Browsing by Author "Imoize, A. L."
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Explainable artificial intelligence (XAI) in medical decision systems (MDSSs): healthcare systems perspective(The Institute of Engineering Technology (IET), 2022) Ayoade, O. B.; Oladele, Tinuke Omolewa; Imoize, A. L.; Awotunde, J. B.; Adeloye, A. J.; Olorunyomi, S. O.; Idowu, A. O.The healthcare sector is very interested in machine learning (ML) and artificial intelligence (AI). Nevertheless, applying AI applications in scientific contexts is difficult due to explainability issues. Explainable AI (XAI) has been studied as a potential remedy for the problems with current AI methods. The usage of ML with XAI may be capable of both explaining models and making judgments, in contrast to AI techniques like deep learning. Computer applications called medical decision support systems (MDSS) affect the decisions doctors make regarding certain patients at a specific moment. MDSS has played a crucial role in systems’ attempts to improve patient safety and the standard of care, particularly for noncommunicable illnesses. They have moreover been a crucial prerequisite for effectively utilizing electronic healthcare (EHRs) data. This chapter offers a broad overview of the application of XAI in MDSS toward various infectious diseases, summarizes recent research on the use and effects of MDSS in healthcare with regard to non-communicable diseases, and offers suggestions for users to keep in mind as these systems are incorporated into healthcare systems and utilized outside of contexts for research and development.Item Physical layer security using boundary technique for emerging wireless communication systems(Wiley, 2022-11-04) Sikiru, Ismaeel Abiodun; Olawoyin, L. A.; Faruk, N.; Oloyede, A. A.; Abdulkarim, A.; Imam-Fulani, Yusuf Olayinka; Sowande, O. A.; Garba, S.; Imoize, A. L.Thebroadcastnatureofradiopropagationinwirelesscommunicationhasbeen aretheoretical,andafewareenhancedforefficientsecurityagainstanintruder. (eavesdroppers).Thephysicallayersecuritytechniquesoperateatthelowest deployedtosafeguardagainstsophisticatedattacks.Mostofthesedeployments Inthisarticle,aboundarytechniqueapproachisproposedandappliedtothe physicallayertoimproveitssecrecy-capacityandsubdueadversaryeffectsat probability,secrecy-capacity,andintercept-probabilityshowthatourproposed Carlosimulationwasperformed.Theresultobtainedusingsecrecyoutage theupperlayer.However,techniquessuchaschannelcoding,power(directional legitimatereceiver.Thesimulationresultswerecomparedwiththeanalytical receiverhasabettersignaltonoiseratiothanthecorrespondingeavesdropper’s methods.Itwasfoundthatthechannelbetweenthetransmitterandthemain antennaandartificialnoise),andspreadspectrumhavebeen(andcontinuously) stackofOSIlayeragainstconventionalcryptographicapproaches,operatingat suspectedastheloopholesofpassiveoractiveattacksbyunauthorizedusers thelegitimatereceiver.Hybridperformancemetricswereadopted,andaMonte channel.Conclusively,performanceoftheproposedtechniqueisvalidatedfor techniquesenhancethesecrettransmissionbetweenthemaintransmitterand applicationsinemergingwirelesscommunicationsystems.