Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 24
Filtrar
1.
Sensors (Basel) ; 23(11)2023 May 23.
Artigo em Inglês | MEDLINE | ID: mdl-37299731

RESUMO

In recent years, Internet of Things (IoT) advancements have led to the development of vastly improved remote healthcare services. Scalability, high bandwidth, low latency, and low power consumption are all essential features of the applications that make these services possible. An upcoming healthcare system and wireless sensor network that can fulfil these needs is based on fifth-generation network slicing. For better resource management, organizations can implement network slicing, which partitions the physical network into distinct logical slices according to quality of service (QoS) needs. Based on the findings of this research, an IoT-fog-cloud architecture is proposed for use in e-Health services. The framework is made up of three different but interconnected systems: a cloud radio access network, a fog computing system, and a cloud computing system. A queuing network serves as a model for the proposed system. The model's constituent parts are then subjected to analysis. To assess the system's performance, we run a numerical example simulation using Java modelling tools and then analyze the results to identify the key performance parameters. The analytical formulas that were derived ensure the precision of the results. Finally, the results show that the proposed model improves eHealth services' quality of service in an efficient way by selecting the right slice compared to the traditional systems.


Assuntos
Telemedicina , Telemedicina/instrumentação , Telemedicina/métodos , Computação em Nuvem , Internet das Coisas , Redes Neurais de Computação , Simulação por Computador
2.
Sensors (Basel) ; 23(11)2023 May 27.
Artigo em Inglês | MEDLINE | ID: mdl-37299838

RESUMO

The 5G network is designed to serve three main use cases: enhanced mobile broadband (eMBB), massive machine-type communications (mMTC), and ultra-reliable and low-latency communications (uRLLC). There are many new technological enablers, including the cloud radio access network (C-RAN) and network slicing, that can support 5G and meet its requirements. The C-RAN combines both network virtualization and based band unit (BBU) centralization. Using the network slicing concept, the C-RAN BBU pool can be virtually sliced into three different slices. 5G slices require a number of Quality of service (QoS) metrics, such as average response time and resource utilization. In order to enhance the C-RAN BBUs utilization while protecting the minimum QoS of the coexisting three slices, a priority-based resource allocation with queuing model is proposed. The uRLLC is given the highest priority, while eMBB has a higher priority than mMTC services. The proposed model allows the eMBB and mMTC to be queued and the interrupted mMTC to be restored in its queue to increase its chance to reattempt the service later. The proposed model's performance measures are defined and derived using a continuous-time Markov chain (CTMC) model and evaluated and compared using different methodologies. Based on the results, the proposed scheme can increase C-RAN resource utilization without degrading the QoS of the highest-priority uRLLC slice. Additionally, it can reduce the forced termination priority of the interrupted mMTC slice by allowing it to re-join its queue. Therefore, the comparison of the results shows that the proposed scheme outperforms the other states of the art in terms of improving the C-RAN utilization and enhancing the QoS of eMBB and mMTC slices without degrading the QoS of the highest priority use case.


Assuntos
Conscientização , Comunicação , Benchmarking , Cadeias de Markov , Alocação de Recursos
3.
Sensors (Basel) ; 23(16)2023 Aug 18.
Artigo em Inglês | MEDLINE | ID: mdl-37631793

RESUMO

Predicting attacks in Android malware devices using machine learning for recommender systems-based IoT can be a challenging task. However, it is possible to use various machine-learning techniques to achieve this goal. An internet-based framework is used to predict and recommend Android malware on IoT devices. As the prevalence of Android devices grows, the malware creates new viruses on a regular basis, posing a threat to the central system's security and the privacy of the users. The suggested system uses static analysis to predict the malware in Android apps used by consumer devices. The training of the presented system is used to predict and recommend malicious devices to block them from transmitting the data to the cloud server. By taking into account various machine-learning methods, feature selection is performed and the K-Nearest Neighbor (KNN) machine-learning model is proposed. Testing was carried out on more than 10,000 Android applications to check malicious nodes and recommend that the cloud server block them. The developed model contemplated all four machine-learning algorithms in parallel, i.e., naive Bayes, decision tree, support vector machine, and the K-Nearest Neighbor approach and static analysis as a feature subset selection algorithm, and it achieved the highest prediction rate of 93% to predict the malware in real-world applications of consumer devices to minimize the utilization of energy. The experimental results show that KNN achieves 93%, 95%, 90%, and 92% accuracy, precision, recall and f1 measures, respectively.

4.
Sensors (Basel) ; 23(13)2023 Jul 06.
Artigo em Inglês | MEDLINE | ID: mdl-37448038

RESUMO

By definition, the aggregating methodology ensures that transmitted data remain visible in clear text in the aggregated units or nodes. Data transmission without encryption is vulnerable to security issues such as data confidentiality, integrity, authentication and attacks by adversaries. On the other hand, encryption at each hop requires extra computation for decrypting, aggregating, and then re-encrypting the data, which results in increased complexity, not only in terms of computation but also due to the required sharing of keys. Sharing the same key across various nodes makes the security more vulnerable. An alternative solution to secure the aggregation process is to provide an end-to-end security protocol, wherein intermediary nodes combine the data without decoding the acquired data. As a consequence, the intermediary aggregating nodes do not have to maintain confidential key values, enabling end-to-end security across sensor devices and base stations. This research presents End-to-End Homomorphic Encryption (EEHE)-based safe and secure data gathering in IoT-based Wireless Sensor Networks (WSNs), whereby it protects end-to-end security and enables the use of aggregator functions such as COUNT, SUM and AVERAGE upon encrypted messages. Such an approach could also employ message authentication codes (MAC) to validate data integrity throughout data aggregation and transmission activities, allowing fraudulent content to also be identified as soon as feasible. Additionally, if data are communicated across a WSN, then there is a higher likelihood of a wormhole attack within the data aggregation process. The proposed solution also ensures the early detection of wormhole attacks during data aggregation.


Assuntos
Segurança Computacional , Agregação de Dados , Redes de Comunicação de Computadores , Algoritmos , Confidencialidade
5.
Sensors (Basel) ; 23(12)2023 Jun 07.
Artigo em Inglês | MEDLINE | ID: mdl-37420558

RESUMO

Retinal optical coherence tomography (OCT) imaging is a valuable tool for assessing the condition of the back part of the eye. The condition has a great effect on the specificity of diagnosis, the monitoring of many physiological and pathological procedures, and the response and evaluation of therapeutic effectiveness in various fields of clinical practices, including primary eye diseases and systemic diseases such as diabetes. Therefore, precise diagnosis, classification, and automated image analysis models are crucial. In this paper, we propose an enhanced optical coherence tomography (EOCT) model to classify retinal OCT based on modified ResNet (50) and random forest algorithms, which are used in the proposed study's training strategy to enhance performance. The Adam optimizer is applied during the training process to increase the efficiency of the ResNet (50) model compared with the common pre-trained models, such as spatial separable convolutions and visual geometry group (VGG) (16). The experimentation results show that the sensitivity, specificity, precision, negative predictive value, false discovery rate, false negative rate accuracy, and Matthew's correlation coefficient are 0.9836, 0.9615, 0.9740, 0.9756, 0.0385, 0.0260, 0.0164, 0.9747, 0.9788, and 0.9474, respectively.


Assuntos
Aprendizado Profundo , Redes Neurais de Computação , Tomografia de Coerência Óptica/métodos , Retina/diagnóstico por imagem , Valor Preditivo dos Testes
6.
Sensors (Basel) ; 23(12)2023 Jun 08.
Artigo em Inglês | MEDLINE | ID: mdl-37420607

RESUMO

In this paper, we present a hybrid frequency shift keying and frequency division multiplexing (i.e., FSK-FDM) approach for information embedding in dual-function radar and communication (DFRC) design to achieve an improved communication data rate. Since most of the existing works focus on merely two-bit transmission in each pulse repetition interval (PRI) using different amplitude modulation (AM)- and phased modulation (PM)-based techniques, this paper proposes a new technique that doubles the data rate by using a hybrid FSK-FDM technique. Note that the AM-based techniques are used when the communication receiver resides in the side lobe region of the radar. In contrast, the PM-based techniques perform better if the communication receiver is in the main lobe region. However, the proposed design facilitates the delivery of information bits to the communication receivers with an improved bit rate (BR) and bit error rate (BER) regardless of their locations in the radar's main lobe or side lobe regions. That is, the proposed scheme enables information encoding according to the transmitted waveforms and frequencies using FSK modulation. Next, the modulated symbols are added together to achieve a double data rate using the FDM technique. Finally, each transmitted composite symbol contains multiple FSK-modulated symbols, resulting in an increased data rate for the communication receiver. Numerous simulation results are presented to validate the effectiveness of the proposed technique.


Assuntos
Comunicação , Radar , Simulação por Computador
7.
Entropy (Basel) ; 25(7)2023 Jul 06.
Artigo em Inglês | MEDLINE | ID: mdl-37509974

RESUMO

In this paper, we design constant modulus waveforms for dual-function radar-communication (DFRC) systems based on a multi-input multi-output (MIMO) configuration of sensors for a far-field scenario. At first, we formulate a non-convex optimization problem subject to waveform synthesis for minimizing the interference power while maintaining a constant modulus constraint. Next, we solve this non-convex problem, iteratively, using the alternating direction method of multipliers (ADMM) algorithm. Importantly, the designed waveforms approximate a desired beampattern in terms of a high-gain radar beam and a slightly high gain communication beam while maintaining a desired low sidelobe level. The designed waveforms ensure an improved detection probability and an improved bit error rate (BER) for radar and communications parts, respectively. Finally, we demonstrate the effectiveness of the proposed method through simulation results.

8.
Sensors (Basel) ; 22(14)2022 Jul 06.
Artigo em Inglês | MEDLINE | ID: mdl-35890758

RESUMO

Cache-enabled networks suffer hugely from the challenge of content caching and content delivery. In this regard, cache-enabled device-to-device (D2D) assisted multitier cellular networks are expected to relieve the network data pressure and effectively solve the problem of content placement and content delivery. Consequently, the user can have a better opportunity to get their favored contents from nearby cache-enabled transmitters (CETs) through reliable and good-quality links; however, as expected, designing an effective caching policy is a challenging task due to the limited cache memory of CETs and uncertainty in user preferences. In this article, we introduce a joint content placement and content delivery technique for D2D assisted multitier cellular networks (D2DMCN). A support vector machine (SVM) is employed to predict the content popularity to determine which content is to be cached and where it is to be cached, thereby increasing the overall cache hit ratio (CHR). The content request is satisfied either by the neighboring node through the D2D link or by the cache-enabled base stations (BSs) of the multitier cellular networks (MCNs). Similarly, to solve the problem of optimal content delivery, the Hungarian algorithm is employed aiming to improve the quality of satisfaction. The simulation results indicate that the proposed content placement strategy effectively optimizes the overall cache hit ratio of the system. Similarly, an effective content delivery approach reduces the request content delivery delay and power consumption.


Assuntos
Algoritmos , Comportamento Alimentar , Simulação por Computador
9.
Sensors (Basel) ; 22(18)2022 Sep 06.
Artigo em Inglês | MEDLINE | ID: mdl-36146089

RESUMO

The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data are not endangered after illegal access by hackers and other unauthorized persons. In parallel, these large volumes of confidential industrial data need to be processed within reasonable time for effective deliverables. Currently, there are many mathematical-based symmetric and asymmetric key cryptographic approaches and identity- and attribute-based public key cryptographic approaches that exist to address the abovementioned concerns and limitations such as computational overheads and taking more time for crucial generation as part of the encipherment and decipherment process for large-scale data privacy and security. In addition, the required key for the encipherment and decipherment process may be generated by a third party which may be compromised and lead to man-in-the-middle attacks, brute force attacks, etc. In parallel, there are some other quantum key distribution approaches available to produce keys for the encipherment and decipherment process without the need for a third party. However, there are still some attacks such as photon number splitting attacks and faked state attacks that may be possible with these existing QKD approaches. The primary motivation of our work is to address and avoid such abovementioned existing problems with better and optimal computational overhead for key generation, encipherment, and the decipherment process compared to the existing conventional models. To overcome the existing problems, we proposed a novel dynamic quantum key distribution (QKD) algorithm for critical public infrastructure, which will secure all cyber-physical systems as part of IIoT. In this paper, we used novel multi-state qubit representation to support enhanced dynamic, chaotic quantum key generation with high efficiency and low computational overhead. Our proposed QKD algorithm can create a chaotic set of qubits that act as a part of session-wise dynamic keys used to encipher the IIoT-based large scales of information for secure communication and distribution of sensitive information.


Assuntos
Segurança Computacional , Privacidade , Algoritmos , Comunicação , Confidencialidade , Humanos
10.
Math Biosci Eng ; 21(4): 5207-5226, 2024 Mar 06.
Artigo em Inglês | MEDLINE | ID: mdl-38872533

RESUMO

Hepatitis B is one of the global health issues caused by the hepatitis B virus (HBV), producing 1.1 million deaths yearly. The acute and chronic phases of HBV are significant because worldwide, approximately 250 million people are infected by chronic hepatitis B. The chronic stage is a long-term, persistent infection that can cause liver damage and increase the risk of liver cancer. In the case of multiple phases of infection, a generalized saturated incidence rate model is more reasonable than a simply saturated incidence because it captures the complex dynamics of the different infection phases. In contrast, a simple saturated incidence rate model assumes a fixed shape for the incidence rate curve, which may not accurately reflect the dynamics of multiple infection phases. Considering HBV and its various phases, we constructed a model to present the dynamics and control strategies using the generalized saturated incidence. First, we proved that the model is well-posed. We then found the reproduction quantity and model equilibria to discuss the time dynamics of the model and investigate the conditions for stabilities. We also examined a control mechanism by introducing various controls to the model with the aim to increase the population of those recovered and minimize the infected people. We performed numerical experiments to check the biological significance and control implementation.


Assuntos
Simulação por Computador , Vírus da Hepatite B , Hepatite B , Humanos , Incidência , Hepatite B/epidemiologia , Hepatite B Crônica/epidemiologia , Número Básico de Reprodução/estatística & dados numéricos , Neoplasias Hepáticas/epidemiologia , Modelos Biológicos , Algoritmos
11.
Sci Rep ; 14(1): 12047, 2024 May 27.
Artigo em Inglês | MEDLINE | ID: mdl-38802447

RESUMO

In recent years, there has been a growing interest in incorporating fractional calculus into stochastic delay systems due to its ability to model complex phenomena with uncertainties and memory effects. The fractional stochastic delay differential equations are conventional in modeling such complex dynamical systems around various applied fields. The present study addresses a novel spectral approach to demonstrate the stability behavior and numerical solution of the systems characterized by stochasticity along with fractional derivatives and time delay. By bridging the gap between fractional calculus, stochastic processes, and spectral analysis, this work contributes to the field of fractional dynamics and enriches the toolbox of analytical tools available for investigating the stability of systems with delays and uncertainties. To illustrate the practical implications and validate the theoretical findings of our approach, some numerical simulations are presented.

12.
Sci Rep ; 14(1): 7902, 2024 04 04.
Artigo em Inglês | MEDLINE | ID: mdl-38570524

RESUMO

The spatial movement of the human population from one region to another and the existence of super-spreaders are the main factors that enhanced the disease incidence. Super-spreaders refer to the individuals having transmitting ability to multiple pathogens. In this article, an epidemic model with spatial and temporal effects is formulated to analyze the impact of some preventing measures of COVID-19. The model is developed using six nonlinear partial differential equations. The infectious individuals are sub-divided into symptomatic, asymptomatic and super-spreader classes. In this study, we focused on the rigorous qualitative analysis of the reaction-diffusion model. The fundamental mathematical properties of the proposed COVID-19 epidemic model such as boundedness, positivity, and invariant region of the problem solution are derived, which ensure the validity of the proposed model. The model equilibria and its stability analysis for both local and global cases have been presented. The normalized sensitivity analysis of the model is carried out in order to observe the crucial factors in the transmission of infection. Furthermore, an efficient numerical scheme is applied to solve the proposed model and detailed simulation are performed. Based on the graphical observation, diffusion in the context of confined public gatherings is observed to significantly inhibit the spread of infection when compared to the absence of diffusion. This is especially important in scenarios where super-spreaders may play a major role in transmission. The impact of some non-pharmaceutical interventions are illustrated graphically with and without diffusion. We believe that the present investigation will be beneficial in understanding the complex dynamics and control of COVID-19 under various non-pharmaceutical interventions.


Assuntos
COVID-19 , Epidemias , Humanos , COVID-19/epidemiologia , Dinâmica não Linear , Simulação por Computador , Difusão
13.
Sci Rep ; 14(1): 6930, 2024 Mar 23.
Artigo em Inglês | MEDLINE | ID: mdl-38521792

RESUMO

The fractional stochastic delay differential equation (FSDDE) is a powerful mathematical tool for modeling complex systems that exhibit both fractional order dynamics and stochasticity with time delays. The purpose of this study is to explore the stability analysis of a system of FSDDEs. Our study emphasizes the interaction between fractional calculus, stochasticity, and time delays in understanding the stability of such systems. Analyzing the moments of the system's solutions, we investigate stochasticity's influence on FSDDS. The article provides practical insight into solving FSDDS efficiently using various numerical techniques. Additionally, this research focuses both on asymptotic as well as Lyapunov stability of FSDDS. The local stability conditions are clearly presented and also the effects of a fractional orders with delay on the stability properties are examine. Through a comprehensive test of a stability criteria, practical examples and numerical simulations we demonstrate the complexity and challenges concern with the analyzing FSDDEs.

14.
Heliyon ; 10(6): e28073, 2024 Mar 30.
Artigo em Inglês | MEDLINE | ID: mdl-38524527

RESUMO

Recent widespread connections of renewable energy resource (RESs) in place of fossil fuel supplies and the adoption of electrical vehicles in place of gasoline-powered vehicles have given birth to a number of new concerns. The control architecture of linked power networks now faces an increasingly pressing challenge: tie-line power fluctuations and reducing frequency deviations. Because of their nature and dependence on external circumstances, RESs are analogous to continually fluctuating power generators. Using a fractional order-based frequency regulator, this work presents a new method for improving the frequency regulation in a two-area interconnected power system. In order to deal with the frequency regulation difficulties of the hybrid system integrated with RES, the suggested controller utilizes the modified form of fractional order proportional integral derivative (FOPID) controller known as FOI-PDN controller. The new proposed controllers are designed using the white shark optimizer (WSO), a current powerful bioinspired meta heuristic algorithm which has been motivated by the learning abilities of white sharks when actively hunting in the environment. The suggested FOI-PDN controller's performance was compared to that of various control methodologies such as FOPID, and PID. Furthermore, the WSO findings are compared to those of other techniques such as the salp swarm algorithm, sine cosine algorithm and fitness dependent optimizer. The recommended controller and design approach have been tested and validated at different loading conditions and different circumstances, as well as their robustness against system parameter suspicions. The simulation outcomes demonstrate that the WSO-based tuned FOI-PDN controller successfully reduces peak overshoot by 73.33%, 91.03%, and 77.21% for region-2, region-1, and link power variation respectively, and delivers minimum undershoot of 89.12%, 83.11%, and 78.10% for both regions and tie-line. The obtained findings demonstrate the new proposed controller's stable function and frequency controlling performance with optimal controller parameters and without the requirement for a sophisticated design process.

15.
Heliyon ; 10(7): e28352, 2024 Apr 15.
Artigo em Inglês | MEDLINE | ID: mdl-38571657

RESUMO

The use of natural ester oils as electrically insulating fluids has gained significant attention from industries and electrical utilities as they aim to replace traditional mineral oils. However, most natural ester oils are derived from edible products, which has the potential to contribute to the food crisis. Therefore, nonedible green nanofluids made from cottonseed oil (CSO) have been targeted as a keen solution to this issue. However, Al2O3, TiO2, Fe2O3, SiO2, and graphene nanoparticles at (0.025, 0.05, and 0.075 wt/vol%) were used as additives, along with surfactant Olic Ac-id and Ethanol (1:5) due to their promising impact on the dielectric and thermal properties of the nanofluid. The nanofluid synthesis process was practically conducted in HV & Chemical Laboratories using one-step and two-step methods, and their breakdown voltage results and chemical properties (e.g., fire point, flash point, cloud point, pour point, viscosity, acidity, moisture content, resistivity, and dissipation factor) were compared. The physical mechanisms underlying these properties were also analyzed and tested. For the validation of the proposed vegetable oil the results have been compared with traditional mineral oil for high-voltage equipment's. The findings suggest that the proposed nonedible green nanofluids-based cottonseed oil (CSO) has a high potential to be used as electrically insulating fluids, providing a sustainable alternative to conventional mineral oils. Overall, this study provides insights into the use of non-edible green nanofluids as a solution to the potential contribution of natural ester oils to the food crisis. The findings highlight the importance of sustainable solutions in the energy industry and the need for further research in this area.

16.
Sci Rep ; 13(1): 21224, 2023 Dec 01.
Artigo em Inglês | MEDLINE | ID: mdl-38040862

RESUMO

In this article, we introduce a novel Bayesian Max-EWMA control chart under various loss functions to concurrently monitor the mean and variance of a normally distributed process. The Bayesian Max-EWMA control chart exhibit strong overall performance in detecting shifts in both mean and dispersion across various magnitudes. To evaluate the performance of the proposed control chart, we employ Monte Carlo simulation methods to compute their run length characteristics. We conduct an extensive comparative analysis, contrasting the run length performance of our proposed charts with that of existing ones. Our findings highlight the heightened sensitivity of Bayesian Max-EWMA control chart to shifts of diverse magnitudes. Finally, to illustrate the efficacy of our Bayesian Max-EWMA control chart using various loss functions, we present a practical case study involving the hard-bake process in semiconductor manufacturing. Our results underscore the superior performance of the Bayesian Max-EWMA control chart in detecting out-of-control signals.

17.
Sci Rep ; 13(1): 13547, 2023 Aug 20.
Artigo em Inglês | MEDLINE | ID: mdl-37599295

RESUMO

The extended exponential weighted moving average (EEWMA) statistic is a memory type statistic that uses past observations along with the current information for the estimation of a population parameter to improve the efficiency of the estimators. This study utilized the EEWMA statistic to estimate the population mean with a suitable auxiliary variable. The ratio and product estimators are proposed for the surveys that are time-based by using current information along with that information. The approximate mean square errors are computed for the proposed memory type estimators and mathematical comparison is discussed to demonstrate the efficiency of the estimator. The simulation study was carried out to evaluate the performance of the proposed memory type estimators. It can be seen from the results that the efficiency of the estimator enhances by utilizing the current sample as well as past information. A real-life example is presented to illustrate the usage of proposed estimators.

18.
Sci Rep ; 13(1): 9463, 2023 Jun 10.
Artigo em Inglês | MEDLINE | ID: mdl-37301897

RESUMO

The memory-type control charts, such as cumulative sum (CUSUM) and exponentially weighted moving average control chart, are more desirable for detecting a small or moderate shift in the production process of a location parameter. In this article, a novel Bayesian adaptive EWMA (AEWMA) control chat utilizing ranked set sampling (RSS) designs is proposed under two different loss functions, i.e., square error loss function (SELF) and linex loss function (LLF), and with informative prior distribution to monitor the mean shift of the normally distributed process. The extensive Monte Carlo simulation method is used to check the performance of the suggested Bayesian-AEWMA control chart using RSS schemes. The effectiveness of the proposed AEWMA control chart is evaluated through the average run length (ARL) and standard deviation of run length (SDRL). The results indicate that the proposed Bayesian control chart applying RSS schemes is more sensitive in detecting mean shifts than the existing Bayesian AEWAM control chart based on simple random sampling (SRS). Finally, to demonstrate the effectiveness of the proposed Bayesian-AEWMA control chart under different RSS schemes, we present a numerical example involving the hard-bake process in semiconductor fabrication. Our results show that the Bayesian-AEWMA control chart using RSS schemes outperforms the EWMA and AEWMA control charts utilizing the Bayesian approach under simple random sampling in detecting out-of-control signals.


Assuntos
Colina O-Acetiltransferase , Projetos de Pesquisa , Teorema de Bayes , Simulação por Computador , Método de Monte Carlo
19.
Sci Rep ; 13(1): 22703, 2023 Dec 19.
Artigo em Inglês | MEDLINE | ID: mdl-38123625

RESUMO

Quality control often employs memory-type control charts, including the exponentially weighted moving average (EWMA) and Shewhart control charts, to identify shifts in the location parameter of a process. This article pioneers a new Bayesian Adaptive EWMA (AEWMA) control chart, built on diverse loss functions (LFs) such as the square error loss function (SELF) and the Linex loss function (LLF). The proposed chart aims to enhance the process of identifying small to moderate as well as significant shifts in the mean, signifying a notable advancement in the field of quality control. These are implemented utilizing an informative prior for both posterior and posterior predictive distributions, employing various paired ranked set sampling (PRSS) schemes. The effectiveness of the suggested chart is appraised using average run length (ARL) and the standard deviation of run length (SDRL). Monte Carlo simulations are employed to contrast the recommended approach against other control charts. The outcomes demonstrate the dignitary performance of the recommended chart in identifying out-of-control signals, especially applying PRSS designs, in comparison to simple random sampling (SRS). Finally, a practical application was conducted in the semiconductor manufacturing context to appraise the efficacy of the offered chart using various paired ranked set sampling strategies. The results reveal that the suggested control chart performed well in capturing the out-of-control signals far better than the already in use control charts. Overall, this study interposes a new technique with diverse LFs and PRSS designs, improving the precision and effectiveness in detecting process mean shifts, thereby contributing to advancements in quality control and process monitoring.

20.
Healthcare (Basel) ; 11(1)2023 Jan 01.
Artigo em Inglês | MEDLINE | ID: mdl-36611599

RESUMO

In recent years, the healthcare system, along with the technology that surrounds it, has become a sector in much need of development. It has already improved in a wide range of areas thanks to significant and continuous research into the practical implications of biomedical and telemedicine studies. To ensure the continuing technological improvement of hospitals, physicians now also must properly maintain and manage large volumes of patient data. Transferring large amounts of data such as images to IoT servers based on machine-to-machine communication is difficult and time consuming over MQTT and MLLP protocols, and since IoT brokers only handle a limited number of bytes of data, such protocols can only transfer patient information and other text data. It is more difficult to handle the monitoring of ultrasound, MRI, or CT image data via IoT. To address this problem, this study proposes a model in which the system displays images as well as patient data on an IoT dashboard. A Raspberry Pi processes HL7 messages received from medical devices like an ultrasound machine (ULSM) and extracts only the image data for transfer to an FTP server. The Raspberry Pi 3 (RSPI3) forwards the patient information along with a unique encrypted image data link from the FTP server to the IoT server. We have implemented an authentic and NS3-based simulation environment to monitor real-time ultrasound image data on the IoT server and have analyzed the system performance, which has been impressive. This method will enrich the telemedicine facilities both for patients and physicians by assisting with overall monitoring of data.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA