Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 11 de 11
Filter
Add more filters










Publication year range
1.
PLoS One ; 19(2): e0296433, 2024.
Article in English | MEDLINE | ID: mdl-38329962

ABSTRACT

Sensitive data, such as financial, personal, or classified governmental information, must be protected throughout its cycle. This paper studies the problem of safeguarding transmitted data based on data categorization techniques. This research aims to use a novel routine as a new meta-heuristic to enhance a novel data categorization based-traffic classification technique where private data is classified into multiple confidential levels. As a result, two packets belonging to the same confidentiality level cannot be transmitted through two routers simultaneously, ensuring a high data protection level. Such a problem is determined by a non-deterministic polynomial-time hardness (NP-hard) problem; therefore, a scheduling algorithm is applied to minimize the total transmission time over the two considered routers. To measure the proposed scheme's performance, two types of distribution, uniform and binomial distributions used to generate packets transmission time datasets. The experimental result shows that the most efficient algorithm is the Best-Random Algorithm ([Formula: see text]), recording 0.028 s with an average gap of less than 0.001 in 95.1% of cases compared to all proposed algorithms. In addition, [Formula: see text] is compared to the best-proposed algorithm in the literature which is the Modified decreasing Estimated-Transmission Time algorithm (MDETA). The results show that [Formula: see text] is the best one in 100% of cases where MDETA reaches the best results in only 48%.


Subject(s)
Algorithms , Computer Security
2.
PeerJ Comput Sci ; 9: e1513, 2023.
Article in English | MEDLINE | ID: mdl-38077531

ABSTRACT

The problem treated in this article is the storage of sensitive data in the cloud environment and how to choose regions and zones to minimize the number of transfer file events. Handling sensitive data in the global internet network many times can increase risks and minimize security levels. Our work consists of scheduling several files on the different regions based on the security and load balancing parameters in the cloud. Each file is characterized by its size. If data is misplaced from the start it will require a transfer from one region to another and sometimes from one area to another. The objective is to find a schedule that assigns these files to the appropriate region ensuring the load balancing executed in each region to guarantee the minimum number of migrations. This problem is NP-hard. A novel model regarding the regional security and load balancing of files in the cloud environment is proposed in this article. This model is based on the component called "Scheduler" which utilizes the proposed algorithms to solve the problem. This model is a secure solution to guarantee an efficient dispersion of the stored files to avoid the most storage in one region. Consequently, damage to this region does not cause a loss of big data. In addition, a novel method called the "Grouping method" is proposed. Several variants of the application of this method are utilized to propose novel algorithms for solving the studied problem. Initially, seven algorithms are proposed in this article. The experimental results show that there is no dominance between these algorithms. Therefore, three combinations of these seven algorithms generate three other algorithms with better results. Based on the dominance rule, only six algorithms are selected to discuss the performance of the proposed algorithms. Four classes of instances are generated to measure and test the performance of algorithms. In total, 1,360 instances are tested. Three metrics are used to assess the algorithms and make a comparison between them. The experimental results show that the best algorithm is the "Best-value of four algorithms" in 86.5% of cases with an average gap of 0.021 and an average running time of 0.0018 s.

3.
PeerJ Comput Sci ; 9: e1543, 2023.
Article in English | MEDLINE | ID: mdl-38077537

ABSTRACT

Communication networks have played a vital role in changing people's life. However, the rapid advancement in digital technologies has presented many drawbacks of the current inter-networking technology. Data leakages severely threaten information privacy and security and can jeopardize individual and public life. This research investigates the creation of a private network model that can decrease the number of data leakages. A two-router private network model is designed. This model uses two routers to manage the classification level of the transmitting network packets. In addition, various algorithmic techniques are proposed. These techniques solve a scheduling problem. This problem is to schedule packets through routers under a security classification level constraint. This constraint is the non-permission of the transmission of two packets that belongs to the same security classification level. These techniques are the dispatching rule and grouping method. The studied problem is an NP-hard. Eight algorithms are proposed to minimize the total transmission time. A comparison between the proposed algorithms and those in the literature is discussed to show the performance of the proposed scheme through experimentation. Four classes of instances are generated. For these classes, the experimental results show that the best-proposed algorithm is the best-classification groups' algorithm in 89.1% of cases and an average gap of 0.001. In addition, a benchmark of instances is used based on a real dataset. This real dataset shows that the best-proposed algorithm is the best-classification groups' algorithm in 88.6% of cases and an average gap of less than 0.001.

4.
PeerJ Comput Sci ; 9: e1582, 2023.
Article in English | MEDLINE | ID: mdl-37869458

ABSTRACT

Logistics and sourcing management are core in any supply chain operation and are among the critical challenges facing any economy. The specialists classify transport operations and warehouse management as two of the biggest and costliest challenges in logistics and supply chain operations. Therefore, an effective warehouse management system is a legend to the success of timely delivery of products and the reduction of operational costs. The proposed scheme aims to discuss truck unloading operations problems. It focuses on cases where the number of warehouses is limited, and the number of trucks and the truck unloading time need to be manageable or unknown. The contribution of this article is to present a solution that: (i) enhances the efficiency of the supply chain process by reducing the overall time for the truck unloading problem; (ii) presents an intelligent metaheuristic warehouse management solution that uses dispatching rules, randomization, permutation, and iteration methods; (iii) proposes four heuristics to deal with the proposed problem; and (iv) measures the performance of the proposed solution using two uniform distribution classes with 480 trucks' unloading times instances. Our result shows that the best algorithm is OIS~, as it has a percentage of 78.7% of the used cases, an average gap of 0.001, and an average running time of 0.0053 s.

5.
PLoS One ; 18(3): e0278183, 2023.
Article in English | MEDLINE | ID: mdl-36857320

ABSTRACT

Private networks have become popular for secure data sharing and anonymous communication in many domains: enterprise environments, military, journalism, telecommunication, healthcare, to name a few. It has been used with or without internet connection. Its primary purpose is to provide confidentiality, bypass unlawful activities, and protect against common threats such as interception, modification, and censorship. In addition, several private network technologies exist to support secure communications. However, they mostly rely on encryption only. The transmitted data is classified into different confidentiality levels. This research presents a smart private network architecture scheme that transmits constraint-based classified packets. The main directive of this work is the proposed constraint. This constraint is meant to enforce that if two packets belong to the same confidentiality level, they can't be transmitted through the two routers simultaneously. Therefore, the studied problem is an NP-hard problem. This paper presents the following contributions: (i) proposes a new architecture paradigm for outsourcing a constraint-based multi-classified data sharing securely and transmitted through two routers; (ii) introduces several algorithms to prove the feasibility for this NP-Hard problem; and (iii) implements the algorithms solutions using C++ and compares their performance. Different metrics are used to measure the performance of the proposed algorithms. Randomized Longest Transmission time first algorithm [Formula: see text] scored the best algorithm with a percentage of 73.5% and an average gap of 0.002 according to the experimental results. It is remarkable worthy to note that the execution time of all the algorithms is less than 0.001 s.


Subject(s)
Algorithms , Benchmarking , Communication , Health Facilities , Information Dissemination
6.
J Multidiscip Healthc ; 15: 941-954, 2022.
Article in English | MEDLINE | ID: mdl-35519151

ABSTRACT

Introduction: The fear of emergence of newer strains of SARS-CoV-2 as well as concerns of waning of protection after doses of COVID-19 vaccine has created a degree of global uncertainty surrounding the pandemic. Some of the emerging strains of SARS-CoV-2 have shown potential for causing serious disease and death, a threat that has been ameliorated by ensuring the vaccine coverage in populations. Still, the vaccine coverage remains unsatisfactory in certain populations. Hence, understanding and working on the factors which affect acceptance of the vaccine amongst the public can be considered a priority for public health as much as ensuring availability of the vaccines. Objective: This research work aims to build and validate a scale to assess the public attitude towards COVID vaccination. The proposed scale has been named as COVID Vaccination Attitude Scale (C-VAS). Materials and Methods: A three-stage process was used to develop the C-VAS which includes (1) item generation (deductive and inductive approach); (2) item-refinement (pre-testing and pilot testing, exploratory factor analysis (EFA); and (3) scale validation (confirmatory factor analysis, CFA). The sample size used for this research was 840. In order to overcome the issue of common method bias, the data was collected in two phases. The sample n1 (411) was used for EFA and the sample n2 (429) was employed for undertaking CFA. Common method bias was assessed to check if variations in responses are caused by the instrument instead of the actual dispositions of the respondents. Items of the scale were taken by reviewing the extant literature about vaccination, from the relevant established theories such as health belief model and by interviewing with domain experts. The content validity of the scale was determined. Results: EFA extracted five factors, labelled as "Perceived Benefits", "Perceived Barriers", "Perceived Severity", "Health Motivation" and "Perceived Risk". To further validate the factor-item structure CFA was performed. Conclusion: The measurement model was assessed by applying CFA to examine the reliability, accuracy and validity of the scale. Development of this scale can help in understanding factors that affect vaccine acceptability behavior. This can be used in promoting COVID vaccine coverage in countries and societies which still have low vaccination rates especially due to lack of acceptance of the vaccine. This scale also has the potential to understand public behavior in relation to similar future outbreaks and the acceptance of the mitigatory vaccines.

7.
Sci Rep ; 12(1): 6533, 2022 04 20.
Article in English | MEDLINE | ID: mdl-35444220

ABSTRACT

Recently, various advanced technologies have been employed to build smart cities. Smart cities aim at improving the quality of life through the delivery of better services. One of the current services that are essential for any smart city, is the availability of enough parking spaces to ensure smooth and easy traffic flow. This research proposes a new framework for solving the problem of parking lot allocation, which emphasizes the equitable allocation of people based on the overall count of people in each parking space. The allocation process is performed while considering the available parking lots in each parking space. To accomplish the desired goal, this research will develop a set of seven algorithms to reduce the gap in the number of people between parking spaces. Many experiments carried out on 2430 different cases to cover several aspects such as the execution time and the gap calculations, were used to explore the performance of the developed algorithm. Analyzing the obtained results indicates a good performance behavior of the developed algorithms. Also, it shows that the developed algorithms can solve the studied problem in terms of gap and time calculations. The MR algorithm gained excellent performance results compared to one of the best algorithms in the literature. The MR algorithm has a percentage of 96.1 %, an average gap of 0.02, and a good execution time of 0.007 s.


Subject(s)
Algorithms , Quality of Life , Cities , Humans
8.
PeerJ Comput Sci ; 8: e819, 2022.
Article in English | MEDLINE | ID: mdl-35174262

ABSTRACT

There are volumes of patient reports generated in any healthcare organization daily. The reports can be very lengthy or of few pages. Maintaining records of patients is essential for ensuring quality medical care. Doctors, apart from their routine activities, are also responsible to sort, examine and archive the generated reports. However, this process consumes doctors' time, who are already hard-pressed for time. The objective of this study is to search for a method that can assign reports to doctors to ensure equitable and fair distribution of the overall workload. As a part of the solution, a mathematical model will be proposed to perform different developed heuristics. An experimental evaluation using different classes with a total of 2,450 different instances will be tested to measure the performance of the developed heuristics in terms of, elapsed time and gap value calculations. The clustering heuristics which is based on two groups is the best heuristic with 96.1% for the small instances and 98% for the big scale instances. The contribution of this work is based on employing dispatching rules with several variants; randomization approach, clustering methods; probabilistic method, and iterative methods approach to assign all given reports to doctors while ensuring the equitable distribution of the paper workload.

9.
Complex Intell Systems ; 8(1): 597-609, 2022.
Article in English | MEDLINE | ID: mdl-34777982

ABSTRACT

Achieving community immunity against the coronavirus disease 2019 (COVID-19) depends on vaccinating the largest number of people within a specific period while taking all precautionary measures. To address this problem, this paper presents a smart parking system that will help the health crisis management committee to vaccinate the largest number of people with the minimum period of time while ensuring that all precautionary measures are followed, through a set of algorithms. These algorithms seek to ensure a uniform distribution of persons in parking. This paper proposes a novel complex system for smart parking and nine algorithms to address the NP-hard problem. The experimental results demonstrate the performance of the proposed algorithms in terms of gap and time. Applying these algorithms to smart cities to ensure precautionary measures against COVID-19 can help fight against this pandemic.

10.
Biomed Res Int ; 2020: 3764653, 2020.
Article in English | MEDLINE | ID: mdl-32851065

ABSTRACT

In this research, the photoplethysmogram (PPG) waveform analysis is utilized to develop a logistic regression-based predictive model for the classification of diabetes. The classifier has three predictors age, b/a, and SP indices in which they achieved an overall accuracy of 92.3% in the prediction of diabetes. In this study, a total of 587 subjects were enrolled. A total of 459 subjects were used for model training and development, while the rest of the 128 subjects were used for model testing and validation. The classifier was able to diagnose 63 patients correctly as diabetes while 27 subjects were wrongly classified as nondiabetes with an accuracy of 70%. Again, the model classified 479 subjects as nondiabetes correctly while it incorrectly classified 18 subjects as diabetes with an accuracy of 96.4%. Finally, the proposed model revealed an overall predictive accuracy of 92.3% which makes it a reliable surrogate measure for diabetes classification and prediction in clinical settings.


Subject(s)
Diabetes Mellitus/classification , Diabetes Mellitus/diagnosis , Photoplethysmography/methods , Adult , Aged , Diabetes Mellitus/blood , Diabetes Mellitus/pathology , Female , Humans , Logistic Models , Male , Middle Aged
11.
Comput Intell Neurosci ; 2020: 3607547, 2020.
Article in English | MEDLINE | ID: mdl-32802026

ABSTRACT

This paper proposes an optimization system for solving an NP-hard problem by using several new algorithms and application programs. This study aims to identify a suitable distribution of investment projects across several developed industrial regions. It is assumed that all industrial regions involved have the same economic and strategic characteristics. The problem involves a set of projects that are to be assigned across regions. Each project creates an estimated number of new jobs, and the distribution of projects can be guided by minimizing the maximum total number of newly created jobs. The problem is NP-hard one, and it is difficult to determine the most appropriate distribution. We apply scheduling algorithms in order to solve the analyzed problem. Severalheuristics are developedto obtain the appropriate distribution of newly created jobs across all regions. A branch-and-bound method is employed in order to obtain the exact solution. The performance of the algorithm is demonstrated by the experimental results for a total number of 1850 instances.


Subject(s)
Algorithms , Industry/economics , Investments/economics , Investments/organization & administration , Employment/economics , Employment/organization & administration , Industry/organization & administration
SELECTION OF CITATIONS
SEARCH DETAIL
...