics are the values and principles that govern the creation and application of AI. As AI technology develops quickly, there is rising worry about the possible ethical ramifications of its application, including concerns about privacy, bias, accountability, transparency, safety, and the effect on society as a whole. Making sure AI systems are created and used in a way that respects human rights and values is one of the main concerns of AI ethics. For instance, there can be worries about the use of AI in surveillance or the possibility that these technologies will legitimise already-existing social prejudices and discrimination. Making sure AI systems are accountable and transparent is a key aspect of AI ethics. It can be challenging to comprehend how AI systems make judgements and who is accountable for those decisions as they get more complicated and autonomous. Transparency in AI research and decision-making, as well as systems for accountability and remedies when things go wrong, are becoming increasingly important. Additionally, it's important to guarantee the security and safety of AI systems. Concern over the possibility of cyberattacks and other types of harmful use is growing as AI systems become more linked and incorporated into our daily lives. Finally, it's important to make sure that AI is created and applied in a way that benefits all humanity. This entails tackling problems like employment loss, economic inequality, and the possibility that AI will be applied in ways that are detrimental to society. There is an increasing need for cooperation between business, government, academia, and civil society to address these and other ethical issues. This involves creating moral standards, norms, and best practises as well as the systems necessary to guarantee responsibility and compliance.
Mobile computing is a term used to refer to a variety of devices that allow accessing data and information from anytime, anyplace, anywhere. The mobile networks are often deployed in complex environments in which to provide a secure transmission and also to detect the hackers. An adversary can capture and compromise mobile nodes, generate replicas of those nodes, and mount a variety of attacks with the replicas injects into the network. These attacks are dangerous because they allow the attacker to leverage and compromise of a few nodes to exert control over much of the network. Thus adversaries can capture some nodes, replicate them and deploy those replicas back into the strategic positions in the network to launch a variety of attacks. These are referred to as node replication attacks. Some methods of defending against node replication attacks have been proposed only in static networks. This paper proposes the work for mobile networks for detecting replica node attack. In this scenario, one of the dangerous attack is the replica attack, in which the adversary takes the secret keying materials from a compromised node, generates a large number of attackercontrolled replicas that share the node's keying materials and ID, and then spreads these replicas throughout the network. To prevent and avoid such replica nodes, each and every node has its own spread value generated by pseudo random number which is registered in base station including IP address along with their secret keying materials. Whenever mobile node sends packet through base station by transmission channel, at the time detection and verification of nodes were performed by applying GUIDE technique. Then the base station allows broadcasting the packets and reaching destination IP address. Thereby we can avoid the replica node attacks and also provide information of intruders in efficient manner to achieve effective and robust replica detection capability with reasonable overheads.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.