期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Social Media-Based Surveillance Systems for Health Informatics Using Machine and Deep Learning Techniques:A Comprehensive Review and Open Challenges
1
作者 Samina Amin Muhammad Ali Zeb +3 位作者 hani alshahrani Mohammed Hamdi Mohammad Alsulami Asadullah Shaikh 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1167-1202,共36页
Social media(SM)based surveillance systems,combined with machine learning(ML)and deep learning(DL)techniques,have shown potential for early detection of epidemic outbreaks.This review discusses the current state of SM... Social media(SM)based surveillance systems,combined with machine learning(ML)and deep learning(DL)techniques,have shown potential for early detection of epidemic outbreaks.This review discusses the current state of SM-based surveillance methods for early epidemic outbreaks and the role of ML and DL in enhancing their performance.Since,every year,a large amount of data related to epidemic outbreaks,particularly Twitter data is generated by SM.This paper outlines the theme of SM analysis for tracking health-related issues and detecting epidemic outbreaks in SM,along with the ML and DL techniques that have been configured for the detection of epidemic outbreaks.DL has emerged as a promising ML technique that adaptsmultiple layers of representations or features of the data and yields state-of-the-art extrapolation results.In recent years,along with the success of ML and DL in many other application domains,both ML and DL are also popularly used in SM analysis.This paper aims to provide an overview of epidemic outbreaks in SM and then outlines a comprehensive analysis of ML and DL approaches and their existing applications in SM analysis.Finally,this review serves the purpose of offering suggestions,ideas,and proposals,along with highlighting the ongoing challenges in the field of early outbreak detection that still need to be addressed. 展开更多
关键词 Social media EPIDEMIC machine learning deep learning health informatics PANDEMIC
下载PDF
Tele-COVID: A Telemedicine SOA-Based Architectural Design for COVID-19 Patients
2
作者 Asadullah Shaikh Mana Saleh AlReshan +2 位作者 Yousef Asiri Adel Sulaiman hani alshahrani 《Computers, Materials & Continua》 SCIE EI 2021年第4期549-576,共28页
In Wuhan,China,a novel Corona Virus(COVID-19)was detected in December 2019;it has changed the entire world and to date,the number of diagnosed cases is 38,756,2891 and 1,095,2161 people have died.This happened because... In Wuhan,China,a novel Corona Virus(COVID-19)was detected in December 2019;it has changed the entire world and to date,the number of diagnosed cases is 38,756,2891 and 1,095,2161 people have died.This happened because a large number of people got affected and there is a lack of hospitals for COVID-19 patients.One of the precautionary measures for COVID-19 patients is isolation.To support this,there is an urgent need for a platform that makes treatment possible from a distance.Telemedicine systems have been drastically increasing in number and size over recent years.This increasing number intensies the extensive need for telemedicine for the national healthcare system.In this paper,we present Tele-COVID which is a telemedicine application to treat COVID-19 patients from a distance.Tele-COVID is uniquely designed and implemented in Service-Oriented Architecture(SOA)to avoid the problem of interoperability,vendor lock-in,and data interchange.With the help of Tele-COVID,the treatment of patients at a distance is possible without the need for them to visit hospitals;in case of emergency,necessary services can also be provided. 展开更多
关键词 Tele-COVID telemedicine architectural design COVID-19 system design service oriented architecture second wave of COVID-19
下载PDF
Risks behind Device Information Permissions in Android OS
3
作者 Ali Alshehri Anthony Hewins +3 位作者 Maria McCulley hani alshahrani Huirong Fu Ye Zhu 《Communications and Network》 2017年第4期219-234,共16页
In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blac... In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blackberry, Android has captured the highest percentage of total market share [1]. Due to this tremendous growth, cybercriminals are encouraged to penetrate various mobile marketplaces with malicious applications. Most of these applications require device information permissions aiming to collect sensitive data without user’s consent. This paper investigates each element of system information permissions and illustrates how cybercriminals can harm users’ privacy. It presents some attack scenarios using READ_PHONE_STATE permission and the risks behind it. In addition, this paper refers to possible attacks that can be performed when additional permissions are combined with READ_PHONE_STATE permission. It also discusses a proposed solution to defeat these types of attacks. 展开更多
关键词 ANDROID SECURITY PRIVACY DEVICE Identifiers Permissions
下载PDF
DroidData: Tracking and Monitoring Data Transmission in the Android Operating System
4
作者 hani alshahrani Abdulrahman Alzahrani +3 位作者 Alexandra Hanton Ali Alshehri Huirong Fu Ye Zhu 《Communications and Network》 2017年第3期192-206,共15页
Most of the millions of Android users worldwide use applications from the official Android market (Google Play store) and unregulated alternative markets to get more functionality from their devices. Many of these app... Most of the millions of Android users worldwide use applications from the official Android market (Google Play store) and unregulated alternative markets to get more functionality from their devices. Many of these applications transmit sensitive data stored on the device, either maliciously or accidentally, to outside networks. In this paper, we will study the ways that Android applications transmit data to outside servers and propose a user-friendly application, DroidData, to inform and protect the user from these security risks. We will use tools such as TaintDroid, AppIntent, and Securacy to propose an application that reveals what types of data are being transmitted from apps, the location to which the data is being transmitted, whether the data is being transmitted through a secure channel (such as HTTPS) and whether the user is aware that the information is being transmitted. The application will generate a report that allows the user to block the application that leaks sensitive information. In doing so, we will examine the importance, relevance, and prevalence of these Android Data security issues. 展开更多
关键词 ANDROID SECURITY PRIVACY TRACKING Data MALWARE
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部