2021
DOI: 10.1109/jsen.2020.3022564
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Wandering Behavior Sensing in Dementia Patients Using Modified Logistic and Dynamic Newton Leipnik Maps

Abstract: The field of Artificial Intelligence (AI) being applied to human motion detection is a field with considerable interest in recent years. Human motion detection deliverers the possibilities of improving the home life of elderly people as it can be applied to fall detection systems. This paper will look at Radar images to detect large scale body movements.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
3

Relationship

4
6

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 46 publications
0
11
0
Order By: Relevance
“…Most of the state-of-the-art approaches to evaluate the performance of the proposed approach used different evaluation metrics including accuracy, precision, recall, and f-measure are used (Shah et al, 2021b).…”
Section: Evaluation Metricsmentioning
confidence: 99%
“…Most of the state-of-the-art approaches to evaluate the performance of the proposed approach used different evaluation metrics including accuracy, precision, recall, and f-measure are used (Shah et al, 2021b).…”
Section: Evaluation Metricsmentioning
confidence: 99%
“…It can be seen that these histogram are almost flat, and hence, the encrypted color spectrogram is secure. Furthermore, Tables 4-6 show the security of the encrypted spectrogram using a number of security parameters [20,21,[52][53][54] for the red, green, and blue channels, respectively. From the security parameters, it is evident that the spectrogram encryption is secure and resistant against many attacks.…”
Section: Security Analysesmentioning
confidence: 99%
“…Digital medical images such as X-ray images are becoming more crucial for identifying and treating disorders in contemporary hospitals and hence are attracting attention from the research community [1]. In general, such medical images may include confidential and sensitive information [2]. Disastrous accidents may arise if unauthorized access results in the theft of confidential information or the exploitation of these private images.…”
Section: Introductionmentioning
confidence: 99%