Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 149
Filtrar
Más filtros

Banco de datos
País/Región como asunto
Tipo del documento
Intervalo de año de publicación
1.
BMC Med Res Methodol ; 24(1): 123, 2024 Jun 03.
Artículo en Inglés | MEDLINE | ID: mdl-38831346

RESUMEN

In contemporary society, depression has emerged as a prominent mental disorder that exhibits exponential growth and exerts a substantial influence on premature mortality. Although numerous research applied machine learning methods to forecast signs of depression. Nevertheless, only a limited number of research have taken into account the severity level as a multiclass variable. Besides, maintaining the equality of data distribution among all the classes rarely happens in practical communities. So, the inevitable class imbalance for multiple variables is considered a substantial challenge in this domain. Furthermore, this research emphasizes the significance of addressing class imbalance issues in the context of multiple classes. We introduced a new approach Feature group partitioning (FGP) in the data preprocessing phase which effectively reduces the dimensionality of features to a minimum. This study utilized synthetic oversampling techniques, specifically Synthetic Minority Over-sampling Technique (SMOTE) and Adaptive Synthetic (ADASYN), for class balancing. The dataset used in this research was collected from university students by administering the Burn Depression Checklist (BDC). For methodological modifications, we implemented heterogeneous ensemble learning stacking, homogeneous ensemble bagging, and five distinct supervised machine learning algorithms. The issue of overfitting was mitigated by evaluating the accuracy of the training, validation, and testing datasets. To justify the effectiveness of the prediction models, balanced accuracy, sensitivity, specificity, precision, and f1-score indices are used. Overall, comprehensive analysis demonstrates the discrimination between the Conventional Depression Screening (CDS) and FGP approach. In summary, the results show that the stacking classifier for FGP with SMOTE approach yields the highest balanced accuracy, with a rate of 92.81%. The empirical evidence has demonstrated that the FGP approach, when combined with the SMOTE, able to produce better performance in predicting the severity of depression. Most importantly the optimization of the training time of the FGP approach for all of the classifiers is a significant achievement of this research.


Asunto(s)
Algoritmos , Depresión , Aprendizaje Automático , Humanos , Depresión/diagnóstico , Índice de Severidad de la Enfermedad , Sensibilidad y Especificidad , Femenino
2.
Sensors (Basel) ; 24(2)2024 Jan 14.
Artículo en Inglés | MEDLINE | ID: mdl-38257615

RESUMEN

Recent advancements in computer vision technology, developments in sensors and sensor-collecting approaches, and the use of deep and transfer learning approaches have excelled in the development of autonomous vehicles. On-road vehicle detection has become a task of significant importance, especially due to exponentially increasing research on autonomous vehicles during the past few years. With high-end computing resources, a large number of deep learning models have been trained and tested for on-road vehicle detection recently. Vehicle detection may become a challenging process especially due to varying light and weather conditions like night, snow, sand, rain, foggy conditions, etc. In addition, vehicle detection should be fast enough to work in real time. This study investigates the use of the recent YOLO version, YOLOx, to detect vehicles in bad weather conditions including rain, fog, snow, and sandstorms. The model is tested on the publicly available benchmark dataset DAWN containing images containing four bad weather conditions, different illuminations, background, and number of vehicles in a frame. The efficacy of the model is evaluated in terms of precision, recall, and mAP. The results exhibit the better performance of YOLOx-s over YOLOx-m and YOLOx-l variants. YOLOx-s has 0.8983 and 0.8656 mAP for snow and sandstorms, respectively, while its mAP for rain and fog is 0.9509 and 0.9524, respectively. The performance of models is better for snow and foggy weather than rainy weather sandstorms. Further experiments indicate that enhancing image quality using multiscale retinex improves YOLOx performance.

3.
Sensors (Basel) ; 23(9)2023 May 04.
Artículo en Inglés | MEDLINE | ID: mdl-37177678

RESUMEN

In this paper, a novel ultra-wideband UWB antenna element with triple-band notches is proposed. The proposed UWB radiator element operates from 2.03 GHz up to 15.04 GHz with triple rejected bands at the WiMAX band (3.28-3.8 GHz), WLAN band (5.05-5.9 GHz), and X-band (7.78-8.51 GHz). In addition, the radiator supports the Bluetooth band (2.4-2.483 GHz). Three different techniques were utilized to obtain the triple-band notches. An alpha-shaped coupled line with a stub-loaded resonator (SLR) band stop filter was inserted along the main feeding line before the radiator to obtain a WiMAX band notch characteristic. Two identical U-shaped slots were etched on the proposed UWB radiator to achieve WLAN band notch characteristics with a very high degree of selectivity. Two identical metallic frames of an octagon-shaped electromagnetic band gap structure (EBG) were placed along the main feeding line to achieve the notch characteristic with X-band satellite communication with high sharpness edges. A novel UWB multiple-input multiple-output (MIMO) radiator is proposed. The proposed UWB-MIMO radiator was fabricated on FR-4 substrate material and measured. The isolation between every two adjacent ports was below -20 dB over the FCC-UWB spectrum and the Bluetooth band for the four MIMO antennas. The envelope correlation coefficient (ECC) between the proposed antennas in MIMO does not exceed 0.05. The diversity gains (DG) for all the radiators are greater than 9.98 dB.

4.
Sensors (Basel) ; 23(8)2023 Apr 07.
Artículo en Inglés | MEDLINE | ID: mdl-37112152

RESUMEN

The explosive growth and wide proliferation of mobile devices, the majority of which are smartphones, led to the inception of several novel and intuitive services, including on-the-go services, online customer services, and location-based services (LBS) [...].

5.
Sensors (Basel) ; 23(21)2023 Oct 26.
Artículo en Inglés | MEDLINE | ID: mdl-37960429

RESUMEN

The rapid growth of the Internet of Things (IoT) and its integration into various industries has made it extremely challenging to guarantee IoT systems' dependability and quality, including scalability, dynamicity, and integration with existing IoT frameworks. However, the essential principles, approaches, and advantages of model-driven IoT testing indicate a promising strategy for overcoming these. This paper proposes a metamodeling-based interoperability and integration testing approach for IoT systems that automates the creation of test cases and the assessment of system performance by utilizing formal models to reflect the behavior and interactions of IoT systems. The proposed model-based testing enables the systematic verification and validation of complex IoT systems by capturing the essential characteristics of IoT devices, networks, and interactions. This study describes the key elements of model-driven IoT testing, including the development of formal models, methods for generating test cases, and the execution and assessment of models. In addition, it examines various modeling formalisms and their use in IoT testing, including state-based, event-driven, and hybrid models. This study examines several methods for creating test cases to ensure thorough and effective testing, such as constraint-based strategies and model coverage requirements. Model-driven IoT testing improves defect detection, expands test coverage, decreases testing effort, and increases system reliability. It also offers an organized and automated method to confirm the efficiency and dependability of IoT systems.

6.
Sensors (Basel) ; 23(21)2023 Oct 26.
Artículo en Inglés | MEDLINE | ID: mdl-37960441

RESUMEN

Detecting drowsiness among drivers is critical for ensuring road safety and preventing accidents caused by drowsy or fatigued driving. Research on yawn detection among drivers has great significance in improving traffic safety. Although various studies have taken place where deep learning-based approaches are being proposed, there is still room for improvement to develop better and more accurate drowsiness detection systems using behavioral features such as mouth and eye movement. This study proposes a deep neural network architecture for drowsiness detection employing a convolutional neural network (CNN) for driver drowsiness detection. Experiments involve using the DLIB library to locate key facial points to calculate the mouth aspect ratio (MAR). To compensate for the small dataset, data augmentation is performed for the 'yawning' and 'no_yawning' classes. Models are trained and tested involving the original and augmented dataset to analyze the impact on model performance. Experimental results demonstrate that the proposed CNN model achieves an average accuracy of 96.69%. Performance comparison with existing state-of-the-art approaches shows better performance of the proposed model.


Asunto(s)
Conducción de Automóvil , Redes Neurales de la Computación , Vigilia , Accidentes de Tránsito/prevención & control , Movimientos Oculares
7.
Sensors (Basel) ; 23(18)2023 Sep 06.
Artículo en Inglés | MEDLINE | ID: mdl-37765754

RESUMEN

Cardiac disorders are a leading cause of global casualties, emphasizing the need for the initial diagnosis and prevention of cardiovascular diseases (CVDs). Electrocardiogram (ECG) procedures are highly recommended as they provide crucial cardiology information. Telemedicine offers an opportunity to provide low-cost tools and widespread availability for CVD management. In this research, we proposed an IoT-based monitoring and detection system for cardiac patients, employing a two-stage approach. In the initial stage, we used a routing protocol that combines routing by energy and link quality (REL) with dynamic source routing (DSR) to efficiently collect data on an IoT healthcare platform. The second stage involves the classification of ECG images using hybrid-based deep features. Our classification system utilizes the "ECG Images dataset of Cardiac Patients", comprising 12-lead ECG images with four distinct categories: abnormal heartbeat, myocardial infarction (MI), previous history of MI, and normal ECG. For feature extraction, we employed a lightweight CNN, which automatically extracts relevant ECG features. These features were further optimized through an attention module, which is the method's main focus. The model achieved a remarkable accuracy of 98.39%. Our findings suggest that this system can effectively aid in the identification of cardiac disorders. The proposed approach combines IoT, deep learning, and efficient routing protocols, showcasing its potential for improving CVD diagnosis and management.


Asunto(s)
Cardiopatías , Infarto del Miocardio , Telemedicina , Humanos , Electrocardiografía , Frecuencia Cardíaca
8.
Sensors (Basel) ; 23(16)2023 Aug 14.
Artículo en Inglés | MEDLINE | ID: mdl-37631691

RESUMEN

The small-drone technology domain is the outcome of a breakthrough in technological advancement for drones. The Internet of Things (IoT) is used by drones to provide inter-location services for navigation. But, due to issues related to their architecture and design, drones are not immune to threats related to security and privacy. Establishing a secure and reliable network is essential to obtaining optimal performance from drones. While small drones offer promising avenues for growth in civil and defense industries, they are prone to attacks on safety, security, and privacy. The current architecture of small drones necessitates modifications to their data transformation and privacy mechanisms to align with domain requirements. This research paper investigates the latest trends in safety, security, and privacy related to drones, and the Internet of Drones (IoD), highlighting the importance of secure drone networks that are impervious to interceptions and intrusions. To mitigate cyber-security threats, the proposed framework incorporates intelligent machine learning models into the design and structure of IoT-aided drones, rendering adaptable and secure technology. Furthermore, in this work, a new dataset is constructed, a merged dataset comprising a drone dataset and two benchmark datasets. The proposed strategy outperforms the previous algorithms and achieves 99.89% accuracy on the drone dataset and 91.64% on the merged dataset. Overall, this intelligent framework gives a potential approach to improving the security and resilience of cyber-physical satellite systems, and IoT-aided aerial vehicle systems, addressing the rising security challenges in an interconnected world.

9.
Sensors (Basel) ; 23(12)2023 Jun 07.
Artículo en Inglés | MEDLINE | ID: mdl-37420557

RESUMEN

Traffic accidents present significant risks to human life, leading to a high number of fatalities and injuries. According to the World Health Organization's 2022 worldwide status report on road safety, there were 27,582 deaths linked to traffic-related events, including 4448 fatalities at the collision scenes. Drunk driving is one of the leading causes contributing to the rising count of deadly accidents. Current methods to assess driver alcohol consumption are vulnerable to network risks, such as data corruption, identity theft, and man-in-the-middle attacks. In addition, these systems are subject to security restrictions that have been largely overlooked in earlier research focused on driver information. This study intends to develop a platform that combines the Internet of Things (IoT) with blockchain technology in order to address these concerns and improve the security of user data. In this work, we present a device- and blockchain-based dashboard solution for a centralized police monitoring account. The equipment is responsible for determining the driver's impairment level by monitoring the driver's blood alcohol concentration (BAC) and the stability of the vehicle. At predetermined times, integrated blockchain transactions are executed, transmitting data straight to the central police account. This eliminates the need for a central server, ensuring the immutability of data and the existence of blockchain transactions that are independent of any central authority. Our system delivers scalability, compatibility, and faster execution times by adopting this approach. Through comparative research, we have identified a significant increase in the need for security measures in relevant scenarios, highlighting the importance of our suggested model.


Asunto(s)
Cadena de Bloques , Conducir bajo la Influencia , Internet de las Cosas , Humanos , Accidentes de Tránsito/prevención & control , Nivel de Alcohol en Sangre
10.
Sensors (Basel) ; 23(20)2023 Oct 23.
Artículo en Inglés | MEDLINE | ID: mdl-37896735

RESUMEN

Internet security is a major concern these days due to the increasing demand for information technology (IT)-based platforms and cloud computing. With its expansion, the Internet has been facing various types of attacks. Viruses, denial of service (DoS) attacks, distributed DoS (DDoS) attacks, code injection attacks, and spoofing are the most common types of attacks in the modern era. Due to the expansion of IT, the volume and severity of network attacks have been increasing lately. DoS and DDoS are the most frequently reported network traffic attacks. Traditional solutions such as intrusion detection systems and firewalls cannot detect complex DDoS and DoS attacks. With the integration of artificial intelligence-based machine learning and deep learning methods, several novel approaches have been presented for DoS and DDoS detection. In particular, deep learning models have played a crucial role in detecting DDoS attacks due to their exceptional performance. This study adopts deep learning models including recurrent neural network (RNN), long short-term memory (LSTM), and gradient recurrent unit (GRU) to detect DDoS attacks on the most recent dataset, CICDDoS2019, and a comparative analysis is conducted with the CICIDS2017 dataset. The comparative analysis contributes to the development of a competent and accurate method for detecting DDoS attacks with reduced execution time and complexity. The experimental results demonstrate that models perform equally well on the CICDDoS2019 dataset with an accuracy score of 0.99, but there is a difference in execution time, with GRU showing less execution time than those of RNN and LSTM.

11.
Sensors (Basel) ; 23(18)2023 Sep 08.
Artículo en Inglés | MEDLINE | ID: mdl-37765813

RESUMEN

Despite significant improvement in prognosis, myocardial infarction (MI) remains a major cause of morbidity and mortality around the globe. MI is a life-threatening cardiovascular condition that requires prompt diagnosis and appropriate treatment. The primary objective of this research is to identify instances of anterior and inferior myocardial infarction by utilizing data obtained from Ultra-wideband radar technology in a hospital for patients of anterior and inferior MI. The collected data is preprocessed to extract spectral features. A novel feature engineering approach is designed to fuse temporal features and class prediction probability features derived from the spectral feature dataset. Several well-known machine learning models are implemented and fine-tuned to obtain optimal performance in the detection of anterior and inferior MI. The results demonstrate that integration of the fused feature set with machine learning models results in a notable improvement in both the accuracy and precision of MI detection. Notably, random forest (RF) and k-nearest neighbor showed superb performance with an accuracy of 98.8%. For demonstrating the capacity of models to generalize, K-fold cross-validation is carried out, wherein RF exhibits a mean accuracy of 99.1%. Furthermore, the examination of computational complexity indicates a low computational complexity, thereby indicating computational efficiency.


Asunto(s)
Infarto de la Pared Inferior del Miocardio , Infarto del Miocardio , Humanos , Radar , Infarto del Miocardio/diagnóstico por imagen , Análisis por Conglomerados , Aprendizaje Automático
12.
Sensors (Basel) ; 23(3)2023 Jan 20.
Artículo en Inglés | MEDLINE | ID: mdl-36772250

RESUMEN

With the advancement in information technology, digital data stealing and duplication have become easier. Over a trillion bytes of data are generated and shared on social media through the internet in a single day, and the authenticity of digital data is currently a major problem. Cryptography and image watermarking are domains that provide multiple security services, such as authenticity, integrity, and privacy. In this paper, a digital image watermarking technique is proposed that employs the least significant bit (LSB) and canny edge detection method. The proposed method provides better security services and it is computationally less expensive, which is the demand of today's world. The major contribution of this method is to find suitable places for watermarking embedding and provides additional watermark security by scrambling the watermark image. A digital image is divided into non-overlapping blocks, and the gradient is calculated for each block. Then convolution masks are applied to find the gradient direction and magnitude, and non-maximum suppression is applied. Finally, LSB is used to embed the watermark in the hysteresis step. Furthermore, additional security is provided by scrambling the watermark signal using our chaotic substitution box. The proposed technique is more secure because of LSB's high payload and watermark embedding feature after a canny edge detection filter. The canny edge gradient direction and magnitude find how many bits will be embedded. To test the performance of the proposed technique, several image processing, and geometrical attacks are performed. The proposed method shows high robustness to image processing and geometrical attacks.

13.
Sensors (Basel) ; 23(16)2023 Aug 08.
Artículo en Inglés | MEDLINE | ID: mdl-37631555

RESUMEN

Railway track faults may lead to railway accidents and cause human and financial loss. Spatial, temporal, and weather elements, and wear and tear, lead to ballast, loose nuts, misalignment, and cracks leading to accidents. Manual inspection of such defects is time-consuming and prone to errors. Automatic inspection provides a fast, reliable, and unbiased solution. However, highly accurate fault detection is challenging due to the lack of public datasets, noisy data, inefficient models, etc. To obtain better performance, this study presents a novel approach that relies on mel frequency cepstral coefficient features from acoustic data. The primary objective of this study is to increase fault detection performance. As well as designing an ensemble model, we utilize selective features using chi-square(chi2) that have high importance with respect to the target class. Extensive experiments were carried out to analyze the efficiency of the proposed approach. The experimental results suggest that using 60 features, 40 original features, and 20 chi2 features produces optimal results both regarding accuracy and computational complexity. A mean accuracy score of 0.99 was obtained using the proposed approach with machine learning models using the collected data. Moreover, this performance was significantly better than that of existing approaches; however, the performance of models may vary in real-world settings.

14.
Sensors (Basel) ; 23(14)2023 Jul 13.
Artículo en Inglés | MEDLINE | ID: mdl-37514673

RESUMEN

An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT sensors are lightweight, lack complicated security protocols, and face threats to privacy and confidentiality. Hackers can attack the IoT network and access personal information and confidential data for blackmailing, and negatively manipulate data. This study aims to propose an IoT threat protection system (IoTTPS) to protect the IoT network from threats using an ensemble model RKSVM, comprising a random forest (RF), K nearest neighbor (KNN), and support vector machine (SVM) model. The software-defined networks (SDN)-based IoT network datasets such as KDD cup 99, NSL-KDD, and CICIDS are used for threat detection based on machine learning. The experimental phase is conducted by using a decision tree (DT), logistic regression (LR), Naive Bayes (NB), RF, SVM, gradient boosting machine (GBM), KNN, and the proposed ensemble RKSVM model. Furthermore, performance is optimized by adding a grid search hyperparameter optimization technique with K-Fold cross-validation. As well as the NSL-KDD dataset, two other datasets, KDD and CIC-IDS 2017, are used to validate the performance. Classification accuracies of 99.7%, 99.3%, 99.7%, and 97.8% are obtained for DoS, Probe, U2R, and R2L attacks using the proposed ensemble RKSVM model using grid search and cross-fold validation. Experimental results demonstrate the superior performance of the proposed model for IoT threat detection.

15.
Sensors (Basel) ; 23(10)2023 May 09.
Artículo en Inglés | MEDLINE | ID: mdl-37430494

RESUMEN

With technological advancements, smart health monitoring systems are gaining growing importance and popularity. Today, business trends are changing from physical infrastructure to online services. With the restrictions imposed during COVID-19, medical services have been changed. The concepts of smart homes, smart appliances, and smart medical systems have gained popularity. The Internet of Things (IoT) has revolutionized communication and data collection by incorporating smart sensors for data collection from diverse sources. In addition, it utilizes artificial intelligence (AI) approaches to control a large volume of data for better use, storing, managing, and making decisions. In this research, a health monitoring system based on AI and IoT is designed to deal with the data of heart patients. The system monitors the heart patient's activities, which helps to inform patients about their health status. Moreover, the system can perform disease classification using machine learning models. Experimental results reveal that the proposed system can perform real-time monitoring of patients and classify diseases with higher accuracy.


Asunto(s)
COVID-19 , Insuficiencia Cardíaca , Internet de las Cosas , Humanos , Inteligencia Artificial , Internet , Insuficiencia Cardíaca/diagnóstico
16.
Sensors (Basel) ; 23(12)2023 Jun 06.
Artículo en Inglés | MEDLINE | ID: mdl-37420546

RESUMEN

Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor's algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be practicable or secure in the near future. The National Institute of Standards and Technology (NIST) has started looking for a post-quantum encryption algorithm that is resistant to the development of future quantum computers as a response to this security concern. The current focus is on standardizing asymmetric cryptography that should be impenetrable by a quantum computer. This has become increasingly important in recent years. Currently, the process of standardizing asymmetric cryptography is coming very close to being finished. This study evaluated the performance of two post-quantum cryptography (PQC) algorithms, both of which were selected as NIST fourth-round finalists. The research assessed the key generation, encapsulation, and decapsulation operations, providing insights into their efficiency and suitability for real-world applications. Further research and standardization efforts are required to enable secure and efficient post-quantum encryption. When selecting appropriate post-quantum encryption algorithms for specific applications, factors such as security levels, performance requirements, key sizes, and platform compatibility should be taken into account. This paper provides helpful insight for post-quantum cryptography researchers and practitioners, assisting in the decision-making process for selecting appropriate algorithms to protect confidential data in the age of quantum computing.


Asunto(s)
Seguridad Computacional , Metodologías Computacionales , Teoría Cuántica , Algoritmos , Computadores
17.
Sensors (Basel) ; 23(15)2023 Jul 31.
Artículo en Inglés | MEDLINE | ID: mdl-37571620

RESUMEN

With a view of the post-COVID-19 world and probable future pandemics, this paper presents an Internet of Things (IoT)-based automated healthcare diagnosis model that employs a mixed approach using data augmentation, transfer learning, and deep learning techniques and does not require physical interaction between the patient and physician. Through a user-friendly graphic user interface and availability of suitable computing power on smart devices, the embedded artificial intelligence allows the proposed model to be effectively used by a layperson without the need for a dental expert by indicating any issues with the teeth and subsequent treatment options. The proposed method involves multiple processes, including data acquisition using IoT devices, data preprocessing, deep learning-based feature extraction, and classification through an unsupervised neural network. The dataset contains multiple periapical X-rays of five different types of lesions obtained through an IoT device mounted within the mouth guard. A pretrained AlexNet, a fast GPU implementation of a convolutional neural network (CNN), is fine-tuned using data augmentation and transfer learning and employed to extract the suitable feature set. The data augmentation avoids overtraining, whereas accuracy is improved by transfer learning. Later, support vector machine (SVM) and the K-nearest neighbors (KNN) classifiers are trained for lesion classification. It was found that the proposed automated model based on the AlexNet extraction mechanism followed by the SVM classifier achieved an accuracy of 98%, showing the effectiveness of the presented approach.


Asunto(s)
COVID-19 , Aprendizaje Profundo , Internet de las Cosas , Humanos , Inteligencia Artificial , Análisis por Conglomerados
18.
Sensors (Basel) ; 23(15)2023 Aug 01.
Artículo en Inglés | MEDLINE | ID: mdl-37571624

RESUMEN

Cricket has a massive global following and is ranked as the second most popular sport globally, with an estimated 2.5 billion fans. Batting requires quick decisions based on ball speed, trajectory, fielder positions, etc. Recently, computer vision and machine learning techniques have gained attention as potential tools to predict cricket strokes played by batters. This study presents a cutting-edge approach to predicting batsman strokes using computer vision and machine learning. The study analyzes eight strokes: pull, cut, cover drive, straight drive, backfoot punch, on drive, flick, and sweep. The study uses the MediaPipe library to extract features from videos and several machine learning and deep learning algorithms, including random forest (RF), support vector machine, k-nearest neighbors, decision tree, linear regression, and long short-term memory to predict the strokes. The study achieves an outstanding accuracy of 99.77% using the RF algorithm, outperforming the other algorithms used in the study. The k-fold validation of the RF model is 95.0% with a standard deviation of 0.07, highlighting the potential of computer vision and machine learning techniques for predicting batsman strokes in cricket. The study's results could help improve coaching techniques and enhance batsmen's performance in cricket, ultimately improving the game's overall quality.


Asunto(s)
Críquet , Humanos , Algoritmos , Aprendizaje Automático , Máquina de Vectores de Soporte
19.
Sensors (Basel) ; 23(11)2023 Jun 01.
Artículo en Inglés | MEDLINE | ID: mdl-37299993

RESUMEN

Internet of Things (IoT) has made significant strides in energy management systems recently. Due to the continually increasing cost of energy, supply-demand disparities, and rising carbon footprints, the need for smart homes for monitoring, managing, and conserving energy has increased. In IoT-based systems, device data are delivered to the network edge before being stored in the fog or cloud for further transactions. This raises worries about the data's security, privacy, and veracity. It is vital to monitor who accesses and updates this information to protect IoT end-users linked to IoT devices. Smart meters are installed in smart homes and are susceptible to numerous cyber attacks. Access to IoT devices and related data must be secured to prevent misuse and protect IoT users' privacy. The purpose of this research was to design a blockchain-based edge computing method for securing the smart home system, in conjunction with machine learning techniques, in order to construct a secure smart home system with energy usage prediction and user profiling. The research proposes a blockchain-based smart home system that can continuously monitor IoT-enabled smart home appliances such as smart microwaves, dishwashers, furnaces, and refrigerators, among others. An approach based on machine learning was utilized to train the auto-regressive integrated moving average (ARIMA) model for energy usage prediction, which is provided in the user's wallet, to estimate energy consumption and maintain user profiles. The model was tested using the moving average statistical model, the ARIMA model, and the deep-learning-based long short-term memory (LSTM) model on a dataset of smart-home-based energy usage under changing weather conditions. The findings of the analysis reveal that the LSTM model accurately forecasts the energy usage of smart homes.


Asunto(s)
Cadena de Bloques , Internet de las Cosas , Aprendizaje Automático , Memoria a Largo Plazo , Microondas
20.
Sensors (Basel) ; 23(21)2023 Nov 03.
Artículo en Inglés | MEDLINE | ID: mdl-37960657

RESUMEN

The Internet of Things (IoT) is an innovative technology that presents effective and attractive solutions to revolutionize various domains. Numerous solutions based on the IoT have been designed to automate industries, manufacturing units, and production houses to mitigate human involvement in hazardous operations. Owing to the large number of publications in the IoT paradigm, in particular those focusing on industrial IoT (IIoT), a comprehensive survey is significantly important to provide insights into recent developments. This survey presents the workings of the IoT-based smart industry and its major components and proposes the state-of-the-art network infrastructure, including structured layers of IIoT architecture, IIoT network topologies, protocols, and devices. Furthermore, the relationship between IoT-based industries and key technologies is analyzed, including big data storage, cloud computing, and data analytics. A detailed discussion of IIoT-based application domains, smartphone application solutions, and sensor- and device-based IIoT applications developed for the management of the smart industry is also presented. Consequently, IIoT-based security attacks and their relevant countermeasures are highlighted. By analyzing the essential components, their security risks, and available solutions, future research directions regarding the implementation of IIoT are outlined. Finally, a comprehensive discussion of open research challenges and issues related to the smart industry is also presented.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA