Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 23
Filtrar
1.
Pers Ubiquitous Comput ; 27(3): 697-713, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-33223984

RESUMO

Internet of Things (IoT) and smart medical devices have improved the healthcare systems by enabling remote monitoring and screening of the patients' health conditions anywhere and anytime. Due to an unexpected and huge increasing in number of patients during coronavirus (novel COVID-19) pandemic, it is considerably indispensable to monitor patients' health condition continuously before any serious disorder or infection occur. According to transferring the huge volume of produced sensitive health data of patients who do not want their private medical information to be revealed, dealing with security issues of IoT data as a major concern and a challenging problem has remained yet. Encountering this challenge, in this paper, a remote health monitoring model that applies a lightweight block encryption method for provisioning security for health and medical data in cloud-based IoT environment is presented. In this model, the patients' health statuses are determined via predicting critical situations through data mining methods for analyzing their biological data sensed by smart medical IoT devices in which a lightweight secure block encryption technique is used to ensure the patients' sensitive data become protected. Lightweight block encryption methods have a crucial effective influence on this sort of systems due to the restricted resources in IoT platforms. Experimental outcomes show that K-star classification method achieves the best results among RF, MLP, SVM, and J48 classifiers, with accuracy of 95%, precision of 94.5%, recall of 93.5%, and f-score of 93.99%. Therefore, regarding the attained outcomes, the suggested model is successful in achieving an effective remote health monitoring model assisted by secure IoT data in cloud-based IoT platforms.

2.
Sensors (Basel) ; 23(1)2022 Dec 26.
Artigo em Inglês | MEDLINE | ID: mdl-36616830

RESUMO

The Internet of Things (IoT) is a telecommunication network in the next generation of applications with the rapid progress of wireless sensor network techniques that have touched many spheres of life today. Hardware, telephony, communications, storage, secure platforms, software and services, and data processing platforms are all part of the IoT environment. IoT sensors collect data from their environment and share it by connecting to the Internet gateway. These sensors often perform tasks without human intervention. This article aims to review real-time scheduling in the IoT to fully understand the issues raised in this area published from 2018 to 2022. A classification for IoT applications based on practical application is provided for selected studies. Selected studies include healthcare, infrastructure, industrial applications, smart city, commercial applications, environmental protection, and general IoT applications. Studies are sorted into groups based on related applications and compared based on indicators such as performance time, energy consumption, makespan, and assessment environments depending on the provided classification. Finally, this paper discusses all reviewed studies' main concepts, disadvantages, advantages, and future work.


Assuntos
Internet das Coisas , Comunicação , Internet
3.
Comput Econ ; : 1-20, 2022 Oct 26.
Artigo em Inglês | MEDLINE | ID: mdl-36321064

RESUMO

With the spread of COVID-19, economic damages are challenging for governments and people's livelihood besides its dangerous and negative impact on humanity's health, which can be led to death. Various health guidelines have been proposed to tackle the virus outbreak including quarantine, restriction rules to imports, exports, migrations, and tourist arrival that were affected by economic depression. Providing an approach to predict the economic situation has a highlighted role in managing crisis when a country faces a problem such as a disease epidemic. We propose an intelligent algorithm to predict the economic situation that utilizes neural networks (NNs) to satisfy the aim. Our work estimates correlation coefficient based on the spearman method between gross domestic product rate (GDPR) and other economic statistics to find effective parameters on growing up and falling GDPR and also determined the NNs' inputs. We study the reported economic and disease statistics in Germany, India, Australia, and Thailand countries to evaluate the algorithm's efficiency in predicting economic situation. The experimental results demonstrate the prediction accuracy of approximately 96% and 89% for one and more months ahead, respectively. Our method can help governments to present efficient policies for preventing economic damages.

4.
J Med Syst ; 40(9): 201, 2016 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-27468842

RESUMO

Wireless body area sensor network is a special purpose wireless sensor network that, employing wireless sensor nodes in, on, or around the human body, makes it possible to measure biological parameters of a person for specific applications. One of the most fundamental concerns in wireless body sensor networks is accurate routing in order to send data promptly and properly, and therefore overcome some of the challenges. Routing protocols for such networks are affected by a large number of factors including energy, topology, temperature, posture, the radio range of sensors, and appropriate quality of service in sensor nodes. Since energy is highly important in wireless body area sensor networks, and increasing the network lifetime results in benefiting greatly from sensor capabilities, improving routing performance with reduced energy consumption presents a major challenge. This paper aims to study wireless body area sensor networks and the related routing methods. It also presents a thorough, comprehensive review of routing methods in wireless body area sensor networks from the perspective of energy. Furthermore, different routing methods affecting the parameter of energy will be classified and compared according to their advantages and disadvantages. In this paper, fundamental concepts of wireless body area sensor networks are provided, and then the advantages and disadvantages of these networks are investigated. Since one of the most fundamental issues in wireless body sensor networks is to perform routing so as to transmit data precisely and promptly, we discuss the same issue. As a result, we propose a classification of the available relevant literature with respect to the key challenge of energy in the routing process. With this end in view, all important papers published between 2000 and 2015 are classified under eight categories including 'Mobility-Aware', 'Thermal-Aware', 'Restriction of Location and Number of Relays', 'Link-aware', 'Cluster- and Tree-Based', 'Cross-Layer', 'Opportunistic', and 'Medium Access Control'. We, then, provide a full description of the statistical analysis of each category in relation to all papers, current hybrid protocols, and the type of simulators used in each paper. Next, we analyze the distribution of papers in each category during various years. Moreover, for each category, the advantages and disadvantages as well as the number of issued papers in different years are given. We also analyze the type of layer and deployment of mathematical models or algorithmic techniques in each category. Finally, after introducing certain important protocols for each category, the goals, advantages, and disadvantages of the protocols are discussed and compared with each other.


Assuntos
Técnicas Biossensoriais/instrumentação , Tecnologia de Sensoriamento Remoto/instrumentação , Telemetria/instrumentação , Telemetria/métodos , Tecnologia sem Fio , Técnicas Biossensoriais/métodos , Humanos , Monitorização Ambulatorial/instrumentação
5.
Multimed Tools Appl ; : 1-27, 2023 Feb 17.
Artigo em Inglês | MEDLINE | ID: mdl-36811000

RESUMO

In today's world, health and medicine play an undeniable role in human life. Traditional and current Electronic Health Records (EHR) systems that are used to exchange information between medical stakeholders (patients, physicians, insurance companies, pharmaceuticals, medical researchers, etc.) suffer weaknesses in terms of security and privacy due to having centralized architecture. Blockchain technology ensures the privacy and security of EHR systems thanks to the use of encryption. Moreover, due to its decentralized nature, this technology prevents central failure and central attack points. In this paper, a systematic literature review (SLR) is proposed to analyze the existing Blockchain-based approaches for improving privacy and security in electronic health systems. The research methodology, paper selection process, and the search query are explained. 51 papers returned from our search criteria published between 2018 and Dec 2022 are reviewed. The main ideas, type of Blockchain, evaluation metrics, and used tools of each selected paper are discussed in detail. Finally, future research directions, open challenges, and some issues are discussed.

6.
Neural Comput Appl ; 35(20): 14739-14778, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-37274420

RESUMO

The infectious disease Covid-19 has been causing severe social, economic, and human suffering across the globe since 2019. The countries have utilized different strategies in the last few years to combat Covid-19 based on their capabilities, technological infrastructure, and investments. A massive epidemic like this cannot be controlled without an intelligent and automatic health care system. The first reaction to the disease outbreak was lockdown, and researchers focused more on developing methods to diagnose the disease and recognize its behavior. However, as the new lifestyle becomes more normalized, research has shifted to utilizing computer-aided methods to monitor, track, detect, and treat individuals and provide services to citizens. Thus, the Internet of things, based on fog-cloud computing, using artificial intelligence approaches such as machine learning, and deep learning are practical concepts. This article aims to survey computer-based approaches to combat Covid-19 based on prevention, detection, and service provision. Technically and statistically, this article analyzes current methods, categorizes them, presents a technical taxonomy, and explores future and open issues.

7.
Sci Rep ; 13(1): 11058, 2023 07 08.
Artigo em Inglês | MEDLINE | ID: mdl-37422490

RESUMO

The Internet of Things (IoT) is a universal network to supervise the physical world through sensors installed on different devices. The network can improve many areas, including healthcare because IoT technology has the potential to reduce pressure caused by aging and chronic diseases on healthcare systems. For this reason, researchers attempt to solve the challenges of this technology in healthcare. In this paper, a fuzzy logic-based secure hierarchical routing scheme using the firefly algorithm (FSRF) is presented for IoT-based healthcare systems. FSRF comprises three main frameworks: fuzzy trust framework, firefly algorithm-based clustering framework, and inter-cluster routing framework. A fuzzy logic-based trust framework is responsible for evaluating the trust of IoT devices on the network. This framework identifies and prevents routing attacks like black hole, flooding, wormhole, sinkhole, and selective forwarding. Moreover, FSRF supports a clustering framework based on the firefly algorithm. It presents a fitness function that evaluates the chance of IoT devices to be cluster head nodes. The design of this function is based on trust level, residual energy, hop count, communication radius, and centrality. Also, FSRF involves an on-demand routing framework to decide on reliable and energy-efficient paths that can send the data to the destination faster. Finally, FSRF is compared to the energy-efficient multi-level secure routing protocol (EEMSR) and the enhanced balanced energy-efficient network-integrated super heterogeneous (E-BEENISH) routing method based on network lifetime, energy stored in IoT devices, and packet delivery rate (PDR). These results prove that FSRF improves network longevity by 10.34% and 56.35% and the energy stored in the nodes by 10.79% and 28.51% compared to EEMSR and E-BEENISH, respectively. However, FSRF is weaker than EEMSR in terms of security. Furthermore, PDR in this method has dropped slightly (almost 1.4%) compared to that in EEMSR.


Assuntos
Lógica Fuzzy , Internet das Coisas , Instalações de Saúde , Algoritmos , Atenção à Saúde
8.
Sci Rep ; 13(1): 13046, 2023 Aug 11.
Artigo em Inglês | MEDLINE | ID: mdl-37567984

RESUMO

Today, wireless sensor networks (WSNs) are growing rapidly and provide a lot of comfort to human life. Due to the use of WSNs in various areas, like health care and battlefield, security is an important concern in the data transfer procedure to prevent data manipulation. Trust management is an affective scheme to solve these problems by building trust relationships between sensor nodes. In this paper, a cluster-based trusted routing technique using fire hawk optimizer called CTRF is presented to improve network security by considering the limited energy of nodes in WSNs. It includes a weighted trust mechanism (WTM) designed based on interactive behavior between sensor nodes. The main feature of this trust mechanism is to consider the exponential coefficients for the trust parameters, namely weighted reception rate, weighted redundancy rate, and energy state so that the trust level of sensor nodes is exponentially reduced or increased based on their hostile or friendly behaviors. Moreover, the proposed approach creates a fire hawk optimizer-based clustering mechanism to select cluster heads from a candidate set, which includes sensor nodes whose remaining energy and trust levels are greater than the average remaining energy and the average trust level of all network nodes, respectively. In this clustering method, a new cost function is proposed based on four objectives, including cluster head location, cluster head energy, distance from the cluster head to the base station, and cluster size. Finally, CTRF decides on inter-cluster routing paths through a trusted routing algorithm and uses these routes to transmit data from cluster heads to the base station. In the route construction process, CTRF regards various parameters such as energy of the route, quality of the route, reliability of the route, and number of hops. CTRF runs on the network simulator version 2 (NS2), and its performance is compared with other secure routing approaches with regard to energy, throughput, packet loss rate, latency, detection ratio, and accuracy. This evaluation proves the superior and successful performance of CTRF compared to other methods.

9.
PLoS One ; 18(9): e0289173, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-37682948

RESUMO

In wireless sensor networks (WSNs), existing routing protocols mainly consider energy efficiency or security separately. However, these protocols must be more comprehensive because many applications should guarantee security and energy efficiency, simultaneously. Due to the limited energy of sensor nodes, these protocols should make a trade-off between network lifetime and security. This paper proposes a cluster-tree-based trusted routing method using the grasshopper optimization algorithm (GOA) called CTTRG in WSNs. This routing scheme includes a distributed time-variant trust (TVT) model to analyze the behavior of sensor nodes according to three trust criteria, including the black hole, sink hole, and gray hole probability, the wormhole probability, and the flooding probability. Furthermore, CTTRG suggests a GOA-based trusted routing tree (GTRT) to construct secure and stable communication paths between sensor nodes and base station. To evaluate each GTRT, a multi-objective fitness function is designed based on three parameters, namely the distance between cluster heads and their parent node, the trust level, and the energy of cluster heads. The evaluation results prove that CTTRG has a suitable and successful performance in terms of the detection speed of malicious nodes, packet loss rate, and end-to-end delay.


Assuntos
Gafanhotos , Animais , Algoritmos , Comunicação , Inundações
10.
Sci Rep ; 13(1): 1323, 2023 Jan 24.
Artigo em Inglês | MEDLINE | ID: mdl-36693862

RESUMO

Flying ad-hoc networks (FANETs) include a large number of drones, which communicate with each other based on an ad hoc model. These networks provide new opportunities for various applications such as military, industrial, and civilian applications. However, FANETs have faced with many challenges like high-speed nodes, low density, and rapid changes in the topology. As a result, routing is a challenging issue in these networks. In this paper, we propose an energy-aware routing scheme in FANETs. This scheme is inspired by the optimized link state routing (OLSR). In the proposed routing scheme, we estimate the connection quality between two flying nodes using a new technique, which utilizes two parameters, including ratio of sent/received of hello packets and connection time. Also, our proposed method selects multipoint relays (MPRs) using the firefly algorithm. It chooses a node with high residual energy, high connection quality, more neighborhood degree, and higher willingness as MPR. Finally, our proposed scheme creates routes between different nodes based on energy and connection quality. Our proposed routing scheme is simulated using the network simulator version 3 (NS3). We compare its simulation results with the greedy optimized link state routing (G-OLSR) and the optimized link state routing (OLSR). These results show that our method outperforms G-OLSR and OLSR in terms of delay, packet delivery rate, throughput, and energy consumption. However, our proposed routing scheme increases slightly routing overhead compared to G-OLSR.

11.
Sci Rep ; 13(1): 21702, 2023 Dec 07.
Artigo em Inglês | MEDLINE | ID: mdl-38066003

RESUMO

Physical Unclonable Functions (PUFs) are widely used in cryptographic authentication and key-agreement protocols due to their unique physical properties. This article presents a comprehensive cryptanalysis of two recently developed authentication protocols, namely PLAKE and EV-PUF, both relying on PUFs. Our analysis reveals significant vulnerabilities in these protocols, including susceptibility to impersonation and key leakage attacks, which pose serious threats to the security of the underlying systems. In the case of PLAKE, we propose an attack that can extract the shared secret key with negligible complexity by eavesdropping on consecutive protocol sessions. Similarly, we demonstrate an efficient attack against EV-PUF that enables the determination of the shared key between specific entities. Furthermore, we highlight the potential for a single compromised client in the EV-PUF protocol to compromise the security of the entire network, leaving it vulnerable to pandemic attacks. These findings underscore the critical importance of careful design and rigorous evaluation when developing PUF-based authentication protocols. To address the identified vulnerabilities, we present an improved PUF-based authentication protocol that ensures robust security against all the attacks described in the context of PLAKE and EV-PUF. Through this research, we contribute to the field by exposing vulnerabilities in existing PUF-based authentication protocols and offering an improved protocol that enhances security and safeguards against various attack vectors. This work serves as a valuable reference for researchers and practitioners involved in the design and implementation of secure authentication schemes for IoT systems and dynamic charging systems for electric vehicles.

12.
PLoS One ; 18(10): e0290119, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-37782661

RESUMO

Patients must always communicate with their doctor for checking their health status. In recent years, wireless body sensor networks (WBSNs) has an important contribution in Healthcare. In these applications, energy-efficient and secure routing is really critical because health data of individuals must be forwarded to the destination securely to avoid unauthorized access by malicious nodes. However, biosensors have limited resources, especially energy. Recently, energy-efficient solutions have been proposed. Nevertheless, designing lightweight security mechanisms has not been stated in many schemes. In this paper, we propose a secure routing approach based on the league championship algorithm (LCA) for wireless body sensor networks in healthcare. The purpose of this scheme is to create a tradeoff between energy consumption and security. Our approach involves two important algorithms: routing process and communication security. In the first algorithm, each cluster head node (CH) applies the league championship algorithm to choose the most suitable next-hop CH. The proposed fitness function includes parameters like distance from CHs to the sink node, remaining energy, and link quality. In the second algorithm, we employs a symmetric encryption strategy to build secure connection links within a cluster. Also, we utilize an asymmetric cryptography scheme for forming secure inter-cluster connections. Network simulator version 2 (NS2) is used to implement the proposed approach. The simulation results show that our method is efficient in terms of consumed energy and delay. In addition, our scheme has good throughput, high packet delivery rate, and low packet loss rate.


Assuntos
Redes de Comunicação de Computadores , Tecnologia sem Fio , Humanos , Simulação por Computador , Algoritmos , Atenção à Saúde
13.
Wirel Pers Commun ; 122(1): 451-476, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-34426718

RESUMO

In the century of automation, which is digitized, and more and more technology is used, automatic systems' replacement of old manual systems makes people's lives easier. Nowadays, people have made the Internet an integral part of humans' daily lives unless they are insecure. The Internet of Things (IoT) secures a platform that authorizes devices and sensors to be remotely detected, connected, and controlled over the Internet. Due to the developments in sensor technologies, the production of tiny and low-cost sensors has increased. Many sensors, such as temperature, pressure, vibration, sound, light, can be used in the IoT. As a result of the development of these sensors with new generations, the power of the IoT technology increases, and accordingly, the revolution of IoT applications are developing rapidly. Therefore, their security issues and threats are challenging topics. In this paper, the benefits and open issues, threats, limitations of IoT applications are presented. The assessment shows that the most influential factor for evaluating IoT applications is the cost that is used in 79% of all articles, then the real-time-ness that is used in 64%, and security and error are used in 57% of all reviewed articles.

14.
J Supercomput ; 78(7): 10211-10249, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35079198

RESUMO

Considering the importance of biosensors on the Internet of the patient body that collect vital signs and transmit them to the coordinator, energy consumption and network lifetime are essential challenges in these networks. This paper, it has been tried to present a method based on adapting sampling rate through patient's risk and discovered pattern by employing an intelligence method based on adaptive neuro-fuzzy inference system, interpolation function, and a biosensor patron. It causes restricting sensed and transmitted data to the coordinator. In the proposed schema, three methods containing Grid partitioning, Subtractive Clustering and fuzzy c-means have been used in two modes, including hybrid and error backpropagation, to predict the individual's behavioral pattern and determine the patient's risk, attentively. The simulation results in MATLAB R2018b show that the proposed method reduces the network communications. It has improved energy consumption by up to three times and also reduced traffic by more than 80% compared to similar methods.

15.
Sci Rep ; 12(1): 9638, 2022 06 10.
Artigo em Inglês | MEDLINE | ID: mdl-35688867

RESUMO

Pipelines are the safest tools for transporting oil and gas. However, the environmental effects and sabotage of hostile people cause corrosion and decay of pipelines, which bring financial and environmental damages. Today, new technologies such as the Internet of Things (IoT) and wireless sensor networks (WSNs) can provide solutions to monitor and timely detect corrosion of oil pipelines. Coverage is a fundamental challenge in pipeline monitoring systems to timely detect and resolve oil leakage and pipeline corrosion. To ensure appropriate coverage on pipeline monitoring systems, one solution is to design a scheduling mechanism for nodes to reduce energy consumption. In this paper, we propose a reinforcement learning-based area coverage technique called CoWSN to intelligently monitor oil and gas pipelines. In CoWSN, the sensing range of each sensor node is converted to a digital matrix to estimate the overlap of this node with other neighboring nodes. Then, a Q-learning-based scheduling mechanism is designed to determine the activity time of sensor nodes based on their overlapping, energy, and distance to the base station. Finally, CoWSN can predict the death time of sensor nodes and replace them at the right time. This work does not allow to be disrupted the data transmission process between sensor nodes and BS. CoWSN is simulated using NS2. Then, our scheme is compared with three area coverage schemes, including the scheme of Rahmani et al., CCM-RL, and CCA according to several parameters, including the average number of active sensor nodes, coverage rate, energy consumption, and network lifetime. The simulation results show that CoWSN has a better performance than other methods.


Assuntos
Redes de Comunicação de Computadores , Internet das Coisas , Algoritmos , Humanos , Tecnologia de Sensoriamento Remoto/métodos , Tecnologia sem Fio
17.
Multimed Tools Appl ; 81(20): 28779-28798, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35382107

RESUMO

Since early 2020, Coronavirus Disease 2019 (COVID-19) has spread widely around the world. COVID-19 infects the lungs, leading to breathing difficulties. Early detection of COVID-19 is important for the prevention and treatment of pandemic. Numerous sources of medical images (e.g., Chest X-Rays (CXR), Computed Tomography (CT), and Magnetic Resonance Imaging (MRI)) are regarded as a desirable technique for diagnosing COVID-19 cases. Medical images of coronavirus patients show that the lungs are filled with sticky mucus that prevents them from inhaling. Today, Artificial Intelligence (AI) based algorithms have made a significant shift in the computer aided diagnosis due to their effective feature extraction capabilities. In this survey, a complete and systematic review of the application of Machine Learning (ML) methods for the detection of COVID-19 is presented, focused on works that used medical images. We aimed to evaluate various ML-based techniques in detecting COVID-19 using medical imaging. A total of 26 papers were extracted from ACM, ScienceDirect, Springerlink, Tech Science Press, and IEEExplore. Five different ML categories to review these mechanisms are considered, which are supervised learning-based, deep learning-based, active learning-based, transfer learning-based, and evolutionary learning-based mechanisms. A number of articles are investigated in each group. Also, some directions for further research are discussed to improve the detection of COVID-19 using ML techniques in the future. In most articles, deep learning is used as the ML method. Also, most of the researchers used CXR images to diagnose COVID-19. Most articles reported accuracy of the models to evaluate model performance. The accuracy of the studied models ranged from 0.84 to 0.99. The studies demonstrated the current status of AI techniques in using AI potentials in the fight against COVID-19.

18.
Sci Rep ; 12(1): 20184, 2022 11 23.
Artigo em Inglês | MEDLINE | ID: mdl-36418354

RESUMO

Air pollution has changed ecosystem and atmosphere. It is dangerous for environment, human health, and other living creatures. This contamination is due to various industrial and chemical pollutants, which reduce air, water, and soil quality. Therefore, air quality monitoring is essential. Flying ad hoc networks (FANETs) are an effective solution for intelligent air quality monitoring and evaluation. A FANET-based air quality monitoring system uses unmanned aerial vehicles (UAVs) to measure air pollutants. Therefore, these systems have particular features, such as the movement of UAVs in three-dimensional area, high dynamism, quick topological changes, constrained resources, and low density of UAVs in the network. Therefore, the routing issue is a fundamental challenge in these systems. In this paper, we introduce a Q-learning-based routing method called QFAN for intelligent air quality monitoring systems. The proposed method consists of two parts: route discovery and route maintenance. In the part one, a Q-learning-based route discovery mechanism is designed. Also, we propose a filtering parameter to filter some UAVs in the network and restrict the search space. In the route maintenance phase, QFAN seeks to detect and correct the paths near to breakdown. Moreover, QFAN can quickly identify and replace the failed paths. Finally, QFAN is simulated using NS2 to assess its performance. The simulation results show that QFAN surpasses other routing approaches with regard to end-to-end delay, packet delivery ratio, energy consumption, and network lifetime. However, communication overhead has been increased slightly in QFAN.


Assuntos
Poluição do Ar , Redes de Comunicação de Computadores , Humanos , Ecossistema , Algoritmos , Simulação por Computador , Poluição do Ar/prevenção & controle
19.
PeerJ Comput Sci ; 7: e589, 2021.
Artigo em Inglês | MEDLINE | ID: mdl-34179453

RESUMO

One of the essential concerns of Internet of Things (IoT) is in industrial systems or data architecture to support the evolutions in transportation and logistics. Considering the Industrial IoT (IIoT) openness, the need for accessibility, availability, and searching of data has rapidly increased. The primary purpose of this research is to propose an Efficient Two-Dimensional Filter (ETDF) to store multimedia data of IIoT applications in a specific format to achieve faster response and dynamic updating. This filter consists of a two-dimensional array and a hash function integrated into a cuckoo filter for efficient use of memory. This study evaluates the scalability of the filter by increasing the number of requests from 10,000 to 100,000. To assess the performance of the proposed filter, we measure the parameters of access time and lookup message latency. The results show that the proposed filter improves the access time by 12%, compared to a Fast Two-Dimensional Filter (FTDF). Moreover, it improves memory usage by 20% compared to FTDF. Experiments indicate a better access time of the proposed filter compared to other filters (i.e., Bloom, quotient, cuckoo, and FTD filters). Insertion and deletion times are essential parameters in comparing filters, so they are also analyzed.

20.
Comput Methods Programs Biomed ; 199: 105903, 2021 Feb.
Artigo em Inglês | MEDLINE | ID: mdl-33348073

RESUMO

BACKGROUND AND OBJECTIVE: With the recent advances in the Internet of Things (IoT), the field has become more and more developed in healthcare. The Internet of things will help physicians and hospital staff perform their duties comfortably and intelligently. With the latest advanced technologies, most of the challenges of using IoT have been resolved, and this technology can be a great revolution and has many benefits in the future of digital. Healthcare is one of the most useful areas for IoT use. The most important application of IoT is to monitor and make quick decisions in critical situations. Thanks to this technology-based treatment approach, there is an unprecedented opportunity to better the quality and productivity of treatments and better the patient's well-being and better government funding. METHODS: In this paper, we provide a comprehensive overview of the primary uses of IoT in healthcare. We used the Systematic Literature Review (SLR) method to analyze and comparison articles published in this field between 2015 and March 2020. RESULTS: A comprehensive taxonomy is presented based on the contents of the articles under study. In this article, a brief overview of selected articles based on research questions is given and highlights the most critical challenges and case studies for the future use of IoT in healthcare. CONCLUSIONS: According to a detailed study of the 89 articles and a glimpse into about 208 articles, challenges and future trends in healthcare have been identified.


Assuntos
Internet das Coisas , Atenção à Saúde , Previsões , Humanos , Internet , Monitorização Fisiológica , Publicações
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA