Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 6 de 6
Filtrar
Más filtros










Base de datos
Intervalo de año de publicación
1.
Sci Rep ; 13(1): 21885, 2023 12 11.
Artículo en Inglés | MEDLINE | ID: mdl-38081880

RESUMEN

Post-transcriptional modifications of RNA play a key role in performing a variety of biological processes, such as stability and immune tolerance, RNA splicing, protein translation and RNA degradation. One of these RNA modifications is m5c which participates in various cellular functions like RNA structural stability and translation efficiency, got popularity among biologists. By applying biological experiments to detect RNA m5c methylation sites would require much more efforts, time and money. Most of the researchers are using pre-processed RNA sequences of 41 nucleotides where the methylated cytosine is in the center. Therefore, it is possible that some of the information around these motif may have lost. The conventional methods are unable to process the RNA sequence directly due to high dimensionality and thus need optimized techniques for better features extraction. To handle the above challenges the goal of this study is to employ an end-to-end, 1D CNN based model to classify and interpret m5c methylated data sites. Moreover, our aim is to analyze the sequence in its full length where the methylated cytosine may not be in the center. The evaluation of the proposed architecture showed a promising results by outperforming state-of-the-art techniques in terms of sensitivity and accuracy. Our model achieve 96.70% sensitivity and 96.21% accuracy for 41 nucleotides sequences while 96.10% accuracy for full length sequences.


Asunto(s)
Metilación de ARN , ARN , ARN/genética , ARN/metabolismo , Citosina/metabolismo , Nucleótidos/metabolismo
2.
PLoS One ; 18(9): e0291596, 2023.
Artículo en Inglés | MEDLINE | ID: mdl-37733686

RESUMEN

Intelligent Transport System (ITS) offers inter-vehicle communication, safe driving, road condition updates, and intelligent traffic management. This research intends to propose a novel decentralized "BlockAuth" architecture for vehicles, authentication, and authorization, traveling across the border. It is required because the existing architects rely on a single Trusted Authority (TA) for issuing certifications, which can jeopardize privacy and system integrity. Similarly, the centralized TA, if failed, can cause the whole system to collapse. Furthermore, a unique "Proof of Authenticity and Integrity" process is proposed, redirecting drivers/vehicles to their home country for authentication, ensuring the security of their credentials. Implemented with Hyperledger Fabric, BlockAuth ensures secure vehicle authentication and authorization with minimal computational overhead, under 2%. Furthermore, it opens up global access, enforces the principles of separation of duty and least privilege, and reinforces resilience via decentralization and automation.

3.
Micromachines (Basel) ; 14(4)2023 Apr 08.
Artículo en Inglés | MEDLINE | ID: mdl-37421062

RESUMEN

Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in general integrated circuits. However, insufficient effort has been made for hardware Trojans (HTs) in the network-on-chip. In this study, we implement a countermeasure to congeal the network-on-chip hardware design in order to prevent changes from being made to the network-on-chip design. We propose a collaborative method which uses flit integrity and dynamic flit permutation to eliminate the hardware Trojan inserted into the router of the NoC by a disloyal employee or a third-party vendor corporation. The proposed method increases the number of received packets by up to 10% more compared to existing techniques, which contain HTs in the destination address of the flit. Compared to the runtime HT mitigation method, the proposed scheme also decreases the average latency for the hardware Trojan inserted in the flit's header, tail, and destination field up to 14.7%, 8%, and 3%, respectively.

4.
Sensors (Basel) ; 22(23)2022 Dec 05.
Artículo en Inglés | MEDLINE | ID: mdl-36502215

RESUMEN

Metaheuristic algorithms are effectively used in searching some optical solution space. for optical solution. It is basically the type of local search generalization that can provide useful solutions for issues related to optimization. Several benefits are associated with this type of algorithms due to that such algorithms can be better to solve many issues in an effective way. To provide fast and accurate solutions to huge range of complex issues is one main benefit metaheuristic algorithms. Some metaheuristic algorithms are effectively used to classify the problems and BAT Algorithm (BA) is one of them is more popular in use to sort out issues related to optimization of theoretical and realistic. Sometimes BA fails to find global optima and gets stuck in local optima because of the absence of investigation and manipulation. We have improved the BA to boost its local searching ability and diminish the premature problem. An improved equation of search with more necessary information through the search is set for the generation of the solution. Test set of benchmark functions are utilized to verify the proposed method's performance. The results of simulation showed that proposed methods are best optimal solution as compare to others.


Asunto(s)
Algoritmos , Benchmarking , Simulación por Computador , Frecuencia Cardíaca
5.
Sensors (Basel) ; 22(19)2022 Sep 25.
Artículo en Inglés | MEDLINE | ID: mdl-36236363

RESUMEN

In this paper, a secure energy trading mechanism based on blockchain technology is proposed. The proposed model deals with energy trading problems such as insecure energy trading and inefficient charging mechanisms for electric vehicles (EVs) in a vehicular energy network (VEN). EVs face two major problems: finding an optimal charging station and calculating the exact amount of energy required to reach the selected charging station. Moreover, in traditional trading approaches, centralized parties are involved in energy trading, which leads to various issues such as increased computational cost, increased computational delay, data tempering and a single point of failure. Furthermore, EVs face various energy challenges, such as imbalanced load supply and fluctuations in voltage level. Therefore, a demand-response (DR) pricing strategy enables EV users to flatten load curves and efficiently adjust electricity usage. In this work, communication between EVs and aggregators is efficiently performed through blockchain. Moreover, a branching concept is involved in the proposed system, which divides EV data into two different branches: a Fraud Chain (F-chain) and an Integrity Chain (I-chain). The proposed branching mechanism helps solve the storage problem and reduces computational time. Moreover, an attacker model is designed to check the robustness of the proposed system against double-spending and replay attacks. Security analysis of the proposed smart contract is also given in this paper. Simulation results show that the proposed work efficiently reduces the charging cost and time in a VEN.


Asunto(s)
Cadena de Bloques , Electricidad , Aprendizaje Automático
6.
PLoS One ; 14(8): e0221213, 2019.
Artículo en Inglés | MEDLINE | ID: mdl-31437260

RESUMEN

Intelligent Transport System (ITS) uses the IEEE 802.11P standard for the wireless communication among vehicles. A wireless ad hoc network of vehicles is established to improve road safety, comfort, security, and traffic efficiency. Wireless communication in ITS leads to many security and privacy challenges. Security and privacy of ITS are important issues that demand incorporation of confidentiality, privacy, authentication, integrity, non-repudiation, and restrictive obscurity. In order to ensure the privacy of vehicles during communication, it is required that the real identity of vehicles should not be revealed. There must be robust and efficient security and privacy mechanisms for the establishment of a reliable and trustworthy network. Therefore, we propose Advanced Strong Pseudonym based Authentication (ASPA), which is a distributed framework to handle the security and privacy issues of vehicle communications in ITS. ASPA only allows vehicles with valid pseudonyms to communicate in ITS. Pseudonyms are assigned to vehicles in a secure manner. The pseudonym mappings of vehicles are stored at different locations to avoid any chance of vehicle pseudonyms certificates linkability. In addition, the most recent communication pseudonyms of a malicious vehicle are revoked and are stored in the Certificate Revocation List (CRL) that results in small size of the CRL. Therefore, the CRL size does not increase exponentially. The distributed framework of ASPA guarantees, the vehicles privacy preservation in the real identities mapping and revocation phase. The empirical results prove that ASPA is robust and efficient with low computational cost, overhead ratio, average latency, and an increased delivery ratio.


Asunto(s)
Accidentes de Tránsito/prevención & control , Anónimos y Seudónimos , Transportes/ética , Tecnología Inalámbrica/ética , Automóviles/legislación & jurisprudencia , Seguridad Computacional , Humanos , Privacidad
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA