Search Results - "Kang, James Jin"

Refine Results
  1. 1

    Classification of Skin Disease Using Deep Learning Neural Networks with MobileNet V2 and LSTM by Srinivasu, Parvathaneni Naga, SivaSai, Jalluri Gnana, Ijaz, Muhammad Fazal, Bhoi, Akash Kumar, Kim, Wonjoon, Kang, James Jin

    Published in Sensors (Basel, Switzerland) (18-04-2021)
    “…Deep learning models are efficient in learning the features that assist in understanding complex patterns precisely. This study proposed a computerized process…”
    Get full text
    Journal Article
  2. 2

    A Comprehensive Review on Machine Learning in Healthcare Industry: Classification, Restrictions, Opportunities and Challenges by An, Qi, Rahman, Saifur, Zhou, Jingwen, Kang, James Jin

    Published in Sensors (Basel, Switzerland) (22-04-2023)
    “…Recently, various sophisticated methods, including machine learning and artificial intelligence, have been employed to examine health-related data. Medical…”
    Get full text
    Journal Article
  3. 3

    Effect of post deposition annealing on the sensing properties of thin film Ruthenium Oxide (RuO2) pH sensor by Shylendra, Shim, Wajrak, Magdalena, Alameh, Kamal, Kang, James Jin

    Published in IEEE sensors journal (15-04-2024)
    “…The use of Ruthenium Oxide (RuO2) as a pH sensor is a relatively novel idea and understanding how preparation of the sensor effects and its sensing properties…”
    Get full text
    Journal Article
  4. 4

    Enhanced Heart Rate Prediction Model Using Damped Least-Squares Algorithm by An, Angela, Al-Fawa'reh, Mohammad, Kang, James Jin

    Published in Sensors (Basel, Switzerland) (01-12-2022)
    “…Monitoring a patient's vital signs is considered one of the most challenging problems in telehealth systems, especially when patients reside in remote…”
    Get full text
    Journal Article
  5. 5

    Nafion Modified Titanium Nitride pH Sensor for Future Biomedical Applications by Shylendra, Shimrith Paul, Wajrak, Magdalena, Alameh, Kamal, Kang, James Jin

    Published in Sensors (Basel, Switzerland) (07-01-2023)
    “…pH sensors are increasingly being utilized in the biomedical field and have been implicated in health applications that aim to improve the monitoring and…”
    Get full text
    Journal Article
  6. 6

    MalBoT-DRL: Malware Botnet Detection Using Deep Reinforcement Learning in IoT Networks by Al-Fawa'reh, Mohammad, Abu-Khalaf, Jumana, Szewczyk, Patryk, Kang, James Jin

    Published in IEEE internet of things journal (15-03-2024)
    “…In the dynamic landscape of cyber threats, multi-stage malware botnets have surfaced as significant threats of concern. These sophisticated threats can exploit…”
    Get full text
    Journal Article
  7. 7

    An Energy-Efficient and Secure Data Inference Framework for Internet of Health Things: A Pilot Study by Kang, James Jin, Dibaei, Mahdi, Luo, Gang, Yang, Wencheng, Haskell-Dowland, Paul, Zheng, Xi

    Published in Sensors (Basel, Switzerland) (05-01-2021)
    “…Privacy protection in electronic healthcare applications is an important consideration, due to the sensitive nature of personal health data. Internet of Health…”
    Get full text
    Journal Article
  8. 8

    No Soldiers Left Behind: An IoT-Based Low-Power Military Mobile Health System Design by Kang, James Jin, Yang, Wencheng, Dermody, Gordana, Ghasemian, Mohammadreza, Adibi, Sasan, Haskell-Dowland, Paul

    Published in IEEE access (2020)
    “…There has been an increasing prevalence of ad-hoc networks for various purposes and applications. These include Low Power Wide Area Networks (LPWAN) and…”
    Get full text
    Journal Article
  9. 9

    Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity by Kang, James Jin, Fahd, Kiran, Venkatraman, Sitalakshmi

    Published in Cryptography (01-12-2018)
    “…Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks…”
    Get full text
    Journal Article
  10. 10

    Systematic Predictive Analysis of Personalized Life Expectancy Using Smart Devices by Kang, James, Adibi, Sasan

    Published in Technologies (Basel) (01-09-2018)
    “…With the emergence of technologies such as electronic health and mobile health (eHealth/mHealth), cloud computing, big data, and the Internet of Things (IoT),…”
    Get full text
    Journal Article
  11. 11

    An Enhanced Inference Algorithm for Data Sampling Efficiency and Accuracy Using Periodic Beacons and Optimization by Kang, James Jin, Fahd, Kiran, Venkatraman, Sitalakshmi

    Published in Big data and cognitive computing (01-03-2019)
    “…Transferring data from a sensor or monitoring device in electronic health, vehicular informatics, or Internet of Things (IoT) networks has had the enduring…”
    Get full text
    Journal Article
  12. 12

    Bushfire Disaster Monitoring System Using Low Power Wide Area Networks (LPWAN) by Kang, James, Adibi, Sasan

    Published in Technologies (Basel) (01-12-2017)
    “…Some applications, including disaster monitoring and recovery networks, use low-power wide-area networks (LPWAN). LPWAN sensors capture data bits and transmit…”
    Get full text
    Journal Article
  13. 13

    Vehicular Alarm System Using mHealth Data and Lightweight Security Algorithms by Kang, James, Parvin, Sazia, Fahd, Kiran, Venkatraman, Sitalakshmi

    Published in Technologies (Basel) (17-02-2019)
    “…Among the various factors affecting long distance driving are the risks imposed by a driver’s health, which could result in road accidents. Internet of Things…”
    Get full text
    Journal Article
  14. 14

    Enhancement of Healthcare Data Performance Metrics using Neural Network Machine Learning Algorithms by An, Qi, Szewczyk, Patryk, Johnstone, Michael N, Jin Kang, James

    “…Patients are often encouraged to make use of wearable devices for remote collection and monitoring of health data. This adoption of wearables results in a…”
    Get full text
    Conference Proceeding
  15. 15

    Enhancement of Healthcare Data Performance Metrics using Neural Network Machine Learning Algorithms by An, Qi, Szewczyk, Patryk, Johnstone, Michael N, Kang, James Jin

    Published 16-01-2022
    “…Patients are often encouraged to make use of wearable devices for remote collection and monitoring of health data. This adoption of wearables results in a…”
    Get full text
    Journal Article
  16. 16

    DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol by Alatram, Alaa, Sikos, Leslie F., Johnstone, Mike, Szewczyk, Patryk, Kang, James Jin

    “…Adversaries may exploit a range of vulnerabilities in Internet of Things (IoT) environments. These vulnerabilities are typically exploited to carry out…”
    Get full text
    Journal Article
  17. 17

    A linear convolution-based cancelable fingerprint biometric authentication system by Yang, Wencheng, Wang, Song, Kang, James Jin, Johnstone, Michael N., Bedari, Aseel

    Published in Computers & security (01-03-2022)
    “…Authentication is a critical requirement of many systems, in domains such as law enforcement, financial services and consumer devices. Due to poor user…”
    Get full text
    Journal Article
  18. 18

    Predictive data mining for Converged Internet of Things: A Mobile Health perspective by Jin Kang, James, Adibi, Sasan, Larkin, Henry, Luan, Tom

    “…Mobile Health (mHealth) is now emerging with Internet of Things (IoT), Cloud and big data along with the prevalence of smart wearable devices and sensors…”
    Get full text
    Conference Proceeding
  19. 19

    A Military Human Performance Management System Design using Machine Learning Algorithms by Kang, James Jin

    “…The area of human performance improvement has become a greater focus in recent military contexts as evidenced by Australian Defence Force projects. The aim of…”
    Get full text
    Conference Proceeding
  20. 20

    A Military Mobile Network Design: mHealth, IoT and Low Power Wide Area Networks by Kang, James Jin

    “…Networks for military applications have unique characteristics as they have high security requirements and adaptability to changing circumstances and…”
    Get full text
    Conference Proceeding