Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 6 de 6
Filtrar
Más filtros




Base de datos
Intervalo de año de publicación
1.
Sci Rep ; 14(1): 12277, 2024 May 29.
Artículo en Inglés | MEDLINE | ID: mdl-38806546

RESUMEN

In recent years, numerous image encryption schemes have been developed that demonstrate different levels of effectiveness in terms of robust security and real-time applications. While a few of them outperform in terms of robust security, others perform well for real-time applications where less processing time is required. Balancing these two aspects poses a challenge, aiming to achieve efficient encryption without compromising security. To address this challenge, the proposed research presents a robust data security approach for encrypting grayscale images, comprising five key phases. The first and second phases of the proposed encryption framework are dedicated to the generation of secret keys and the confusion stage, respectively. While the level-1, level-2, and level-2 diffusions are performed in phases 3, 4, and 5, respectively, The proposed approach begins with secret key generation using chaotic maps for the initial pixel scrambling in the plaintext image, followed by employing the Fibonacci Transformation (FT) for an additional layer of pixel shuffling. To enhance security, Tribonacci Transformation (TT) creates level-1 diffusion in the permuted image. Level-2 diffusion is introduced to further strengthen the diffusion within the plaintext image, which is achieved by decomposing the diffused image into eight-bit planes and implementing XOR operations with corresponding bit planes that are extracted from the key image. After that, the discrete wavelet transform (DWT) is employed to develop secondary keys. The DWT frequency sub-band (high-frequency sub-band) is substituted using the substitution box process. This creates further diffusion (level 3 diffusion) to make it difficult for an attacker to recover the plaintext image from an encrypted image. Several statistical tests, including mean square error analysis, histogram variance analysis, entropy assessment, peak signal-to-noise ratio evaluation, correlation analysis, key space evaluation, and key sensitivity analysis, demonstrate the effectiveness of the proposed work. The proposed encryption framework achieves significant statistical values, with entropy, correlation, energy, and histogram variance values standing at 7.999, 0.0001, 0.0156, and 6458, respectively. These results contribute to its robustness against cyberattacks. Moreover, the processing time of the proposed encryption framework is less than one second, which makes it more suitable for real-world applications. A detailed comparative analysis with the existing methods based on chaos, DWT, Tribonacci transformation (TT), and Fibonacci transformation (FT) reveals that the proposed encryption scheme outperforms the existing ones.

2.
J Imaging Inform Med ; 2024 Mar 18.
Artículo en Inglés | MEDLINE | ID: mdl-38499705

RESUMEN

The incidence of COVID-19, a virus that is responsible for infections in the upper respiratory tract and lungs, witnessed a daily rise in fatalities throughout the pandemic. The timely identification of COVID-19 can contribute to the formulation of strategies to control the disease and the selection of an appropriate treatment pathway. Given the necessity for broader COVID-19 diagnosis, researchers have developed more advanced, rapid, and efficient detection methods. By conducting an initial comparative analysis of various widely used convolutional neural network (CNN) models, we determine an appropriate CNN model. Subsequently, we enhance the chosen CNN model using the feature fusion strategy from multi-modal imaging datasets. Moreover, the Jaya optimization technique is employed to determine the optimal weighting for merging these dual features into a single feature vector. An SVM classifier is employed to categorize samples as either COVID-19 positive or negative. For the purpose of experimentation, a standard dataset consisting of 10,000 samples is used, divided equally between COVID-19 positive and negative classes. The experimental outcomes demonstrate that the proposed fine-tuned system, coupled with optimization techniques for multi-modal data, exhibits superior performance, achieving accuracy rates of 98.7% as compared to the existing state-of-the-art network models.

3.
J Infect Public Health ; 17(4): 559-572, 2024 Apr.
Artículo en Inglés | MEDLINE | ID: mdl-38367570

RESUMEN

Internet of Medical Things (IoMT) is an emerging subset of Internet of Things (IoT), often called as IoT in healthcare, refers to medical devices and applications with internet connectivity, is exponentially gaining researchers' attention due to its wide-ranging applicability in biomedical systems for Smart Healthcare systems. IoMT facilitates remote health biomedical system and plays a crucial role within the healthcare industry to enhance precision, reliability, consistency and productivity of electronic devices used for various healthcare purposes. It comprises a conceptualized architecture for providing information retrieval strategies to extract the data from patient records using sensors for biomedical analysis and diagnostics against manifold diseases to provide cost-effective medical solutions, quick hospital treatments, and personalized healthcare. This article provides a comprehensive overview of IoMT with special emphasis on its current and future trends used in biomedical systems, such as deep learning, machine learning, blockchains, artificial intelligence, radio frequency identification, and industry 5.0.


Asunto(s)
Inteligencia Artificial , Internet , Humanos , Reproducibilidad de los Resultados , Instituciones de Salud , Aprendizaje Automático
4.
J Appl Genet ; 65(1): 83-93, 2024 Feb.
Artículo en Inglés | MEDLINE | ID: mdl-37875608

RESUMEN

Melanoma, a highly invasive type of skin cancer that penetrates the entire dermis layer, is associated with increased mortality rates. Excessive exposure of the skin to sunlight, specifically ultraviolet radiation, is the underlying cause of this malignant condition. The appearance of unique skin moles represents a visible clue, referred to as the "ugly duckling" sign, indicating the presence of melanoma and its association with cellular DNA damage. This research aims to explore potential biomarkers derived from microarray data, employing bioinformatics techniques and methodologies, for a thorough investigation of melanoma skin cancer. The microarray dataset for melanoma skin cancer was obtained from the GEO database, and thorough data analysis and quality control measures were performed to identify differentially expressed genes (DEGs). The top 14 highly expressed DEGs were identified, and their gene information and protein sequences were retrieved from the NCBI gene and protein database. These proteins were further analyzed for domain identification and network analysis. Gene expression analysis was conducted to visualize the upregulated and downregulated genes. Additionally, gene metabolite network analysis was carried out to understand the interactions between highly interconnected genes and regulatory transcripts. Molecular docking was employed to investigate the ligand-binding sites and visualize the three-dimensional structure of proteins. Our research unveiled a collection of genes with varying expression levels, some elevated and others reduced, which could function as promising biomarkers closely linked to the development and advancement of melanoma skin cancer. Through molecular docking analysis of the GINS2 protein, we identified two natural compounds (PubChem-156021169 and PubChem-60700) with potential as inhibitors against melanoma. This research has implications for early detection, treatment, and understanding the molecular basis of melanoma.


Asunto(s)
Melanoma , Neoplasias Cutáneas , Humanos , Melanoma/genética , Melanoma/metabolismo , Simulación del Acoplamiento Molecular , Rayos Ultravioleta , Neoplasias Cutáneas/genética , Perfilación de la Expresión Génica/métodos , Biomarcadores , Redes Reguladoras de Genes , Biología Computacional/métodos , Biomarcadores de Tumor/genética , Regulación Neoplásica de la Expresión Génica , Proteínas Cromosómicas no Histona/genética , Proteínas Cromosómicas no Histona/metabolismo
5.
Sensors (Basel) ; 23(6)2023 Mar 20.
Artículo en Inglés | MEDLINE | ID: mdl-36991997

RESUMEN

Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to "information security," they are referring to the study and use of methods that make data transfers harder to intercept. When we talk about "information security," this is what we have in mind. Using private keys to encrypt and decode messages is a part of this procedure. Because of its vital role in modern information theory, computer security, and engineering, cryptography is now considered to be a branch of both mathematics and computer science. Because of its mathematical properties, the Galois field may be used to encrypt and decode information, making it relevant to the subject of cryptography. The ability to encrypt and decode information is one such use. In this case, the data may be encoded as a Galois vector, and the scrambling process could include the application of mathematical operations that involve an inverse. While this method is unsafe when used on its own, it forms the foundation for secure symmetric algorithms like AES and DES when combined with other bit shuffling methods. A two-by-two encryption matrix is used to protect the two data streams, each of which contains 25 bits of binary information which is included in the proposed work. Each cell in the matrix represents an irreducible polynomial of degree 6. Fine-tuning the values of the bits that make up each of the two 25-bit binary data streams using the Discrete Cosine Transform (DCT) with the Advanced Encryption Standard (AES) Method yields two polynomials of degree 6. Optimization is carried out using the Black Widow Optimization technique is used to tune the key generation in the cryptographic processing. By doing so, we can produce two polynomials of the same degree, which was our original aim. Users may also use cryptography to look for signs of tampering, such as whether a hacker obtained unauthorized access to a patient's medical records and made any changes to them. Cryptography also allows people to look for signs of tampering with data. Indeed, this is another use of cryptography. It also has the added value of allowing users to check for indications of data manipulation. Users may also positively identify faraway people and objects, which is especially useful for verifying a document's authenticity since it lessens the possibility that it was fabricated. The proposed work achieves higher accuracy of 97.24%, higher throughput of 93.47%, and a minimum decryption time of 0.0047 s.

6.
Sensors (Basel) ; 22(22)2022 Nov 11.
Artículo en Inglés | MEDLINE | ID: mdl-36433326

RESUMEN

Modern wheelchairs, with advanced and robotic technologies, could not reach the life of millions of disabled people due to their high costs, technical limitations, and safety issues. This paper proposes a gesture-controlled smart wheelchair system with an IoT-enabled fall detection mechanism to overcome these problems. It can recognize gestures using Convolutional Neural Network (CNN) model along with computer vision algorithms and can control the wheelchair automatically by utilizing these gestures. It maintains the safety of the users by performing fall detection with IoT-based emergency messaging systems. The development cost of the overall system is cheap and is lesser than USD 300. Hence, it is expected that the proposed smart wheelchair should be affordable, safe, and helpful to physically disordered people in their independent mobility.


Asunto(s)
Personas con Discapacidad , Silla de Ruedas , Humanos , Gestos , Dedos , Redes Neurales de la Computación
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA