Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Rethinking Global-Regulation: World’S Law Meets Artificial Intelligence, Nachshon Sean Goltz, Addison Cameron-Huff, Giulia Dondoli Jan 2019

Rethinking Global-Regulation: World’S Law Meets Artificial Intelligence, Nachshon Sean Goltz, Addison Cameron-Huff, Giulia Dondoli

Research outputs 2014 to 2021

This article takes a critical look at Machine Translation of legal text, especially global legislation, through the discussion of Global-Regulation, a state of the art online search engine of the world’s legislation in English. Part 2 explains the rationale for an online platform such as Global-Regulation. Part 3 provides a brief account of the history of the development of machine translation, and it describes some of the limits of the use of statistical machine translation for translating legal texts. Part 4 describes Neural Machine Translation (NMT), which is a new generation of machine translation systems. Finally, Parts 5 and 6 …


Doppler Radar-Based Non-Contact Health Monitoring For Obstructive Sleep Apnea Diagnosis: A Comprehensive Review, Vinh Phuc Tran, Adel Ali Al-Jumaily, Syed Mohammed Shamsul Islam Jan 2019

Doppler Radar-Based Non-Contact Health Monitoring For Obstructive Sleep Apnea Diagnosis: A Comprehensive Review, Vinh Phuc Tran, Adel Ali Al-Jumaily, Syed Mohammed Shamsul Islam

Research outputs 2014 to 2021

Today’s rapid growth of elderly populations and aging problems coupled with the prevalence of obstructive sleep apnea (OSA) and other health related issues have affected many aspects of society. This has led to high demands for a more robust healthcare monitoring, diagnosing and treatments facilities. In particular to Sleep Medicine, sleep has a key role to play in both physical and mental health. The quality and duration of sleep have a direct and significant impact on people’s learning, memory, metabolism, weight, safety, mood, cardio-vascular health, diseases, and immune system function. The gold-standard for OSA diagnosis is the overnight sleep monitoring …


Proof-Of-Familiarity: A Privacy-Preserved Blockchain Scheme For Collaborative Medical Decision-Making, Jinhong Yang, Md Mehedi Hassan Hasan Onik, Nam-Yong Lee, Mohiuddin Ahmed, Chul-Soo Kim Jan 2019

Proof-Of-Familiarity: A Privacy-Preserved Blockchain Scheme For Collaborative Medical Decision-Making, Jinhong Yang, Md Mehedi Hassan Hasan Onik, Nam-Yong Lee, Mohiuddin Ahmed, Chul-Soo Kim

Research outputs 2014 to 2021

The current healthcare sector is facing difficulty in satisfying the growing issues, expenses, and heavy regulation of quality treatment. Surely, electronic medical records (EMRs) and protected health information (PHI) are highly sensitive, personally identifiable information (PII). However, the sharing of EMRs, enhances overall treatment quality. A distributed ledger (blockchain) technology, embedded with privacy and security by architecture, provides a transparent application developing platform. Privacy, security, and lack of confidence among stakeholders are the main downsides of extensive medical collaboration. This study, therefore, utilizes the transparency, security, and efficiency of blockchain technology to establish a collaborative medical decision-making scheme. This study …


False Image Injection Prevention Using Ichain, Mohiuddin Ahmed Jan 2019

False Image Injection Prevention Using Ichain, Mohiuddin Ahmed

Research outputs 2014 to 2021

The advances in information and communication technology are consistently beneficial for the healthcare sector. A trend in the healthcare sector is the progressive shift in how data are acquired and the storage of such data in different facilities, such as in the cloud, due to the efficiency and effectiveness offered. Digital images related to healthcare are sensitive in nature and require maximum security and privacy. A malicious entity can tamper with such stored digital images to mislead healthcare personnel and the consequences of wrong diagnosis are harmful for both parties. A new type of cyber attack, a false image injection …


Effective Plant Discrimination Based On The Combination Of Local Binary Pattern Operators And Multiclass Support Vector Machine Methods, Vi N T Le, Beniamin Apopei, Kamal Alameh Jan 2019

Effective Plant Discrimination Based On The Combination Of Local Binary Pattern Operators And Multiclass Support Vector Machine Methods, Vi N T Le, Beniamin Apopei, Kamal Alameh

Research outputs 2014 to 2021

Accurate crop and weed discrimination plays a critical role in addressing the challenges of weed management in agriculture. The use of herbicides is currently the most common approach to weed control. However, herbicide resistant plants have long been recognised as a major concern due to the excessive use of herbicides. Effective weed detection techniques can reduce the cost of weed management and improve crop quality and yield. A computationally efficient and robust plant classification algorithm is developed and applied to the classification of three crops: Brassica napus (canola), Zea mays (maize/corn), and radish. The developed algorithm is based on the …


Integration Of Biometrics And Steganography: A Comprehensive Review, Ian Mcateer, Ahmed Ibrahim, Guanglou Zhang, Wencheng Yang, Craig Valli Jan 2019

Integration Of Biometrics And Steganography: A Comprehensive Review, Ian Mcateer, Ahmed Ibrahim, Guanglou Zhang, Wencheng Yang, Craig Valli

Research outputs 2014 to 2021

The use of an individual’s biometric characteristics to advance authentication and verification technology beyond the current dependence on passwords has been the subject of extensive research for some time. Since such physical characteristics cannot be hidden from the public eye, the security of digitised biometric data becomes paramount to avoid the risk of substitution or replay attacks. Biometric systems have readily embraced cryptography to encrypt the data extracted from the scanning of anatomical features. Significant amounts of research have also gone into the integration of biometrics with steganography to add a layer to the defence-in-depth security model, and this has …


Aligning Security Practice With Policy: Guiding And Nudging Towards Better Behavior, Steven M. Furnell, Faisal Alotaibi, Rawan Esmael Jan 2019

Aligning Security Practice With Policy: Guiding And Nudging Towards Better Behavior, Steven M. Furnell, Faisal Alotaibi, Rawan Esmael

Research outputs 2014 to 2021

Despite an abundance of policies being directed towards them, users often struggle to follow good cybersecurity practice. Recognizing that such behaviors do not come naturally, a logical approach is to ensure that users are guided and supported in knowing what to do and how to do it. Unfortunately, such support is often lacking. The paper uses the example of password authentication as a specific context in which cybersecurity behavior is frequently criticized, but where users are often left to manage without sufficient support (as evidenced by examining the lack of related guidance and enforcement of good practice on leading websites). …


Security And Accuracy Of Fingerprint-Based Biometrics: A Review, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zhang, Craig Valli Jan 2019

Security And Accuracy Of Fingerprint-Based Biometrics: A Review, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zhang, Craig Valli

Research outputs 2014 to 2021

Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two …