Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 20
Filtrar
Más filtros










Base de datos
Intervalo de año de publicación
1.
Sensors (Basel) ; 24(11)2024 Jun 01.
Artículo en Inglés | MEDLINE | ID: mdl-38894368

RESUMEN

Internet of Things (IoT) technology is evolving over the peak of smart infrastructure with the participation of IoT devices in a wide range of applications. Traditional IoT authentication methods are vulnerable to threats due to wireless data transmission. However, IoT devices are resource- and energy-constrained, so building lightweight security that provides stronger authentication is essential. This paper proposes a novel, two-layered multi-factor authentication (2L-MFA) framework using blockchain to enhance IoT devices and user security. The first level of authentication is for IoT devices, one that considers secret keys, geographical location, and physically unclonable function (PUF). Proof-of-authentication (PoAh) and elliptic curve Diffie-Hellman are followed for lightweight and low latency support. Second-level authentication for IoT users, which are sub-categorized into four levels, each defined by specific factors such as identity, password, and biometrics. The first level involves a matrix-based password; the second level utilizes the elliptic curve digital signature algorithm (ECDSA); and levels 3 and 4 are secured with iris and finger vein, providing comprehensive and robust authentication. We deployed fuzzy logic to validate the authentication and make the system more robust. The 2L-MFA model significantly improves performance, reducing registration, login, and authentication times by up to 25%, 50%, and 25%, respectively, facilitating quicker cloud access post-authentication and enhancing overall efficiency.

2.
J Healthc Eng ; 2022: 7853604, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-35859929

RESUMEN

These days, mobile computing devices are ubiquitous and are widely used in almost every facet of daily life. In addition, computing and the modern technologies are not really coexisting anymore. With a wide range of conditions and areas of concern, the medical domain was also concerned. New types of technologies, such as context-aware systems and applications, are constantly being infused into the medicine field. An IoT-enabled healthcare system based on context awareness is developed in this work. In order to collect and store the patient data, smart medical devices are employed. Context-aware data from the database includes the patient's medical records and personal information. The MRIPPER (Modified Repeated Incremental Pruning to Produce Error) technique is used to analyze and classify the data. A rule-based machine learning method is used in this algorithm. The rules for analyzing datasets in order to make predictions about heart disease are framed using this algorithm. MATLAB is used to simulate the proposed model's performance analysis. Other models like random forest, J48, CART, JRip, and OneR algorithms are also compared to validate the proposed model's performance. The proposed model obtains 98.89 percent accuracy, 96.76 percent precision, 99.05 percent sensitivity, 94.35 percent specificity, and 97.60 percent f-score. Predictions for subjects in the normal and abnormal classes were both accurate with 97.38 for normal and 97.93 for abnormal subjects.


Asunto(s)
Algoritmos , Cardiopatías , Bases de Datos Factuales , Cardiopatías/diagnóstico por imagen , Humanos , Aprendizaje Automático
3.
Math Biosci Eng ; 19(4): 3350-3368, 2022 01 24.
Artículo en Inglés | MEDLINE | ID: mdl-35341255

RESUMEN

Smart meters allow real-time monitoring and collection of power consumption data of a consumer's premise. With the worldwide integration of smart meters, there has been a substantial rise in concerns regarding threats to consumer privacy. The exposed fine-grained power consumption data results in behaviour leakage by revealing the end-user's home appliance usage information. Previously, researchers have proposed approaches to alter data using perturbation, aggregation or hide identifiers using anonymization. Unfortunately, these techniques suffer from various limitations. In this paper, we propose a privacy preserving architecture for fine-grained power data in a smart grid. The proposed architecture uses generative adversarial network (GAN) and an obfuscator to generate a synthetic timeseries. The proposed architecture enables to replace the existing appliance signature with appliances that are not active during that period while ensuring minimum energy difference between the ground truth and the synthetic timeseries. We use real-world dataset containing power consumption readings for our experiment and use non-intrusive load monitoring (NILM) algorithms to show that our approach is more effective in preserving the privacy level of a consumer's power consumption data.


Asunto(s)
Algoritmos , Privacidad , Sistemas de Computación
4.
Sensors (Basel) ; 22(2)2022 Jan 09.
Artículo en Inglés | MEDLINE | ID: mdl-35062437

RESUMEN

Internet of Things (IoT) technology has recently been applied in healthcare systems as an Internet of Medical Things (IoMT) to collect sensor information for the diagnosis and prognosis of heart disease. The main objective of the proposed research is to classify data and predict heart disease using medical data and medical images. The proposed model is a medical data classification and prediction model that operates in two stages. If the result from the first stage is efficient in predicting heart disease, there is no need for stage two. In the first stage, data gathered from medical sensors affixed to the patient's body were classified; then, in stage two, echocardiogram image classification was performed for heart disease prediction. A hybrid linear discriminant analysis with the modified ant lion optimization (HLDA-MALO) technique was used for sensor data classification, while a hybrid Faster R-CNN with SE-ResNet-101 modelwass used for echocardiogram image classification. Both classification methods were carried out, and the classification findings were consolidated and validated to predict heart disease. The HLDA-MALO method obtained 96.85% accuracy in detecting normal sensor data, and 98.31% accuracy in detecting abnormal sensor data. The proposed hybrid Faster R-CNN with SE-ResNeXt-101 transfer learning model performed better in classifying echocardiogram images, with 98.06% precision, 98.95% recall, 96.32% specificity, a 99.02% F-score, and maximum accuracy of 99.15%.


Asunto(s)
Cardiopatías , Internet de las Cosas , Inteligencia Artificial , Atención a la Salud , Cardiopatías/diagnóstico por imagen , Humanos , Pronóstico
5.
Sensors (Basel) ; 21(24)2021 Dec 13.
Artículo en Inglés | MEDLINE | ID: mdl-34960414

RESUMEN

The Internet of Things (IoT) consists of a massive number of smart devices capable of data collection, storage, processing, and communication. The adoption of the IoT has brought about tremendous innovation opportunities in industries, homes, the environment, and businesses. However, the inherent vulnerabilities of the IoT have sparked concerns for wide adoption and applications. Unlike traditional information technology (I.T.) systems, the IoT environment is challenging to secure due to resource constraints, heterogeneity, and distributed nature of the smart devices. This makes it impossible to apply host-based prevention mechanisms such as anti-malware and anti-virus. These challenges and the nature of IoT applications call for a monitoring system such as anomaly detection both at device and network levels beyond the organisational boundary. This suggests an anomaly detection system is strongly positioned to secure IoT devices better than any other security mechanism. In this paper, we aim to provide an in-depth review of existing works in developing anomaly detection solutions using machine learning for protecting an IoT system. We also indicate that blockchain-based anomaly detection systems can collaboratively learn effective machine learning models to detect anomalies.


Asunto(s)
Cadena de Bloques , Internet de las Cosas , Algoritmos , Aprendizaje Automático , Monitoreo Fisiológico
6.
Sensors (Basel) ; 21(21)2021 Oct 20.
Artículo en Inglés | MEDLINE | ID: mdl-34770262

RESUMEN

In recent years, the importance of catching humans' emotions grows larger as the artificial intelligence (AI) field is being developed. Facial expression recognition (FER) is a part of understanding the emotion of humans through facial expressions. We proposed a robust multi-depth network that can efficiently classify the facial expression through feeding various and reinforced features. We designed the inputs for the multi-depth network as minimum overlapped frames so as to provide more spatio-temporal information to the designed multi-depth network. To utilize a structure of a multi-depth network, a multirate-based 3D convolutional neural network (CNN) based on a multirate signal processing scheme was suggested. In addition, we made the input images to be normalized adaptively based on the intensity of the given image and reinforced the output features from all depth networks by the self-attention module. Then, we concatenated the reinforced features and classified the expression by a joint fusion classifier. Through the proposed algorithm, for the CK+ database, the result of the proposed scheme showed a comparable accuracy of 96.23%. For the MMI and the GEMEP-FERA databases, it outperformed other state-of-the-art models with accuracies of 96.69% and 99.79%. For the AFEW database, which is known as one in a very wild environment, the proposed algorithm achieved an accuracy of 31.02%.


Asunto(s)
Reconocimiento Facial , Algoritmos , Inteligencia Artificial , Expresión Facial , Humanos , Redes Neurales de la Computación
7.
Sensors (Basel) ; 21(2)2021 Jan 13.
Artículo en Inglés | MEDLINE | ID: mdl-33451047

RESUMEN

One of the major concerns in wireless sensor networks (WSNs) is most of the sensor nodes are powered through limited lifetime of energy-constrained batteries, which majorly affects the performance, quality, and lifetime of the network. Therefore, diverse clustering methods are proposed to improve energy efficiency of the WSNs. In the meantime, fifth-generation (5G) communications require that several Internet of Things (IoT) applications need to adopt the use of multiple-input multiple-output (MIMO) antenna systems to provide an improved capacity over multi-path channel environment. In this paper, we study a clustering technique for MIMO-based IoT communication systems to achieve energy efficiency. In particular, a novel MIMO-based energy-efficient unequal hybrid clustering (MIMO-HC) protocol is proposed for applications on the IoT in the 5G environment and beyond. Experimental analysis is conducted to assess the effectiveness of the suggested MIMO-HC protocol and compared with existing state-of-the-art research. The proposed MIMO-HC scheme achieves less energy consumption and better network lifetime compared to existing techniques. Specifically, the proposed MIMO-HC improves the network lifetime by approximately 3× as long as the first node and the final node dies as compared with the existing protocol. Moreover, the energy that cluster heads consume on the proposed MIMO-HC is 40% less than that expended in the existing protocol.

10.
Sensors (Basel) ; 20(2)2020 Jan 18.
Artículo en Inglés | MEDLINE | ID: mdl-31963762

RESUMEN

The Internet of Things (IoT) is a distributed system that connects everything via internet. IoT infrastructure contains multiple resources and gateways. In such a system, the problem of optimizing IoT resource allocation and scheduling (IRAS) is vital, because resource allocation (RA) and scheduling deals with the mapping between recourses and gateways and is also responsible for optimally allocating resources to available gateways. In the IoT environment, a gateway may face hundreds of resources to connect. Therefore, manual resource allocation and scheduling is not possible. In this paper, the whale optimization algorithm (WOA) is used to solve the RA problem in IoT with the aim of optimal RA and reducing the total communication cost between resources and gateways. The proposed algorithm has been compared to the other existing algorithms. Results indicate the proper performance of the proposed algorithm. Based on various benchmarks, the proposed method, in terms of "total communication cost", is better than other ones.

11.
Sensors (Basel) ; 19(24)2019 Dec 12.
Artículo en Inglés | MEDLINE | ID: mdl-31842437

RESUMEN

Energy conservation is one of the most critical problems in Internet of Things (IoT). It can be achieved in several ways, one of which is to select the optimal route for data transfer. IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is a standardized routing protocol for IoT. The RPL changes its path frequently while transmitting the data from source to the destination, due to high data traffic in dense networks. Hence, it creates data traffic across the nodes in the networks. To solve this issue, we propose Energy and Delay Aware Data aggregation in Routing Protocol (EDADA-RPL) for IoT. It has two processes, namely parent selection and data aggregation. The process of parent selection uses routing metric residual energy (RER) to choose the best possible parent for data transmission. The data aggregation process uses the compressed sensing (CS) theory in the parent node to combine data packets from the child nodes. Finally, the aggregated data transmits from a downward parent to the sink. The sink node collects all the aggregated data and it performs the reconstruction operation to get the original data of the participant node. The simulation is carried out using the Contiki COOJA simulator. EDADA-RPL's performance is compared to RPL and LA-RPL. The EDADA-RPL offers good performance in terms of network lifetime, delay, and packet delivery ratio.

12.
Sensors (Basel) ; 19(23)2019 Nov 28.
Artículo en Inglés | MEDLINE | ID: mdl-31795235

RESUMEN

With the large-scale deployment of smart meters worldwide, research in non-intrusive load monitoring (NILM) has seen a significant rise due to its dual use of real-time monitoring of end-user appliances and user-centric feedback of power consumption usage. NILM is a technique for estimating the state and the power consumption of an individual appliance in a consumer's premise using a single point of measurement device such as a smart meter. Although there are several existing NILM techniques, there is no meaningful and accurate metric to evaluate these NILM techniques for multi-state devices such as the fridge, heat pump, etc. In this paper, we demonstrate the inadequacy of the existing metrics and propose a new metric that combines both event classification and energy estimation of an operational state to give a more realistic and accurate evaluation of the performance of the existing NILM techniques. In particular, we use unsupervised clustering techniques to identify the operational states of the device from a labeled dataset to compute a penalty threshold for predictions that are too far away from the ground truth. Our work includes experimental evaluation of the state-of-the-art NILM techniques on widely used datasets of power consumption data measured in a real-world environment.

13.
Sensors (Basel) ; 19(13)2019 Jul 09.
Artículo en Inglés | MEDLINE | ID: mdl-31324070

RESUMEN

According to the survey on various health centres, smart log-based multi access physical monitoring system determines the health conditions of humans and their associated problems present in their lifestyle. At present, deficiency in significant nutrients leads to deterioration of organs, which creates various health problems, particularly for infants, children, and adults. Due to the importance of a multi access physical monitoring system, children and adolescents' physical activities should be continuously monitored for eliminating difficulties in their life using a smart environment system. Nowadays, in real-time necessity on multi access physical monitoring systems, information requirements and the effective diagnosis of health condition is the challenging task in practice. In this research, wearable smart-log patch with Internet of Things (IoT) sensors has been designed and developed with multimedia technology. Further, the data computation in that smart-log patch has been analysed using edge computing on Bayesian deep learning network (EC-BDLN), which helps to infer and identify various physical data collected from the humans in an accurate manner to monitor their physical activities. Then, the efficiency of this wearable IoT system with multimedia technology is evaluated using experimental results and discussed in terms of accuracy, efficiency, mean residual error, delay, and less energy consumption. This state-of-the-art smart-log patch is considered as one of evolutionary research in health checking of multi access physical monitoring systems with multimedia technology.


Asunto(s)
Aprendizaje Profundo , Monitoreo Fisiológico/instrumentación , Monitoreo Fisiológico/métodos , Dispositivos Electrónicos Vestibles , Algoritmos , Teorema de Bayes , Presión Sanguínea , Temperatura Corporal , Electrocardiografía , Electroencefalografía , Electromiografía , Humanos , Multimedia , Redes Neurales de la Computación
14.
Sensors (Basel) ; 19(13)2019 Jul 05.
Artículo en Inglés | MEDLINE | ID: mdl-31284398

RESUMEN

The accurate severity classification of a bug report is an important aspect of bug fixing. The bug reports are submitted into the bug tracking system with high speed, and owing to this, bug repository size has been increasing at an enormous rate. This increased bug repository size introduces biases in the bug triage process. Therefore, it is necessary to classify the severity of a bug report to balance the bug triaging process. Previously, many machine learning models were proposed for automation of bug severity classification. The accuracy of these models is not up to the mark because they do not extract the important feature patterns for learning the classifier. This paper proposes a novel deep learning model for multiclass severity classification called Bug Severity classification to address these challenges by using a Convolutional Neural Network and Random forest with Boosting (BCR). This model directly learns the latent and highly representative features. Initially, the natural language techniques preprocess the bug report text, and then n-gram is used to extract the features. Further, the Convolutional Neural Network extracts the important feature patterns of respective severity classes. Lastly, the random forest with boosting classifies the multiple bug severity classes. The average accuracy of the proposed model is 96.34% on multiclass severity of five open source projects. The average F-measures of the proposed BCR and the existing approach were 96.43% and 84.24%, respectively, on binary class severity classification. The results prove that the proposed BCR approach enhances the performance of bug severity classification over the state-of-the-art techniques.

15.
Sensors (Basel) ; 19(9)2019 May 07.
Artículo en Inglés | MEDLINE | ID: mdl-31067811

RESUMEN

: Due to advances in technology, research in healthcare using a cyber-physical system (CPS) opens innovative dimensions of services. In this paper, the authors propose an energy- and service-level agreement (SLA)-efficient cyber physical system for E-healthcare during data transmission services. Furthermore, the proposed phenomenon will be enhanced to ensure the security by detecting and eliminating the malicious devices/nodes involved during the communication process through advances in the ad hoc on-demand distance vector (AODV) protocol. The proposed framework addresses the two security threats, such as grey and black holes, that severely affect network services. Furthermore, the proposed framework used to find the different network metrics such as average qualifying service set (QSS) paths, mean hop and energy efficiency of the quickest path. The framework is simulated by calculating the above metrics in mutual cases i.e. without the contribution of malevolent nodes and with the contribution of malevolent nodes over service time, hop count and energy constraints. Further, variation of SLA and energy shows their expediency in the selection of efficient network metrics.

16.
J Med Syst ; 42(11): 228, 2018 Oct 11.
Artículo en Inglés | MEDLINE | ID: mdl-30311011

RESUMEN

In this paper, MODWT is used to decompose the Electrocardiography (ECG) signals and to identify the changes of R waves in the noisy input ECG signal. The MODWT is used to handle the arbitrary changes in the input signal. The R wave's detctected by the proposed framework is used by the doctors and careholders to take necessary action for the patients. MATLAB simulink model is used to develop the simulation model for the MODWT method. The performance of the MODWT based remote health monitoring system method is comparatively analyzed with other ECG monitoring approaches such as Haar Wavelet Transformation (HWT) and Discrete Wavelet Transform (DWT). Sensitivity, specificity, and Receiver Operating Characteristic (ROC) curve are calculated to evaluate the proposed Internet of Things with MODWT based ECG monitoring system. We have used MIT-BIH Arrythmia Database to perform the experiments.


Asunto(s)
Electrocardiografía Ambulatoria/métodos , Internet , Telemedicina/métodos , Análisis de Ondículas , Algoritmos , Seguridad Computacional , Compresión de Datos/métodos , Humanos , Tecnología de Sensores Remotos , Sensibilidad y Especificidad , Procesamiento de Señales Asistido por Computador
17.
Methods Mol Biol ; 1549: 177-197, 2017.
Artículo en Inglés | MEDLINE | ID: mdl-27975292

RESUMEN

Recent advancements in high-throughput technologies such as mass spectrometry have led to an increase in the rate at which data is generated and accumulated. As a result, standard statistical methods no longer suffice as a way of analyzing such gigantic amounts of data. Network analysis, the evaluation of how nodes relate to one another, has over the years become an integral tool for analyzing high throughput proteomic data as they provide a structure that helps reduce the complexity of the underlying data.Computational tools, including pathway databases and network building tools, have therefore been developed to store, analyze, interpret, and learn from proteomics data. These tools enable the visualization of proteins as networks of signaling, regulatory, and biochemical interactions. In this chapter, we provide an overview of networks and network theory fundamentals for the analysis of proteomics data. We further provide an overview of interaction databases and network tools which are frequently used for analyzing proteomics data.


Asunto(s)
Biología Computacional/métodos , Mapeo de Interacción de Proteínas/métodos , Proteómica/métodos , Programas Informáticos , Minería de Datos/métodos , Bases de Datos de Proteínas , Humanos , Mapas de Interacción de Proteínas , Interfaz Usuario-Computador , Navegador Web
18.
J Mol Biol ; 428(4): 688-692, 2016 Feb 22.
Artículo en Inglés | MEDLINE | ID: mdl-26434508

RESUMEN

Exosomes are membranous vesicles that are released by a variety of cells into the extracellular microenvironment and are implicated in intercellular communication. As exosomes contain RNA, proteins and lipids, there is a significant interest in characterizing the molecular cargo of exosomes. Here, we describe ExoCarta (http://www.exocarta.org), a manually curated Web-based compendium of exosomal proteins, RNAs and lipids. Since its inception, the database has been highly accessed (>54,000 visitors from 135 countries). The current version of ExoCarta hosts 41,860 proteins, >7540 RNA and 1116 lipid molecules from more than 286 exosomal studies annotated with International Society for Extracellular Vesicles minimal experimental requirements for definition of extracellular vesicles. Besides, ExoCarta features dynamic protein-protein interaction networks and biological pathways of exosomal proteins. Users can download most often identified exosomal proteins based on the number of studies. The downloaded files can further be imported directly into FunRich (http://www.funrich.org) tool for additional functional enrichment and interaction network analysis.


Asunto(s)
Bases de Datos de Compuestos Químicos , Exosomas/química , Exosomas/metabolismo , Lípidos/análisis , Proteoma/análisis , ARN/análisis , Internet
19.
Nucleic Acids Res ; 44(D1): D969-74, 2016 Jan 04.
Artículo en Inglés | MEDLINE | ID: mdl-26496946

RESUMEN

In order to advance our understanding of colorectal cancer (CRC) development and progression, biomedical researchers have generated large amounts of OMICS data from CRC patient samples and representative cell lines. However, these data are deposited in various repositories or in supplementary tables. A database which integrates data from heterogeneous resources and enables analysis of the multidimensional data sets, specifically pertaining to CRC is currently lacking. Here, we have developed Colorectal Cancer Atlas (http://www.colonatlas.org), an integrated web-based resource that catalogues the genomic and proteomic annotations identified in CRC tissues and cell lines. The data catalogued to-date include sequence variations as well as quantitative and non-quantitative protein expression data. The database enables the analysis of these data in the context of signaling pathways, protein-protein interactions, Gene Ontology terms, protein domains and post-translational modifications. Currently, Colorectal Cancer Atlas contains data for >13 711 CRC tissues, >165 CRC cell lines, 62 251 protein identifications, >8.3 million MS/MS spectra, >18 410 genes with sequence variations (404 278 entries) and 351 pathways with sequence variants. Overall, Colorectal Cancer Atlas has been designed to serve as a central resource to facilitate research in CRC.


Asunto(s)
Neoplasias Colorrectales/genética , Neoplasias Colorrectales/metabolismo , Bases de Datos Genéticas , Genómica , Proteómica , Línea Celular Tumoral , Humanos , Anotación de Secuencia Molecular , Mutación , Procesamiento Proteico-Postraduccional , Estructura Terciaria de Proteína
20.
J Med Syst ; 38(10): 116, 2014 Oct.
Artículo en Inglés | MEDLINE | ID: mdl-25096968

RESUMEN

The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.


Asunto(s)
Seguridad Computacional/instrumentación , Dispositivo de Identificación por Radiofrecuencia/métodos , Integración de Sistemas , Algoritmos , Atención a la Salud
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA