• Title/Summary/Keyword: Computer-Based

Search Result 33,673, Processing Time 0.091 seconds

AIMS: AI based Mental Healthcare System

  • Ibrahim Alrashide;Hussain Alkhalifah;Abdul-Aziz Al-Momen;Ibrahim Alali;Ghazy Alshaikh;Atta-ur Rahman;Ashraf Saadeldeen;Khalid Aloup
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.225-234
    • /
    • 2023
  • In this era of information and communication technology (ICT), tremendous improvements have been witnessed in our daily lives. The impact of these technologies is subjective and negative or positive. For instance, ICT has brought a lot of ease and versatility in our lifestyles, on the other hand, its excessive use brings around issues related to physical and mental health etc. In this study, we are bridging these both aspects by proposing the idea of AI based mental healthcare (AIMS). In this regard, we aim to provide a platform where the patient can register to the system and take consultancy by providing their assessment by means of a chatbot. The chatbot will send the gathered information to the machine learning block. The machine learning model is already trained and predicts whether the patient needs a treatment by classifying him/her based on the assessment. This information is provided to the mental health practitioner (doctor, psychologist, psychiatrist, or therapist) as clinical decision support. Eventually, the practitioner will provide his/her suggestions to the patient via the proposed system. Additionally, the proposed system prioritizes care, support, privacy, and patient autonomy, all while using a friendly chatbot interface. By using technology like natural language processing and machine learning, the system can predict a patient's condition and recommend the right professional for further help, including in-person appointments if necessary. This not only raises awareness about mental health but also makes it easier for patients to start therapy.

Applying Mobile Agent for Internet-based Distributed Speech Recognition

  • Saaim, Emrul Hamide Md;Alias, Mohamad Ashari;Ahmad, Abdul Manan;Ahmad, Jamal Nasir
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.134-138
    • /
    • 2005
  • There are several application have been developed on internet-based speech recognition. Internet-based speech recognition is a distributed application and there were various techniques and methods have been using for that purposed. Currently, client-server paradigm was one of the popular technique that been using for client-server communication in web application. However, there is a new paradigm with the same purpose: mobile agent technology. Mobile agent technology has several advantages working on distributed internet-based system. This paper presents, applying mobile agent technology in internet-based speech recognition which based on client-server processing architecture.

  • PDF

A Preliminary Exploration on Component Based Software Engineering

  • Basha, N Md Jubair;Ganapathy, Gopinath;Moulana, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.143-148
    • /
    • 2022
  • Component-based software development (CBD) is a methodology that has been embraced by the software industry to accelerate development, save costs and timelines, minimize testing requirements, and boost quality and output. Compared to the conventional software development approach, this led to the system's development being completed more quickly. By choosing components, identifying systems, and evaluating those systems, CBSE contributes significantly to the software development process. The objective of CBSE is to codify and standardize all disciplines that support CBD-related operations. Analysis of the comparison between component-based and scripting technologies reveals that, in terms of qualitative performance, component-based technologies scale more effectively. Further study and application of CBSE are directly related to the CBD approach's success. This paper explores the introductory concepts and comparative analysis related to component-based software engineering which have been around for a while, but proper adaption of CBSE are still lacking issues are also focused.

A Preliminary Exploration on Component Based Software Engineering

  • N Md Jubair Basha;Gopinath Ganapathy;Mohammed Moulana
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.119-124
    • /
    • 2024
  • Component-based software development (CBD) is a methodology that has been embraced by the software industry to accelerate development, save costs and timelines, minimize testing requirements, and boost quality and output. Compared to the conventional software development approach, this led to the system's development being completed more quickly. By choosing components, identifying systems, and evaluating those systems, CBSE contributes significantly to the software development process. The objective of CBSE is to codify and standardize all disciplines that support CBD-related operations. Analysis of the comparison between component-based and scripting technologies reveals that, in terms of qualitative performance, component-based technologies scale more effectively. Further study and application of CBSE are directly related to the CBD approach's success. This paper explores the introductory concepts and comparative analysis related to component-based software engineering which have been around for a while, but proper adaption of CBSE are still lacking issues are also focused.

Study on Z specification for S/W Safety of Computer Based Interlocking Systems (전자연동장치 S/W 안전성 확보를 위한 Z 방법표현에 관한 연구)

  • Ahn, Jin;Lee, Jongwoo
    • Journal of the Korean Society for Railway
    • /
    • v.20 no.1
    • /
    • pp.55-63
    • /
    • 2017
  • Railway interlocking systems which are safety-critical systems are rapidly changed from relay-based systems to computer-based systems which have high flexible. Computer-based interlocking systems (CBI) are consisted of hardware and software in which system safeties arise one of important problems. The interlocking software of the CBI influences directly to the system safeties. "z" notation is one of formal methods have been used for system software specification to secure system safety. In this paper, the specification of interlocking logics for CBI systems is realized using "z" notation and verifies it with Z/EVES.

Implementation of Collaboration Distance Guarding System based CBM(Computer Based Multimedia) (CBM 기반의 상호참여형 원격 방범시스템 구현)

  • 김석수;신광철
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.2
    • /
    • pp.161-168
    • /
    • 1998
  • This paper proposes the distance-video-guarding system technology based on collaboration CBM personal computer which enables additional functions such as monitoring each room while the guarding is in progress. This system sends the atmosphere of guarding by checking the status of environment with the sensor using ISDN. Current remote guarding desktop system uses leased lines (T1/E1 ) applying fast speed rate and security. This system provides an external monitoring system which runs on ISDN Public line also. Monitoring system transfers the natural status of each site to center controller of the guarding system.

  • PDF

Identity-based Deniable Authenticated Encryption for E-voting Systems

  • Jin, Chunhua;Chen, Guanhua;Zhao, Jianyang;Gao, Shangbing;Yu, Changhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3299-3315
    • /
    • 2019
  • Deniable authentication (DA) is a protocol in which a receiver can generate an authenticator that is probabilistically indistinguishable from a sender. DA can be applied in many scenarios that require user privacy protection. To enhance the security of DA, in this paper, we construct a new deniable authenticated encryption (DAE) scheme that realizes deniable authentication and confidentiality in a logical single step. Compared with existing approaches, our approach provides proof of security and is efficient in terms of performance analysis. Our scheme is in an identity-based environment; thus, it avoids the public key certificate-based public key infrastructure (PKI). Moreover, we provide an example that shows that our protocol is applicable for e-voting systems.

Machine Learning-based Screening Algorithm for Energy Storage System Using Retired Lithium-ion Batteries (에너지 저장 시스템 적용을 위한 머신러닝 기반의 폐배터리 스크리닝 알고리즘)

  • Han, Eui-Seong;Lim, Je-Yeong;Lee, Hyeon-Ho;Kim, Dong-Hwan;Noh, Tae-Won;Lee, Byoung-Kuk
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.27 no.3
    • /
    • pp.265-274
    • /
    • 2022
  • This paper proposes a machine learning-based screening algorithm to build the retired battery pack of the energy storage system. The proposed algorithm creates the dataset of various performance parameters of the retired battery, and this dataset is preprocessed through a principal component analysis to reduce the overfitting problem. The retried batteries with a large deviation are excluded in the dataset through a density-based spatial clustering of applications with noise, and the K-means clustering method is formulated to select the group of the retired batteries to satisfy the deviation requirement conditions. The performance of the proposed algorithm is verified based on NASA and Oxford datasets.

A Novel Methodology for Auditing the Threats in Cloud Computing - A Perspective based on Cloud Storage

  • Nasreen Sultana Quadri;Kusum Yadav;Yogesh Kumar Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.124-128
    • /
    • 2024
  • Cloud computing is a technology for delivering information in which resources are retrieved from the internet through a web-based tools and applications, rather than a direct connection with the server. It is a new emerging computing based technology in which any individual or organization can remotely store or access the information. The structure of cloud computing allows to store and access various information as long as an electronic device has access to the web. Even though various merits are provided by the cloud from the cloud provides to cloud users, it suffers from various flaws in security. Due to these flaws, data integrity and confidentiality has become a challenging task for both the storage and retrieval process. This paper proposes a novel approach for data protection by an improved auditing based methodology in cloud computing especially in the process of cloud storage. The proposed methodology is proved to be more efficient in auditing the threats while storing data in the cloud computing architecture.

Experimental Investigation of the Effects of Learning Environment and The Nature of Educational Program on the Outcome of Creativity Training (온라인 창의성 교육에 있어 학습 환경과 교육 프로그램의 특성에 관한 실증연구)

  • 조남재;하주현
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.27 no.3
    • /
    • pp.135-144
    • /
    • 2002
  • The purpose of this study is to examine the effects of computer-based creativity training. Four groups of vocational high school students totaling 151 were used as experimental subjects. Two dimensions of treatment were designed. One treatment dimension is the use of computer medium in education: computer based vs. paper-pencil setting of education. The second treatment dimension is the method of creativity training: technique-oriented training program vs. factor-oriented training program. Both a pretest and a post-test were administered to all participated students. The tests were composed of a Creative Figural Test and a Creative Product Test. After the pretest 8 sessions of creative training were delivered as intended in the design of the experiment. The Dost-test was arranged a week after the completion of the training sessions. The results of the study include: First, all the 4 groups showed certain amount of improvements in their scores of Creative Figural Test, while no improvements was observed in the creative product test score. Second, the technique-oriented creativity training was more effective than the factor-oriented under the context of computer-based education, and the factor-oriented training was more effective in the paper-pencil setting. The results suggest that different pedagogical approaches should be employed for computer-based training as compared to the paper-pencil education.