Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 5 de 5
Filter
Add more filters










Database
Language
Publication year range
1.
PLoS One ; 19(8): e0305483, 2024.
Article in English | MEDLINE | ID: mdl-39088543

ABSTRACT

The COVID-19 epidemic is affecting individuals in many ways and continues to spread all over the world. Vaccines and traditional medical techniques are still being researched. In diagnosis and therapy, biological and digital technology is used to overcome the fear of this disease. Despite recovery in many patients, COVID-19 does not have a definite cure or a vaccine that provides permanent protection for a large number of people. Current methods focus on prevention, monitoring, and management of the spread of the disease. As a result, new technologies for combating COVID-19 are being developed. Though unreliable due to a lack of sufficient COVID-19 datasets, inconsistencies in the datasets availability, non-aggregation of the database because of conflicting data formats, incomplete information, and distortion, they are a step in the right direction. Furthermore, the privacy and confidentiality of people's medical data are only partially ensured. As a result, this research study proposes a novel, cooperative approach that combines big data analytics with relevant Artificial Intelligence (AI) techniques and blockchain to create a system for analyzing and detecting COVID-19 instances. Based on these technologies, the reliability, affordability, and prominence of dealing with the above problems required time. The architecture of the proposed model will analyze different data sources for preliminary diagnosis, detect the affected area, and localize the abnormalities. Furthermore, the blockchain approach supports the decentralization of the central repository so that it is accessible to every stakeholder. The model proposed in this study describes the four-layered architecture. The purpose of the proposed architecture is to utilize the latest technologies to provide a reliable solution during the pandemic; the proposed architecture was sufficient to cover all the current issues, including data security. The layers are unique and individually responsible for handling steps required for data acquisition, storage, analysis, and reporting using blockchain principles in a decentralized P2P network. A systematic review of the technologies to use in the pandemic covers all possible solutions that can cover the issue best and provide a secure solution to the pandemic.


Subject(s)
Artificial Intelligence , Big Data , COVID-19 , COVID-19/epidemiology , COVID-19/diagnosis , Humans , SARS-CoV-2/isolation & purification , Blockchain , Databases, Factual
2.
PLoS One ; 19(6): e0303890, 2024.
Article in English | MEDLINE | ID: mdl-38843255

ABSTRACT

Anomaly detection in time series data is essential for fraud detection and intrusion monitoring applications. However, it poses challenges due to data complexity and high dimensionality. Industrial applications struggle to process high-dimensional, complex data streams in real time despite existing solutions. This study introduces deep ensemble models to improve traditional time series analysis and anomaly detection methods. Recurrent Neural Networks (RNNs) and Long Short-Term Memory (LSTM) networks effectively handle variable-length sequences and capture long-term relationships. Convolutional Neural Networks (CNNs) are also investigated, especially for univariate or multivariate time series forecasting. The Transformer, an architecture based on Artificial Neural Networks (ANN), has demonstrated promising results in various applications, including time series prediction and anomaly detection. Graph Neural Networks (GNNs) identify time series anomalies by capturing temporal connections and interdependencies between periods, leveraging the underlying graph structure of time series data. A novel feature selection approach is proposed to address challenges posed by high-dimensional data, improving anomaly detection by selecting different or more critical features from the data. This approach outperforms previous techniques in several aspects. Overall, this research introduces state-of-the-art algorithms for anomaly detection in time series data, offering advancements in real-time processing and decision-making across various industrial sectors.


Subject(s)
Neural Networks, Computer , Algorithms , Multivariate Analysis , Deep Learning , Time Factors
3.
Sensors (Basel) ; 23(16)2023 Aug 14.
Article in English | MEDLINE | ID: mdl-37631699

ABSTRACT

In the era of interconnected and intelligent cyber-physical systems, preserving privacy has become a paramount concern. This paper aims a groundbreaking proof-of-concept (PoC) design that leverages consortium blockchain technology to address privacy challenges in cyber-physical systems (CPSs). The proposed design introduces a novel approach to safeguarding sensitive information and ensuring data integrity while maintaining a high level of trust among stakeholders. By harnessing the power of consortium blockchain, the design establishes a decentralized and tamper-resistant framework for privacy preservation. However, ensuring the security and privacy of sensitive information within CPSs poses significant challenges. This paper proposes a cutting-edge privacy approach that leverages consortium blockchain technology to secure secrets in CPSs. Consortium blockchain, with its permissioned nature, provides a trusted framework for governing the network and validating transactions. By employing consortium blockchain, secrets in CPSs can be securely stored, shared, and accessed by authorized entities only, mitigating the risks of unauthorized access and data breaches. The proposed approach offers enhanced security, privacy preservation, increased trust and accountability, as well as interoperability and scalability. This paper aims to address the limitations of traditional security mechanisms in CPSs and harness the potential of consortium blockchain to revolutionize the management of secrets, contributing to the advancement of CPS security and privacy. The effectiveness of the design is demonstrated through extensive simulations and performance evaluations. The results indicate that the proposed approach offers significant advancements in privacy protection, paving the way for secure and trustworthy cyber-physical systems in various domains.

4.
Sensors (Basel) ; 23(15)2023 Jul 28.
Article in English | MEDLINE | ID: mdl-37571545

ABSTRACT

The swift advancement of the Internet of Things (IoT), coupled with the growing application of healthcare software in this area, has given rise to significant worries about the protection and confidentiality of critical health data. To address these challenges, blockchain technology has emerged as a promising solution, providing decentralized and immutable data storage and transparent transaction records. However, traditional blockchain systems still face limitations in terms of preserving data privacy. This paper proposes a novel approach to enhancing privacy preservation in IoT-based healthcare applications using homomorphic encryption techniques combined with blockchain technology. Homomorphic encryption facilitates the performance of calculations on encrypted data without requiring decryption, thus safeguarding the data's privacy throughout the computational process. The encrypted data can be processed and analyzed by authorized parties without revealing the actual contents, thereby protecting patient privacy. Furthermore, our approach incorporates smart contracts within the blockchain network to enforce access control and to define data-sharing policies. These smart contracts provide fine-grained permission settings, which ensure that only authorized entities can access and utilize the encrypted data. These settings protect the data from being viewed by unauthorized parties. In addition, our system generates an audit record of all data transactions, which improves both accountability and transparency. We have provided a comparative evaluation with the standard models, taking into account factors such as communication expense, transaction volume, and security. The findings of our experiments suggest that our strategy protects the confidentiality of the data while at the same time enabling effective data processing and analysis. In conclusion, the combination of homomorphic encryption and blockchain technology presents a solution that is both resilient and protective of users' privacy for healthcare applications integrated with IoT. This strategy offers a safe and open setting for the management and exchange of sensitive patient medical data, while simultaneously preserving the confidentiality of the patients involved.


Subject(s)
Blockchain , Internet of Things , Humans , Privacy , Computer Security , Delivery of Health Care
5.
Sensors (Basel) ; 21(21)2021 Oct 20.
Article in English | MEDLINE | ID: mdl-34770256

ABSTRACT

The fog layer provides substantial benefits in cloud-based IoT applications because it can serve as an aggregation layer and it moves the computation resources nearer to the IoT devices; however, it is important to ensure adequate performance is achieved in such applications, as the devices usually communicate frequently and authenticate with the cloud. This can cause performance and availability issues, which can be dangerous in critical applications such as in the healthcare sector. In this paper, we analyze the efficacy of the fog layer in different architectures in a real-world environment by examining performance metrics for the cloud and fog layers using different numbers of IoT devices. We also implement the fog layer using two methods to determine whether different fog implementation frameworks can affect the performance. The results show that including a fog layer with semi-heavyweight computation capability results in higher capital costs, although the in the long run resources, time, and money are saved. This study can serve as a reference for fundamental fog computing concepts. It can also be used to walk practitioners through different implementation frameworks of fog-aided IoT and to show tradeoffs in order to inform when to use each implementation framework based on one's objectives.


Subject(s)
Cloud Computing
SELECTION OF CITATIONS
SEARCH DETAIL