期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Blockchain and Artificial Intelligence Applications to Defeat COVID-19 Pandemic 被引量:1
1
作者 Mohammed Baz sabita khatri +3 位作者 Abdullah Baz Hosam Alhakami Alka Agrawal Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2022年第2期691-702,共12页
The rapid emergence of novel virus named SARS-CoV2 and unchecked dissemination of this virus around the world ever since its outbreak in 2020,provide critical research criteria to assess the vulnerabilities of our cur... The rapid emergence of novel virus named SARS-CoV2 and unchecked dissemination of this virus around the world ever since its outbreak in 2020,provide critical research criteria to assess the vulnerabilities of our current health system.The paper addresses our preparedness for the management of such acute health emergencies and the need to enhance awareness,about public health and healthcare mechanisms.In view of this unprecedented health crisis,distributed ledger and AI technology can be seen as one of the promising alternatives for fighting against such epidemics at the early stages,and with the higher efficacy.At the implementation level,blockchain integration,early detection and avoidance of an outbreak,identity protection and safety,and a secure drug supply chain can be realized.At the opposite end of the continuum,artificial intelligence methods are used to detect corona effects until they become too serious,avoiding costly drug processing.The paper explores the application of blockchain and artificial intelligence in order to fight with COVID-19 epidemic scenarios.This paper analyzes all possible newly emerging cases that are employing these two technologies for combating a pandemic like COVID-19 along with major challenges which cover all technological and motivational factors.This paper has also discusses the potential challenges and whether further production is required to establish a health monitoring system. 展开更多
关键词 Artificial intelligence information privacy machine learning coronavirus(COVID-19) SARS-CoV-2 EPIDEMIC
下载PDF
Prediction of COVID-19 Pandemic Spread in Kingdom of Saudi Arabia
2
作者 Abdulaziz Attaallah sabita khatri +3 位作者 Mohd Nadeem Syed Anas Ansar Abhishek Kumar Pandey Alka Agrawal 《Computer Systems Science & Engineering》 SCIE EI 2021年第6期313-329,共17页
A significant increase in the number of coronavirus cases can easily be noticed in most of the countries around the world.Inspite of the consistent preventive initiatives being taken to contain the spread of this viru... A significant increase in the number of coronavirus cases can easily be noticed in most of the countries around the world.Inspite of the consistent preventive initiatives being taken to contain the spread of this virus,the unabated increase in the cases is both alarming and intriguing.The role of mathematical models in predicting and estimating the spread of the virus,and identifying various preventive factors dependencies has been found important and effective in most of the previous pandemics like Severe Acute Respiratory Syndrome(SARS)2003.In this research work,authors have proposed the Susceptible-Infectected-Removed(SIR)model variation in order to forecast the pattern of coronavirus disease(COVID-19)spread for the upcoming eight weeks in perspective of Saudi Arabia.The study has been performed by using SIR model with a proposed simplification using average progression for further estimation ofβandγvalues for better curve fittings ratios.The predictive results of this study clearly show that under the current public health interventions,there will be an increase in the COVID-19 cases in Saudi Arabia in the next four weeks.Hence,a set of strong health primitives and precautionary measures are recommended in order to avoid and prevent the further spread of COVID-19 in Saudi Arabia. 展开更多
关键词 COVID-19 pandemic Saudi Arabia SIR model prediction model
下载PDF
Healthcare Device Security Assessment through Computational Methodology
3
作者 Masood Ahmad Jehad F.Al-Amri +4 位作者 Ahmad F.Subahi sabita khatri Adil Hussain Seh Mohd Nadeem Alka Agrawal 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期811-828,共18页
The current study discusses the different methods used to secure healthcare devices and proposes a quantitative framework to list them in order of significances.The study uses the Hesitant Fuzzy(HF),Analytic Hierarchy... The current study discusses the different methods used to secure healthcare devices and proposes a quantitative framework to list them in order of significances.The study uses the Hesitant Fuzzy(HF),Analytic Hierarchy Process(AHP)integrated with Fuzzy Technical for Order Preference by Similarities to Ideal Solution(TOPSIS)to classify the best alternatives to security techniques for healthcare devices to securing the devices.The technique is enlisted to rate the alternatives based on the degree of satisfaction of their weights.The ranks of the alternatives consequently decide the order of priority for the techniques.A1 was the most probable alternative of all the alternatives,according to the ranks of the alternatives acquired.This means that the security of A2 healthcare devices is the greatest of all the alternatives picked.A corroborative guide for the developers and the makers in quantitatively determining the security of healthcare devices to engineer efficacious devices will be the findings drawn up with the assistance of the proposed framework.The assessments performed using the proposed framework are systematic,precise,and definitive.Therefore,the results of the present empirical analysis are a stronger and accurate choice than the manual assessment of the device’s security. 展开更多
关键词 Healthcare devices HF-AHP.TOPSIS device security
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部