1
|
Aeman H, Shu H, Aisha H, Nadeem I, Aslam RW. Quantifying the scale of erosion along major coastal aquifers of Pakistan using geospatial and machine learning approaches. ENVIRONMENTAL SCIENCE AND POLLUTION RESEARCH INTERNATIONAL 2024; 31:32746-32765. [PMID: 38662291 DOI: 10.1007/s11356-024-33296-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/09/2023] [Accepted: 04/08/2024] [Indexed: 04/26/2024]
Abstract
Insufficient freshwater recharge and climate change resulted in seawater intrusion in most of the coastal aquifers in Pakistan. Coastal aquifers represent diverse landcover types with varying spectral properties, making it challenging to extract information about their state hence, such investigation requires a combination of geospatial tools. This study aims to monitor erosion along the major coastal aquifers of Pakistan and propose an approach that combines data fusion into the machine and deep learning image segmentation architectures for the erosion and accretion assessment in seascapes. The analysis demonstrated the image segmentation U-Net with EfficientNet backbone achieved the highest F1 score of 0.93, while ResNet101 achieved the lowest F1 score of 0.77. Resultant erosion maps indicated that Sandspit experiencing erosion at 3.14 km2 area. Indus delta is showing erosion, approximately 143 km2 of land over the past 30 years. Sonmiani has undergone substantial erosion with 52.2 km2 land. Miani Hor has experienced erosion up to 298 km2, Bhuri creek has eroded over 4.11 km2, east Phitii creek over 3.30 km2, and Waddi creek over 3.082 km2 land. Tummi creek demonstrates erosion, at 7.12 km2 of land, and East Khalri creek near Keti Bandar has undergone a measured loss of 5.2 km2 land linked with quantified reduction in the vertical sediment flow from 50 (billion cubic meters) to 10 BCM. Our analysis suggests that intense erosions are primarily a result of reduced sediment flow and climate change. Addressing this issue needs to be prioritized coastal management and climate change mitigation framework in Pakistan to safeguard communities. Leveraging emerging solutions, such as loss and damage financing and the integration of nature-based solutions (NbS), should be prioritized for the revival of the coastal aquifers.
Collapse
Affiliation(s)
- Hafsa Aeman
- State Key Laboratory of Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University, Wuhan, China.
| | - Hong Shu
- State Key Laboratory of Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University, Wuhan, China
| | - Hamera Aisha
- World Wildlife Fund for Nature (WWF), Lahore, Pakistan
| | - Imran Nadeem
- Institute of Meteorology and Climatology, Department of Water, Atmosphere and Environment, University of Natural Resources and Life Sciences (BOKU), Vienna, Austria
| | - Rana Waqar Aslam
- State Key Laboratory of Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University, Wuhan, China
| |
Collapse
|
2
|
Hamza A, Khan MA, ur Rehman S, Al-Khalidi M, Alzahrani AI, Alalwan N, Masood A. A Novel Bottleneck Residual and Self-Attention Fusion-Assisted Architecture for Land Use Recognition in Remote Sensing Images. IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING 2024; 17:2995-3009. [DOI: 10.1109/jstars.2023.3348874] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 08/25/2024]
Affiliation(s)
- Ameer Hamza
- Department of CS, HITEC University, Taxila, Pakistan
| | | | | | - Mohammed Al-Khalidi
- Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, U.K
| | | | - Nasser Alalwan
- Computer Science Department, Community College, King Saud University, Riyadh, Saudi Arabia
| | - Anum Masood
- Department of Physics, Norwegian University of Science and Technology, Trondheim, Norway
| |
Collapse
|
3
|
Almomani I, Alkhayer A, El-Shafai W. E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches. SENSORS (BASEL, SWITZERLAND) 2023; 23:s23094467. [PMID: 37177671 PMCID: PMC10181608 DOI: 10.3390/s23094467] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/04/2023] [Revised: 04/18/2023] [Accepted: 05/01/2023] [Indexed: 05/15/2023]
Abstract
Nowadays, ransomware is considered one of the most critical cyber-malware categories. In recent years various malware detection and classification approaches have been proposed to analyze and explore malicious software precisely. Malware originators implement innovative techniques to bypass existing security solutions. This paper introduces an efficient End-to-End Ransomware Detection System (E2E-RDS) that comprehensively utilizes existing Ransomware Detection (RD) approaches. E2E-RDS considers reverse engineering the ransomware code to parse its features and extract the important ones for prediction purposes, as in the case of static-based RD. Moreover, E2E-RDS can keep the ransomware in its executable format, convert it to an image, and then analyze it, as in the case of vision-based RD. In the static-based RD approach, the extracted features are forwarded to eight various ML models to test their detection efficiency. In the vision-based RD approach, the binary executable files of the benign and ransomware apps are converted into a 2D visual (color and gray) images. Then, these images are forwarded to 19 different Convolutional Neural Network (CNN) models while exploiting the substantial advantages of Fine-Tuning (FT) and Transfer Learning (TL) processes to differentiate ransomware apps from benign apps. The main benefit of the vision-based approach is that it can efficiently detect and identify ransomware with high accuracy without using data augmentation or complicated feature extraction processes. Extensive simulations and performance analyses using various evaluation metrics for the proposed E2E-RDS were investigated using a newly collected balanced dataset that composes 500 benign and 500 ransomware apps. The obtained outcomes demonstrate that the static-based RD approach using the AB (Ada Boost) model achieved high classification accuracy compared to other examined ML models, which reached 97%. While the vision-based RD approach achieved high classification accuracy, reaching 99.5% for the FT ResNet50 CNN model. It is declared that the vision-based RD approach is more cost-effective, powerful, and efficient in detecting ransomware than the static-based RD approach by avoiding feature engineering processes. Overall, E2E-RDS is a versatile solution for end-to-end ransomware detection that has proven its high efficiency from computational and accuracy perspectives, making it a promising solution for real-time ransomware detection in various systems.
Collapse
Affiliation(s)
- Iman Almomani
- Computer Science Department, King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan
- Security Engineering Laboratory, Computer Science Department, Prince Sultan University, Riyadh 11586, Saudi Arabia
| | - Aala Alkhayer
- Security Engineering Laboratory, Computer Science Department, Prince Sultan University, Riyadh 11586, Saudi Arabia
| | - Walid El-Shafai
- Security Engineering Laboratory, Computer Science Department, Prince Sultan University, Riyadh 11586, Saudi Arabia
- Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt
| |
Collapse
|
4
|
Mukhtorov D, Rakhmonova M, Muksimova S, Cho YI. Endoscopic Image Classification Based on Explainable Deep Learning. SENSORS (BASEL, SWITZERLAND) 2023; 23:3176. [PMID: 36991887 PMCID: PMC10058443 DOI: 10.3390/s23063176] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/26/2023] [Revised: 03/09/2023] [Accepted: 03/10/2023] [Indexed: 06/19/2023]
Abstract
Deep learning has achieved remarkably positive results and impacts on medical diagnostics in recent years. Due to its use in several proposals, deep learning has reached sufficient accuracy to implement; however, the algorithms are black boxes that are hard to understand, and model decisions are often made without reason or explanation. To reduce this gap, explainable artificial intelligence (XAI) offers a huge opportunity to receive informed decision support from deep learning models and opens the black box of the method. We conducted an explainable deep learning method based on ResNet152 combined with Grad-CAM for endoscopy image classification. We used an open-source KVASIR dataset that consisted of a total of 8000 wireless capsule images. The heat map of the classification results and an efficient augmentation method achieved a high positive result with 98.28% training and 93.46% validation accuracy in terms of medical image classification.
Collapse
|
5
|
Zhang D, Shafiq M, Wang L, Srivastava G, Yin S. Privacy‐preserving remote sensing images recognition based on limited visual cryptography. CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY 2023. [DOI: 10.1049/cit2.12164] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/16/2023] Open
Affiliation(s)
- Denghui Zhang
- Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China
- Department of New Networks Peng Cheng Laboratory Shenzhen China
| | - Muhammad Shafiq
- Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China
| | - Liguo Wang
- College of Information and Communications Engineering Dalian Minzu University Dalian China
| | - Gautam Srivastava
- Department of Mathematics and Computer Science Brandon University Brandon Manitoba Canada
- Research Centre for Interneural Computing China Medical University Taichung Taiwan
- Department of Computer Science and Math Lebanese American University Beirut Lebanon
| | - Shoulin Yin
- College of Information and Communications Engineering Harbin Engineering University Harbin China
| |
Collapse
|
6
|
Sirisha U, Chandana BS. Privacy Preserving Image Encryption with Optimal Deep Transfer Learning Based Accident Severity Classification Model. SENSORS (BASEL, SWITZERLAND) 2023; 23:519. [PMID: 36617116 PMCID: PMC9823975 DOI: 10.3390/s23010519] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/30/2022] [Revised: 12/25/2022] [Accepted: 12/29/2022] [Indexed: 06/17/2023]
Abstract
Effective accident management acts as a vital part of emergency and traffic control systems. In such systems, accident data can be collected from different sources (unmanned aerial vehicles, surveillance cameras, on-site people, etc.) and images are considered a major source. Accident site photos and measurements are the most important evidence. Attackers will steal data and breach personal privacy, causing untold costs. The massive number of images commonly employed poses a significant challenge to privacy preservation, and image encryption can be used to accomplish cloud storage and secure image transmission. Automated severity estimation using deep-learning (DL) models becomes essential for effective accident management. Therefore, this article presents a novel Privacy Preserving Image Encryption with Optimal Deep-Learning-based Accident Severity Classification (PPIE-ODLASC) method. The primary objective of the PPIE-ODLASC algorithm is to securely transmit the accident images and classify accident severity into different levels. In the presented PPIE-ODLASC technique, two major processes are involved, namely encryption and severity classification (i.e., high, medium, low, and normal). For accident image encryption, the multi-key homomorphic encryption (MKHE) technique with lion swarm optimization (LSO)-based optimal key generation procedure is involved. In addition, the PPIE-ODLASC approach involves YOLO-v5 object detector to identify the region of interest (ROI) in the accident images. Moreover, the accident severity classification module encompasses Xception feature extractor, bidirectional gated recurrent unit (BiGRU) classification, and Bayesian optimization (BO)-based hyperparameter tuning. The experimental validation of the proposed PPIE-ODLASC algorithm is tested utilizing accident images and the outcomes are examined in terms of many measures. The comparative examination revealed that the PPIE-ODLASC technique showed an enhanced performance of 57.68 dB over other existing models.
Collapse
|
7
|
Shakeel T, Habib S, Boulila W, Koubaa A, Javed AR, Rizwan M, Gadekallu TR, Sufiyan M. A survey on COVID-19 impact in the healthcare domain: worldwide market implementation, applications, security and privacy issues, challenges and future prospects. COMPLEX INTELL SYST 2022; 9:1027-1058. [PMID: 35668731 PMCID: PMC9151356 DOI: 10.1007/s40747-022-00767-w] [Citation(s) in RCA: 12] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/24/2022] [Accepted: 04/15/2022] [Indexed: 12/23/2022]
Abstract
Extensive research has been conducted on healthcare technology and service advancements during the last decade. The Internet of Medical Things (IoMT) has demonstrated the ability to connect various medical apparatus, sensors, and healthcare specialists to ensure the best medical treatment in a distant location. Patient safety has improved, healthcare prices have decreased dramatically, healthcare services have become more approachable, and the operational efficiency of the healthcare industry has increased. This research paper offers a recent review of current and future healthcare applications, security, market trends, and IoMT-based technology implementation. This research paper analyses the advancement of IoMT implementation in addressing various healthcare concerns from the perspectives of enabling technologies, healthcare applications, and services. The potential obstacles and issues of the IoMT system are also discussed. Finally, the survey includes a comprehensive overview of different disciplines of IoMT to empower future researchers who are eager to work on and make advances in the field to obtain a better understanding of the domain.
Collapse
Affiliation(s)
- Tanzeela Shakeel
- School of System and Technology, University of Management and Technology, Lahore, Pakistan
| | - Shaista Habib
- School of System and Technology, University of Management and Technology, Lahore, Pakistan
| | - Wadii Boulila
- Robotics and Internet of Things Lab, Prince Sultan University, Riyadh, 12435 Saudi Arabia
| | - Anis Koubaa
- Robotics and Internet of Things Lab, Prince Sultan University, Riyadh, 12435 Saudi Arabia
| | - Abdul Rehman Javed
- Department of Cyber Security, PAF Complex, E-9, Air University, Islamabad, Pakistan
| | - Muhammad Rizwan
- Department of Computer Science, Kinnaird College for Women, Lahore, Pakistan
| | - Thippa Reddy Gadekallu
- School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India
| | - Mahmood Sufiyan
- School of System and Technology, University of Management and Technology, Lahore, Pakistan
| |
Collapse
|
8
|
DVPPIR: privacy-preserving image retrieval based on DCNN and VHE. Neural Comput Appl 2022. [DOI: 10.1007/s00521-022-07286-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
|
9
|
Jemmali M, Melhim LKB, Alharbi MT, Bajahzar A, Omri MN. Smart-parking management algorithms in smart city. Sci Rep 2022; 12:6533. [PMID: 35444220 PMCID: PMC9020765 DOI: 10.1038/s41598-022-10076-4] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/19/2021] [Accepted: 03/30/2022] [Indexed: 11/09/2022] Open
Abstract
Recently, various advanced technologies have been employed to build smart cities. Smart cities aim at improving the quality of life through the delivery of better services. One of the current services that are essential for any smart city, is the availability of enough parking spaces to ensure smooth and easy traffic flow. This research proposes a new framework for solving the problem of parking lot allocation, which emphasizes the equitable allocation of people based on the overall count of people in each parking space. The allocation process is performed while considering the available parking lots in each parking space. To accomplish the desired goal, this research will develop a set of seven algorithms to reduce the gap in the number of people between parking spaces. Many experiments carried out on 2430 different cases to cover several aspects such as the execution time and the gap calculations, were used to explore the performance of the developed algorithm. Analyzing the obtained results indicates a good performance behavior of the developed algorithms. Also, it shows that the developed algorithms can solve the studied problem in terms of gap and time calculations. The MR algorithm gained excellent performance results compared to one of the best algorithms in the literature. The MR algorithm has a percentage of 96.1 %, an average gap of 0.02, and a good execution time of 0.007 s.
Collapse
Affiliation(s)
- Mahdi Jemmali
- Department of Computer Science and Information, College of Science in Zulfi, Majmaah University, AL-Majmaah, 11952, Saudi Arabia. .,MARS Laboratory, University of Sousse, Sousse, Tunisia. .,Department of Computer Science, Higher Institute of Computer Science and Mathematics, Monastir University, 5000, Monastir, Tunisia.
| | - Loai Kayed B Melhim
- Department of Health Information Management and Technology, College of Applied Medical Sciences, University of Hafr Al Batin, Hafr Al Batin, 39524, Saudi Arabia.
| | - Mafawez T Alharbi
- Department of Natural and Applied Sciences, Applied College, Qassim University, Buraydah, Saudi Arabia
| | - Abdullah Bajahzar
- Department of Computer Science and Information, College of Science in Zulfi, Majmaah University, AL-Majmaah, 11952, Saudi Arabia
| | | |
Collapse
|
10
|
Hamza R, Hassan A, Ali A, Bashir MB, Alqhtani SM, Tawfeeg TM, Yousif A. Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms. ENTROPY 2022; 24:e24040519. [PMID: 35455182 PMCID: PMC9024588 DOI: 10.3390/e24040519] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/17/2022] [Revised: 03/31/2022] [Accepted: 04/02/2022] [Indexed: 02/04/2023]
Abstract
Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic encryption algorithms provide innovative solutions to support computations on encrypted data while preserving the content of private information. However, these algorithms have some limitations, such as computational cost as well as the need for modifications for each case study. In this paper, we present a comprehensive overview of various homomorphic encryption tools for Big Data analysis and their applications. We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms. We highlight the fundamental features and tradeoffs that should be considered when choosing the right approach for Big Data applications in practice. We then present a comparison of popular current homomorphic encryption tools with respect to these identified characteristics. We examine the implementation results of various homomorphic encryption toolkits and compare their performances. Finally, we highlight some important issues and research opportunities. We aim to anticipate how homomorphic encryption technology will be useful for secure Big Data processing, especially to improve the utility and performance of privacy-preserving machine learning.
Collapse
Affiliation(s)
- Rafik Hamza
- Institute for International Strategy, Tokyo International University, Saitama 350-1197, Japan
- National Institute of Information and Communications Technology, Tokyo 184-8795, Japan
- Correspondence: (R.H.); (A.Y.)
| | - Alzubair Hassan
- Department of Computer Science, School of Computer Science and Informatics, University College Dublin, Belfield, D04 V1W8 Dublin, Ireland;
- Lero-the Irish Software Research Centre, Tierney Building, University of Limerick, Sreelane, V94 NYD3 Limerick, Ireland
| | - Awad Ali
- Department of Computer Science, College of Science and Arts—Sharourah, Najran University, Sharourah 68341, Saudi Arabia;
| | - Mohammed Bakri Bashir
- Department of Math, Turubah University College, Taif University, Taif 26571, Saudi Arabia;
- Department of Computer Science, Faculty of Computer Science and Information Technology, Shendi University, Shendi 41601, Sudan
| | - Samar M. Alqhtani
- Department of Information Systems, College of Computer Science and Information Systems, Najran University, Najran 61441, Saudi Arabia;
| | - Tawfeeg Mohmmed Tawfeeg
- Department of Computer Science, Faculty of Computer Science and Information Technology, University of Science and Technology, Khartoum 14411, Sudan;
| | - Adil Yousif
- Department of Computer Science, College of Science and Arts—Sharourah, Najran University, Sharourah 68341, Saudi Arabia;
- Correspondence: (R.H.); (A.Y.)
| |
Collapse
|
11
|
Abstract
This article describes the development of a machine learning (ML)-based algorithm for snowfall retrieval (Snow retrievaL ALgorithm fOr gpM–Cross Track, SLALOM-CT), exploiting ATMS radiometer measurements and using the CloudSat CPR snowfall products as references. During a preliminary analysis, different ML techniques (tree-based algorithms, shallow and convolutional neural networks—NNs) were intercompared. A large dataset (three years) of coincident observations from CPR and ATMS was used for training and testing the different techniques. The SLALOM-CT algorithm is based on four independent modules for the detection of snowfall and supercooled droplets, and for the estimation of snow water path and snowfall rate. Each module was designed by choosing the best-performing ML approach through model selection and optimization. While a convolutional NN was the most accurate for the snowfall detection module, a shallow NN was selected for all other modules. SLALOM-CT showed a high degree of consistency with CPR. Moreover, the results were almost independent of the background surface categorization and the observation angle. The reliability of the SLALOM-CT estimates was also highlighted by the good results obtained from a direct comparison with a reference algorithm (GPROF).
Collapse
|
12
|
Semantic Segmentation and Edge Detection—Approach to Road Detection in Very High Resolution Satellite Images. REMOTE SENSING 2022. [DOI: 10.3390/rs14030613] [Citation(s) in RCA: 7] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/04/2023]
Abstract
Road detection technology plays an essential role in a variety of applications, such as urban planning, map updating, traffic monitoring and automatic vehicle navigation. Recently, there has been much development in detecting roads in high-resolution (HR) satellite images based on semantic segmentation. However, the objects being segmented in such images are of small size, and not all the information in the images is equally important when making a decision. This paper proposes a novel approach to road detection based on semantic segmentation and edge detection. Our approach aims to combine these two techniques to improve road detection, and it produces sharp-pixel segmentation maps, using the segmented masks to generate road edges. In addition, some well-known architectures, such as SegNet, used multi-scale features without refinement; thus, using attention blocks in the encoder to predict fine segmentation masks resulted in finer edges. A combination of weighted cross-entropy loss and the focal Tversky loss as the loss function is also used to deal with the highly imbalanced dataset. We conducted various experiments on two datasets describing real-world datasets covering the three largest regions in Saudi Arabia and Massachusetts. The results demonstrated that the proposed method of encoding HR feature maps effectively predicts sharp segmentation masks to facilitate accurate edge detection, even against a harsh and complicated background.
Collapse
|
13
|
S2Looking: A Satellite Side-Looking Dataset for Building Change Detection. REMOTE SENSING 2021. [DOI: 10.3390/rs13245094] [Citation(s) in RCA: 9] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/04/2023]
Abstract
Building-change detection underpins many important applications, especially in the military and crisis-management domains. Recent methods used for change detection have shifted towards deep learning, which depends on the quality of its training data. The assembly of large-scale annotated satellite imagery datasets is therefore essential for global building-change surveillance. Existing datasets almost exclusively offer near-nadir viewing angles. This limits the range of changes that can be detected. By offering larger observation ranges, the scroll imaging mode of optical satellites presents an opportunity to overcome this restriction. This paper therefore introduces S2Looking, a building-change-detection dataset that contains large-scale side-looking satellite images captured at various off-nadir angles. The dataset consists of 5000 bitemporal image pairs of rural areas and more than 65,920 annotated instances of changes throughout the world. The dataset can be used to train deep-learning-based change-detection algorithms. It expands upon existing datasets by providing (1) larger viewing angles; (2) large illumination variances; and (3) the added complexity of rural images. To facilitate the use of the dataset, a benchmark task has been established, and preliminary tests suggest that deep-learning algorithms find the dataset significantly more challenging than the closest-competing near-nadir dataset, LEVIR-CD+. S2Looking may therefore promote important advances in existing building-change-detection algorithms.
Collapse
|
14
|
Boulila W, Shah SA, Ahmad J, Driss M, Ghandorh H, Alsaeedi A, Al-Sarem M, Saeed F. Noninvasive Detection of Respiratory Disorder Due to COVID-19 at the Early Stages in Saudi Arabia. ELECTRONICS 2021; 10:2701. [DOI: 10.3390/electronics10212701] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/15/2023]
Abstract
The Kingdom of Saudi Arabia has suffered from COVID-19 disease as part of the global pandemic due to severe acute respiratory syndrome coronavirus 2. The economy of Saudi Arabia also suffered a heavy impact. Several measures were taken to help mitigate its impact and stimulate the economy. In this context, we present a safe and secure WiFi-sensing-based COVID-19 monitoring system exploiting commercially available low-cost wireless devices that can be deployed in different indoor settings within Saudi Arabia. We extracted different activities of daily living and respiratory rates from ubiquitous WiFi signals in terms of channel state information (CSI) and secured them from unauthorized access through permutation and diffusion with multiple substitution boxes using chaos theory. The experiments were performed on healthy participants. We used the variances of the amplitude information of the CSI data and evaluated their security using several security parameters such as the correlation coefficient, mean-squared error (MSE), peak-signal-to-noise ratio (PSNR), entropy, number of pixel change rate (NPCR), and unified average change intensity (UACI). These security metrics, for example, lower correlation and higher entropy, indicate stronger security of the proposed encryption method. Moreover, the NPCR and UACI values were higher than 99% and 30, respectively, which also confirmed the security strength of the encrypted information.
Collapse
|