Abstract:The unmanned aerial vehicles (UAVs) emerged into a promising research trend within the recurrent year where current and future networks are to use enhanced connectivity in these digital immigrations in different fields like medical, communication, and search and rescue operations among others. The current technologies are using fixed base stations to operate onsite and off-site in the fixed position with its associated problems like poor connectivity. This open gate for the UAV technology is to be used as a mo… Show more
“…When it comes to determining the prognosis of an illness such as stroke, placing all of your faith in the risk factors alone presents several challenges. e Framingham Heart Study 2 Computational Intelligence and Neuroscience proposed a methodology for predicting the risk of stroke based on a prospective cohort study of cardiovascular illness [12,13]. Especially, if this treatment is given within three hours of stroke onset, older people are benefited as much as younger people.…”
Stroke-related disabilities can have a major negative effect on the economic well-being of the person. When left untreated, a stroke can be fatal. According to the findings of this study, people who have had strokes generally have abnormal biosignals. Patients will be able to obtain prompt therapy in this manner if they are carefully monitored; their biosignals will be precisely assessed and real-time analysis will be performed. On the contrary, most stroke diagnosis and prediction systems rely on image analysis technologies such as CT or MRI, which are not only expensive but also hard to use. In this study, we develop a machine learning algorithm for the prediction of stroke in the brain, and this prediction is carried out from the real-time samples of electromyography (EMG) data. The study uses synthetic samples for training the support vector machine (SVM) classifier and then the testing is conducted in real-time samples. To improve the accuracy of prediction, the samples are generated using the data augmentation principle, which supports training with vast data. The simulation is conducted to test the efficacy of the model, and the results show that the proposed classifier achieves a higher rate of classification accuracy than the existing methods. Furthermore, it is seen that the rate of precision, recall, and f-measure is higher in the proposed SVM than in other methods.
“…When it comes to determining the prognosis of an illness such as stroke, placing all of your faith in the risk factors alone presents several challenges. e Framingham Heart Study 2 Computational Intelligence and Neuroscience proposed a methodology for predicting the risk of stroke based on a prospective cohort study of cardiovascular illness [12,13]. Especially, if this treatment is given within three hours of stroke onset, older people are benefited as much as younger people.…”
Stroke-related disabilities can have a major negative effect on the economic well-being of the person. When left untreated, a stroke can be fatal. According to the findings of this study, people who have had strokes generally have abnormal biosignals. Patients will be able to obtain prompt therapy in this manner if they are carefully monitored; their biosignals will be precisely assessed and real-time analysis will be performed. On the contrary, most stroke diagnosis and prediction systems rely on image analysis technologies such as CT or MRI, which are not only expensive but also hard to use. In this study, we develop a machine learning algorithm for the prediction of stroke in the brain, and this prediction is carried out from the real-time samples of electromyography (EMG) data. The study uses synthetic samples for training the support vector machine (SVM) classifier and then the testing is conducted in real-time samples. To improve the accuracy of prediction, the samples are generated using the data augmentation principle, which supports training with vast data. The simulation is conducted to test the efficacy of the model, and the results show that the proposed classifier achieves a higher rate of classification accuracy than the existing methods. Furthermore, it is seen that the rate of precision, recall, and f-measure is higher in the proposed SVM than in other methods.
“…Notably, where the node, the received computation is administered by the node. The workload of computation over a cloud in (6).…”
Section: Energy Efficiency In Fesc Nodementioning
confidence: 99%
“…A Multidimensional Mean Failure Cost model was developed to tackle security risk in computing. The model was able to show different points that cause network security loopholes in computing [6].…”
In recent years, the IoT) Internet of Things (IoT) allows devices to connect to the Internet that has become a promising research area mainly due to the constant emerging of the dynamic improvement of technologies and their associated challenges. In an approach to solve these challenges, fog computing came to play since it closely manages IoT connectivity. Fog-Enabled Smart Cities (IoT-ESC) portrays equitable energy consumption of a 7% reduction from 18.2% renewable energy contribution, which extends resource computation as a great advantage. The initialization of IoT-Enabled Smart Grids including (FESC) like fog nodes in fog computing, reduced workload in Terminal Nodes services (TNs) that are the sensors and actuators of the Internet of Things (IoT) set up. This paper proposes an integrated energy-efficiency model computation about the response time and delays service minimization delay in FESC. The FESC gives an impression of an auspicious computing model for location, time, and delay-sensitive applications supporting vertically -isolated, service delay, sensitive solicitations by providing abundant, ascendable, and scattered figuring stowage and system associativity. We first reviewed the persisting challenges in the proposed state-of-the models and based on them. We introduce a new model to address mainly energy efficiency about response time and the service delays in IoT-ESC. The iFogsim simulated results demonstrated that the proposed model minimized service delay and reduced energy consumption during computation. We employed IoT-ESC to decide autonomously or semi-autonomously whether the computation is to be made on Fog nodes or its transfer to the cloud.
“…This idea is meant to separate network operations from branded hardware to be run as examples of software [6]. MEC and Cloud Computing can offer network scalability on-demand; see [7] and [8]. Network slicing increases support for various types of traffic in 5G networks.…”
Network security is a crucial concern when it comes to computation, concerns like threats can have high consequences, and critical information will be shared with unauthorized persons. This paper presents a detailed survey on Fifth Generation (5G) and security aspect. This is more predictable since the core technology; the synonymous approach is possible with Fifth Generation (5G) and Beyond Technologies though with limited access. Many incidents have shown that the possibility of a hacked wireless network, not just impacts privacy and security worries, but also hinders the diverse dynamics of the ecosystem. Security attacks have grown in frequency and severity throughout the near past, making detection mechanisms harder.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.