Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 15 de 15
Filtrar
1.
Sensors (Basel) ; 20(4)2020 Feb 17.
Artigo em Inglês | MEDLINE | ID: mdl-32079352

RESUMO

Cloud computing supports many unprecedented cloud-based vehicular applications. To improve connectivity and bandwidth through programmable networking architectures, Software-Defined (SD) Vehicular Network (SDVN) is introduced. SDVN architecture enables vehicles to be equipped with SDN OpenFlow switch on which the routing rules are updated from a SDN OpenFlow controller. From SDVN, new vehicular architectures are introduced, for instance SD Vehicular Cloud (SDVC). In SDVC, vehicles are SDN devices that host virtualization technology for enabling deployment of cloud-based vehicular applications. In addition, the migration of Virtual Machines (VM) over SDVC challenges the performance of cloud-based vehicular applications due the highly mobility of vehicles. However, the current literature that discusses VM migration in SDVC is very limited. In this paper, we first analyze the evolution of computation and networking technologies of SDVC with a focus on its architecture within the cloud-based vehicular environment. Then, we discuss the potential cloud-based vehicular applications assisted by the SDVC along with its ability to manage several VM migration scenarios. Lastly, we provide a detailed comparison of existing frameworks in SDVC that integrate the VM migration approach and different emulators or simulators network used to evaluate VM frameworks' use cases.

2.
Sensors (Basel) ; 20(2)2020 Jan 19.
Artigo em Inglês | MEDLINE | ID: mdl-31963887

RESUMO

In post-disaster scenarios, such as after floods, earthquakes, and in war zones, the cellular communication infrastructure may be destroyed or seriously disrupted. In such emergency scenarios, it becomes very important for first aid responders to communicate with other rescue teams in order to provide feedback to both the central office and the disaster survivors. To address this issue, rapidly deployable systems are required to re-establish connectivity and assist users and first responders in the region of incident. In this work, we describe the design, implementation, and evaluation of a rapidly deployable system for first response applications in post-disaster situations, named RDSP. The proposed system helps early rescue responders and victims by sharing their location information to remotely located servers by utilizing a novel routing scheme. This novel routing scheme consists of the Dynamic ID Assignment (DIA) algorithm and the Minimum Maximum Neighbor (MMN) algorithm. The DIA algorithm is used by relay devices to dynamically select their IDs on the basis of all the available IDs of networks. Whereas, the MMN algorithm is used by the client and relay devices to dynamically select their next neighbor relays for the transmission of messages. The RDSP contains three devices; the client device sends the victim's location information to the server, the relay device relays information between client and server device, the server device receives messages from the client device to alert the rescue team. We deployed and evaluated our system in the outdoor environment of the university campus. The experimental results show that the RDSP system reduces the message delivery delay and improves the message delivery ratio with lower communication overhead.


Assuntos
Redes de Comunicação de Computadores , Desastres , Trabalho de Resgate , Tecnologia sem Fio , Algoritmos , Serviços Médicos de Emergência , Humanos
3.
Sensors (Basel) ; 20(1)2019 Dec 25.
Artigo em Inglês | MEDLINE | ID: mdl-31881766

RESUMO

Basic safety message (BSM) are messages that contain core elements of a vehicle such as vehicle's size, position, speed, acceleration and others. BSM are lightweight messages that can be regularly broadcast by the vehicles to enable a variety of applications. On the other hand, event-driven message (EDM) are messages generated at the time of occurrence such as accidents or roads sliding and can contain much more heavy elements including pictures, audio or videos. Security, architecture and communication solutions for BSM use cases have been largely documented on in the literature contrary to EDM due to several concerns such as the variant size of EDM, the appropriate architecture along with latency, privacy and security. In this paper, we propose a secure and blockchain based EDM protocol for 5G enabled vehicular edge computing. To offer scalability and latency for the proposed scenario, we adopt a 5G cellular architecture due to its projected features compared to 4G tong-term evaluation (LTE) for vehicular communications. We consider edge computing to provide local processing of EDM that can improve the response time of public agencies (ambulances or rescue teams) that may intervene to the scene. We make use of lightweight multi-receiver signcryption scheme without pairing that offers low time consuming operations, security, privacy and access control. EDM records need to be kept into a distributed system which can guarantee reliability and auditability of EDM. To achieve this, we construct a private blockchain based on the edge nodes to store EDM records. The performance analysis of the proposed protocol confirms its efficiency.

4.
Sensors (Basel) ; 19(22)2019 Nov 14.
Artigo em Inglês | MEDLINE | ID: mdl-31739400

RESUMO

We present an innovative approach for a Cybersecurity Solution based on the Intrusion Detection System to detect malicious activity targeting the Distributed Network Protocol (DNP3) layers in the Supervisory Control and Data Acquisition (SCADA) systems. As Information and Communication Technology is connected to the grid, it is subjected to both physical and cyber-attacks because of the interaction between industrial control systems and the outside Internet environment using IoT technology. Often, cyber-attacks lead to multiple risks that affect infrastructure and business continuity; furthermore, in some cases, human beings are also affected. Because of the traditional peculiarities of process systems, such as insecure real-time protocols, end-to-end general-purpose ICT security mechanisms are not able to fully secure communication in SCADA systems. In this paper, we present a novel method based on the DNP3 vulnerability assessment and attack model in different layers, with feature selection using Machine Learning from parsed DNP3 protocol with additional data including malware samples. Moreover, we developed a cyber-attack algorithm that included a classification and visualization process. Finally, the results of the experimental implementation show that our proposed Cybersecurity Solution based on IDS was able to detect attacks in real time in an IoT-based Smart Grid communication environment.

5.
Sensors (Basel) ; 19(18)2019 Sep 19.
Artigo em Inglês | MEDLINE | ID: mdl-31546764

RESUMO

Static sink-based wireless sensor networks (WSNs) suffer from an energy-hole problem. This incurs as the rate of energy consumption on sensor nodes around sinks and on critical paths is considerably faster. State-of-the-art en-routing filtering schemes save energy by countering false report injection attacks. In addition to their unique limitations, these schemes generally do not examine energy awareness in underlying routing. Mostly, these security methods are based on a fixed filtering capacity, unable to respond to changes in attack intensity. Therefore, these limitations cause network partition(s), exhibiting adverse effects on network lifetime. Extending network lifetime while preserving energy and security thus becomes an interesting challenge. In this article, we address the aforesaid shortcomings with the proposed adaptive en-route filtering (AEF) scheme. In energy-aware routing, the fitness function, which is used to select forwarding nodes, considers residual energy and other factors as opposed to distance only. In pre-deterministic key distribution, keys are distributed based on the consideration of having paths with a different number of verification nodes. This, consequently, permits us to have multiple paths with different security levels that can be exploited to counter different attack intensities. Taken together, the integration of the special fitness function with the new key distribution approach enables the AEF to adapt the underlying dynamic network conditions. The simulation experiments under different settings show significant improvements in network lifetime.

6.
Sensors (Basel) ; 19(14)2019 Jul 17.
Artigo em Inglês | MEDLINE | ID: mdl-31319562

RESUMO

In the age of the Internet of Things, connected devices are changing the delivery system in the healthcare communication environment. With the integration of IoT in healthcare, there is a huge potential for improvement of the quality, safety, and efficiency of health care in addition to promising technological, economical, and social prospects. Nevertheless, this integration comes with security risks such as data breach that might be caused by credential-stealing malware. In addition, the patient valuable data can be disclosed when the perspective devices are compromised since they are connected to the internet. Hence, security has become an essential part of today's computing world regarding the ubiquitous nature of the IoT entities in general and IoT-based healthcare in particular. In this paper, research on the algorithm for anonymizing sensitive information about health data set exchanged in the IoT environment using a wireless communication system has been presented. To preserve the security and privacy, during the data session from the users interacting online, the algorithm defines records that cannot be revealed by providing protection to user's privacy. Moreover, the proposed algorithm includes a secure encryption process that enables health data anonymity. Furthermore, we have provided an analysis using mathematical functions to valid the algorithm's anonymity function. The results show that the anonymization algorithm guarantees safety features for the considered IoT system applied in context of the healthcare communication systems.


Assuntos
Técnicas Biossensoriais , Atenção à Saúde/tendências , Internet das Coisas/tendências , Algoritmos , Comunicação , Humanos
7.
Sensors (Basel) ; 19(17)2019 Aug 31.
Artigo em Inglês | MEDLINE | ID: mdl-31480479

RESUMO

There is a strong devotion in the automotive industry to be part of a wider progression towards the Fifth Generation (5G) era. In-vehicle integration costs between cellular and vehicle-to-vehicle networks using Dedicated Short Range Communication could be avoided by adopting Cellular Vehicle-to-Everything (C-V2X) technology with the possibility to re-use the existing mobile network infrastructure. More and more, with the emergence of Software Defined Networks, the flexibility and the programmability of the network have not only impacted the design of new vehicular network architectures but also the implementation of V2X services in future intelligent transportation systems. In this paper, we define the concepts that help evaluate software-defined-based vehicular network systems in the literature based on their modeling and implementation schemes. We first overview the current studies available in the literature on C-V2X technology in support of V2X applications. We then present the different architectures and their underlying system models for LTE-V2X communications. We later describe the key ideas of software-defined networks and their concepts for V2X services. Lastly, we provide a comparative analysis of existing SDN-based vehicular network system grouped according to their modeling and simulation concepts. We provide a discussion and highlight vehicular ad-hoc networks' challenges handled by SDN-based vehicular networks.

8.
Sensors (Basel) ; 17(10)2017 Sep 23.
Artigo em Inglês | MEDLINE | ID: mdl-28946633

RESUMO

In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities' authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol.

9.
Artigo em Inglês | MEDLINE | ID: mdl-38829758

RESUMO

The Internet of Medical Things (IoMT) has transformed traditional healthcare systems by enabling real-time monitoring, remote diagnostics, and data-driven treatment. However, security and privacy remain significant concerns for IoMT adoption due to the sensitive nature of medical data. Therefore, we propose an integrated framework leveraging blockchain and explainable artificial intelligence (XAI) to enable secure, intelligent, and transparent management of IoMT data. First, the traceability and tamper-proof of blockchain are used to realize the secure transaction of IoMT data, transforming the secure transaction of IoMT data into a two-stage Stackelberg game. The dual-chain architecture is used to ensure the security and privacy protection of the transaction. The main-chain manages regular IoMT data transactions, while the side-chain deals with data trading activities aimed at resale. Simultaneously, the perceptual hash technology is used to realize data rights confirmation, which maximally protects the rights and interests of each participant in the transaction. Subsequently, medical time-series data is modeled using bidirectional simple recurrent units to detect anomalies and cyberthreats accurately while overcoming vanishing gradients. Lastly, an adversarial sample generation method based on local interpretable model-agnostic explanations is provided to evaluate, secure, and improve the anomaly detection model, as well as to make it more explainable and resilient to possible adversarial attacks. Simulation results are provided to illustrate the high performance of the integrated secure data management framework leveraging blockchain and XAI, compared with the benchmarks.

10.
PLoS One ; 19(4): e0301980, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38669276

RESUMO

This research introduces a new designing process and analysis of an innovative Silicon-on-Insulator Metal-Semiconductor Field-Effect (SOI MESFET) structure that demonstrates improved DC and RF characteristics. The design incorporates several modifications to control and reduce the electric field concentration within the channel. These modifications include relocating the transistor channel to sub-regions near the source and drain, adjusting the position of the gate electrode closer to the source, introducing an aluminum layer beneath the channel, and integrating an oxide layer adjacent to the gate. The results show that the AlOx-MESFET configuration exhibits a remarkable increase of 128% in breakdown voltage and 156% in peak power. Furthermore, due to enhanced conductivity and a significant reduction in gate-drain capacitance, there is a notable improvement of 53% in the cut-off frequency and a 28% increase in the maximum oscillation frequency. Additionally, the current gain experiences a boost of 15%. The improved breakdown voltage and peak power make it suitable for applications requiring robust performance under high voltage and power conditions. The increased maximum oscillation frequency and cut-off frequency make it ideal for high-frequency applications where fast signal processing is crucial. Moreover, the enhanced current gain ensures efficient amplification of signals. The introduced SOI MESFET structure with its modifications offers significant improvements in various performance metrics. It provides high oscillation frequency, better breakdown voltage and good cut-off frequency, and current gain compared to the traditional designs. These enhancements make it a highly desirable choice for applications that demand high-frequency and high-power capabilities.


Assuntos
Desenho de Equipamento , Silício , Silício/química , Semicondutores , Transistores Eletrônicos , Condutividade Elétrica , Fontes de Energia Elétrica , Metais/química
11.
Comput Methods Programs Biomed ; 254: 108254, 2024 Jun 07.
Artigo em Inglês | MEDLINE | ID: mdl-38905989

RESUMO

BACKGROUND AND OBJECTIVES: Episodes of Freezing of Gait (FoG) are among the most debilitating motor symptoms of Parkinson's Disease (PD), leading to falls and significantly impacting patients' quality of life. Accurate assessment of FoG by neurologists provides crucial insights into patients' conditions and disease symptoms. This proposed strategy involves utilizing a Weighted Fuzzy Logic Controller, Kalman Filter, and Kaiser-Meyer-Olkin test to detect the gait parameters while walking, resting, and standing phases. Parameters such as neuromodulation format, intensity, duration, frequency, and velocity are computed to pre-empt freezing episodes, thus aiding their prevention. METHOD: The AiCarePWP is a wearable electronics device designed to identify instances when a patient is on the brink of experiencing a freezing episode and subsequently deliver a brief electrical impulse to the patient's shank muscles to stimulate movement. The AiCarePWP wearable device aims to identify impending freezing episodes in PD patients and deliver brief electrical impulses to stimulate movement. The study validates this innovative approach using plantar insoles with a 3D accelerometer and electrical stimulator, analysing data from the inertial measuring unit and plantar-pressure foot data to detect and predict FoG. RESULTS: Using a Convolutional Neural Network-based model, the study evaluated 47 gait features for their ability to differentiate resting, standing, and walking conditions. Variable selection was based on sensitivity, specificity, and overall accuracy, followed by Principal Component Analysis and Varimax rotation to extract and interpret factors. Factors with eigenvalues exceeding 1.0 were retained, and 37 features were retained. CONCLUSION: This study validates CNN's effectiveness in detecting FoG during various activities. It introduces a novel cueing method using electrical stimulation, which improves gait function and reduces FoG incidence in PD patients. Trustworthy wearable devices, based on Artificial Intelligence of Things (AIoT) and Artificial Intelligence of Medical Things (AIoMT), have been developed to support such interventions.

12.
Artigo em Inglês | MEDLINE | ID: mdl-38349828

RESUMO

Cancer patients are known to have a higher likelihood of developing Cardiovascular Disease (CVD) compared to non-cancer individuals. Although various types of cancer can contribute to the onset of CVD, lung cancer is inherently linked with increased susceptibility. To bridge this hypothesis, we propose a Lung cancer detection and Cardiovascular Disease Prediction (LCDP) system through lung Computed Tomography (CT) scan images. The lung cancer detection module of the LCDP system utilizes Transfer Learning (TL) with AdaDenseNet for classification. It employs the improvised Proximity-based Synthetic Minority Over-sampling Technique (Prox-SMOTE), improving accuracy. In the CVD prediction module, the feature extraction was performed using the VGG-16 model, followed by classification using a Support Vector Machine (SVM) classifier. The impact and interdependence of lung cancer on CVD were evident in our evaluation, with high accuracies of 98.28% for lung cancer detection and 91.62% for CVD prediction.

13.
Sci Rep ; 14(1): 4012, 2024 Feb 18.
Artigo em Inglês | MEDLINE | ID: mdl-38369545

RESUMO

Traffic congestion is one of the major challenges faced by daily commuters in smart cities. An autonomous transportation system with a 5 G-based Cellular Vehicle-to-Everything (C-V2X) communication system is the solution to meet the traffic challenges faced in smart cities. Vehicular networks provide wireless connectivity to enable a large number of connected vehicle applications. Vehicular networks allow vehicles to share their emergency and infotainment traffic by following vehicle-to-vehicle (V2V) or by using vehicle-to-infrastructure (V2I) communication. The infrastructure of vehicular networks mainly comprises multiple Road Side Units (RSUs). Fog computing nodes are placed adjacent to these RSUs to provide quick access to vehicles. For infotainment traffic, vehicles intend to download their required content from the content provider. Caching the same contents from the nearby fog computing node significantly reduces delay with improved quality of service. As there are millions of contents with varying sizes, caching all demanded contents on these fog nodes is not possible due to their limited caching capacity. In this work, we propose an improved content caching scheme for fog nodes to satisfy vehicles and content providers for fair content placement. The proposed algorithm is based on a modified Gale-Shapley technique that considers factors such as content popularity, vehicle connectivity, and quality of the communication channel to optimize the content caching process. Simulation results show that the proposed technique caches a higher number of popular contents with lower downloading time.

14.
PLoS One ; 19(5): e0302634, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38718001

RESUMO

In this paper, a new microstrip triplexer is designed to work at 2.5 GHz, 4.4 GHz and 6 GHz for mid-band 5G applications. All channels are flat with three low group delays (GDs) of 0.84 ns, 0.75 ns and 0.49 ns, respectively. Compared to the previously reported works, the proposed triplexer has the minimum group delay. The designed triplexer has 18.2%, 13.7%, 23.6% fractional bandwidths (FBW%) at 2.5 GHz, 4.4 GHz and 6 GHz, respectively. The obtained insertion losses (ILs) are low at all channels. These features are obtained without a noticeable increase in the overall size. A novel and simple resonator is used to design the proposed triplexer, which includes two pairs of coupled lines combined with a shunt stub. A perfect mathematical analysis is performed to find the resonator behavior and the layout optimization. The type of shunt stub is determined mathematically. Also, the smallness or largeness of some important physical dimensions is determined using the proposed mathematical analysis. Finally, the designed triplexer is fabricated and measured, where the measurement results verify the simulations.


Assuntos
Desenho de Equipamento , Tecnologia sem Fio , Tecnologia sem Fio/instrumentação
15.
BMB Rep ; 54(10): 497-504, 2021 Oct.
Artigo em Inglês | MEDLINE | ID: mdl-34488929

RESUMO

EGR1 (early growth response 1) is dysregulated in many cancers and exhibits both tumor suppressor and promoter activities, making it an appealing target for cancer therapy. Here, we used a systematic multi-omics analysis to review the expression of EGR1 and its role in regulating clinical outcomes in breast cancer (BC). EGR1 expression, its promoter methylation, and protein expression pattern were assessed using various publicly available tools. COSMIC-based somatic mutations and cBioPortal-based copy number alterations were analyzed, and the prognostic roles of EGR1 in BC were determined using Prognoscan and Kaplan-Meier Plotter. We also used bc-GenEx- Miner to investigate the EGR1 co-expression profile. EGR1 was more often downregulated in BC tissues than in normal breast tissue, and its knockdown was positively correlated with poor survival. Low EGR1 expression levels were also associated with increased risk of ER+, PR+, and HER2- BCs. High positive correlations were observed among EGR1, DUSP1, FOS, FOSB, CYR61, and JUN mRNA expression in BC tissue. This systematic review suggested that EGR1 expression may serve as a prognostic marker for BC patients and that clinicopathological parameters influence its prognostic utility. In addition to EGR1, DUSP1, FOS, FOSB, CYR61, and JUN can jointly be considered prognostic indicators for BC. [BMB Reports 2021; 54(10): 497-504].


Assuntos
Neoplasias da Mama/metabolismo , Proteína 1 de Resposta de Crescimento Precoce/metabolismo , Biomarcadores Tumorais/metabolismo , Metilação de DNA/genética , Bases de Dados Genéticas , Proteína 1 de Resposta de Crescimento Precoce/genética , Feminino , Expressão Gênica/genética , Regulação Neoplásica da Expressão Gênica/genética , Genes Supressores de Tumor , Humanos , Estimativa de Kaplan-Meier , Prognóstico , Regiões Promotoras Genéticas/genética , Transcriptoma/genética
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA