Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 22
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Heliyon ; 10(7): e28352, 2024 Apr 15.
Artigo em Inglês | MEDLINE | ID: mdl-38571657

RESUMO

The use of natural ester oils as electrically insulating fluids has gained significant attention from industries and electrical utilities as they aim to replace traditional mineral oils. However, most natural ester oils are derived from edible products, which has the potential to contribute to the food crisis. Therefore, nonedible green nanofluids made from cottonseed oil (CSO) have been targeted as a keen solution to this issue. However, Al2O3, TiO2, Fe2O3, SiO2, and graphene nanoparticles at (0.025, 0.05, and 0.075 wt/vol%) were used as additives, along with surfactant Olic Ac-id and Ethanol (1:5) due to their promising impact on the dielectric and thermal properties of the nanofluid. The nanofluid synthesis process was practically conducted in HV & Chemical Laboratories using one-step and two-step methods, and their breakdown voltage results and chemical properties (e.g., fire point, flash point, cloud point, pour point, viscosity, acidity, moisture content, resistivity, and dissipation factor) were compared. The physical mechanisms underlying these properties were also analyzed and tested. For the validation of the proposed vegetable oil the results have been compared with traditional mineral oil for high-voltage equipment's. The findings suggest that the proposed nonedible green nanofluids-based cottonseed oil (CSO) has a high potential to be used as electrically insulating fluids, providing a sustainable alternative to conventional mineral oils. Overall, this study provides insights into the use of non-edible green nanofluids as a solution to the potential contribution of natural ester oils to the food crisis. The findings highlight the importance of sustainable solutions in the energy industry and the need for further research in this area.

2.
Sci Rep ; 14(1): 7902, 2024 04 04.
Artigo em Inglês | MEDLINE | ID: mdl-38570524

RESUMO

The spatial movement of the human population from one region to another and the existence of super-spreaders are the main factors that enhanced the disease incidence. Super-spreaders refer to the individuals having transmitting ability to multiple pathogens. In this article, an epidemic model with spatial and temporal effects is formulated to analyze the impact of some preventing measures of COVID-19. The model is developed using six nonlinear partial differential equations. The infectious individuals are sub-divided into symptomatic, asymptomatic and super-spreader classes. In this study, we focused on the rigorous qualitative analysis of the reaction-diffusion model. The fundamental mathematical properties of the proposed COVID-19 epidemic model such as boundedness, positivity, and invariant region of the problem solution are derived, which ensure the validity of the proposed model. The model equilibria and its stability analysis for both local and global cases have been presented. The normalized sensitivity analysis of the model is carried out in order to observe the crucial factors in the transmission of infection. Furthermore, an efficient numerical scheme is applied to solve the proposed model and detailed simulation are performed. Based on the graphical observation, diffusion in the context of confined public gatherings is observed to significantly inhibit the spread of infection when compared to the absence of diffusion. This is especially important in scenarios where super-spreaders may play a major role in transmission. The impact of some non-pharmaceutical interventions are illustrated graphically with and without diffusion. We believe that the present investigation will be beneficial in understanding the complex dynamics and control of COVID-19 under various non-pharmaceutical interventions.


Assuntos
COVID-19 , Epidemias , Humanos , COVID-19/epidemiologia , Dinâmica não Linear , Simulação por Computador , Difusão
3.
Sci Rep ; 14(1): 6930, 2024 Mar 23.
Artigo em Inglês | MEDLINE | ID: mdl-38521792

RESUMO

The fractional stochastic delay differential equation (FSDDE) is a powerful mathematical tool for modeling complex systems that exhibit both fractional order dynamics and stochasticity with time delays. The purpose of this study is to explore the stability analysis of a system of FSDDEs. Our study emphasizes the interaction between fractional calculus, stochasticity, and time delays in understanding the stability of such systems. Analyzing the moments of the system's solutions, we investigate stochasticity's influence on FSDDS. The article provides practical insight into solving FSDDS efficiently using various numerical techniques. Additionally, this research focuses both on asymptotic as well as Lyapunov stability of FSDDS. The local stability conditions are clearly presented and also the effects of a fractional orders with delay on the stability properties are examine. Through a comprehensive test of a stability criteria, practical examples and numerical simulations we demonstrate the complexity and challenges concern with the analyzing FSDDEs.

4.
Heliyon ; 10(6): e28073, 2024 Mar 30.
Artigo em Inglês | MEDLINE | ID: mdl-38524527

RESUMO

Recent widespread connections of renewable energy resource (RESs) in place of fossil fuel supplies and the adoption of electrical vehicles in place of gasoline-powered vehicles have given birth to a number of new concerns. The control architecture of linked power networks now faces an increasingly pressing challenge: tie-line power fluctuations and reducing frequency deviations. Because of their nature and dependence on external circumstances, RESs are analogous to continually fluctuating power generators. Using a fractional order-based frequency regulator, this work presents a new method for improving the frequency regulation in a two-area interconnected power system. In order to deal with the frequency regulation difficulties of the hybrid system integrated with RES, the suggested controller utilizes the modified form of fractional order proportional integral derivative (FOPID) controller known as FOI-PDN controller. The new proposed controllers are designed using the white shark optimizer (WSO), a current powerful bioinspired meta heuristic algorithm which has been motivated by the learning abilities of white sharks when actively hunting in the environment. The suggested FOI-PDN controller's performance was compared to that of various control methodologies such as FOPID, and PID. Furthermore, the WSO findings are compared to those of other techniques such as the salp swarm algorithm, sine cosine algorithm and fitness dependent optimizer. The recommended controller and design approach have been tested and validated at different loading conditions and different circumstances, as well as their robustness against system parameter suspicions. The simulation outcomes demonstrate that the WSO-based tuned FOI-PDN controller successfully reduces peak overshoot by 73.33%, 91.03%, and 77.21% for region-2, region-1, and link power variation respectively, and delivers minimum undershoot of 89.12%, 83.11%, and 78.10% for both regions and tie-line. The obtained findings demonstrate the new proposed controller's stable function and frequency controlling performance with optimal controller parameters and without the requirement for a sophisticated design process.

5.
Sci Rep ; 13(1): 21224, 2023 Dec 01.
Artigo em Inglês | MEDLINE | ID: mdl-38040862

RESUMO

In this article, we introduce a novel Bayesian Max-EWMA control chart under various loss functions to concurrently monitor the mean and variance of a normally distributed process. The Bayesian Max-EWMA control chart exhibit strong overall performance in detecting shifts in both mean and dispersion across various magnitudes. To evaluate the performance of the proposed control chart, we employ Monte Carlo simulation methods to compute their run length characteristics. We conduct an extensive comparative analysis, contrasting the run length performance of our proposed charts with that of existing ones. Our findings highlight the heightened sensitivity of Bayesian Max-EWMA control chart to shifts of diverse magnitudes. Finally, to illustrate the efficacy of our Bayesian Max-EWMA control chart using various loss functions, we present a practical case study involving the hard-bake process in semiconductor manufacturing. Our results underscore the superior performance of the Bayesian Max-EWMA control chart in detecting out-of-control signals.

6.
Sci Rep ; 13(1): 22703, 2023 Dec 19.
Artigo em Inglês | MEDLINE | ID: mdl-38123625

RESUMO

Quality control often employs memory-type control charts, including the exponentially weighted moving average (EWMA) and Shewhart control charts, to identify shifts in the location parameter of a process. This article pioneers a new Bayesian Adaptive EWMA (AEWMA) control chart, built on diverse loss functions (LFs) such as the square error loss function (SELF) and the Linex loss function (LLF). The proposed chart aims to enhance the process of identifying small to moderate as well as significant shifts in the mean, signifying a notable advancement in the field of quality control. These are implemented utilizing an informative prior for both posterior and posterior predictive distributions, employing various paired ranked set sampling (PRSS) schemes. The effectiveness of the suggested chart is appraised using average run length (ARL) and the standard deviation of run length (SDRL). Monte Carlo simulations are employed to contrast the recommended approach against other control charts. The outcomes demonstrate the dignitary performance of the recommended chart in identifying out-of-control signals, especially applying PRSS designs, in comparison to simple random sampling (SRS). Finally, a practical application was conducted in the semiconductor manufacturing context to appraise the efficacy of the offered chart using various paired ranked set sampling strategies. The results reveal that the suggested control chart performed well in capturing the out-of-control signals far better than the already in use control charts. Overall, this study interposes a new technique with diverse LFs and PRSS designs, improving the precision and effectiveness in detecting process mean shifts, thereby contributing to advancements in quality control and process monitoring.

7.
Sci Rep ; 13(1): 17528, 2023 Oct 16.
Artigo em Inglês | MEDLINE | ID: mdl-37845300

RESUMO

This paper aims to analyze the coupled nonlinear fractional Drinfel'd-Sokolov-Wilson (FDSW) model with beta derivative. The nonlinear FDSW equation plays an important role in describing dispersive water wave structures in mathematical physics and engineering, which is used to describe nonlinear surface gravity waves propagating over horizontal sea bed. We have applied the travelling wave transformation that converts the FDSW model to nonlinear ordinary differential equations. After that, we applied the generalized rational exponential function method (GERFM). Diverse types of soliton solution structures in the form of singular bright, periodic, dark, bell-shaped and trigonometric functions are attained via the proposed method. By selecting a suitable parametric value, the 3D, 2D and contour plots for some solutions are also displayed to visualize their nature in a better way. The modulation instability for the model is also discussed. The results show that the presented method is simple and powerful to get a novel soliton solution for nonlinear PDEs.

8.
Sci Rep ; 13(1): 17787, 2023 10 18.
Artigo em Inglês | MEDLINE | ID: mdl-37853028

RESUMO

An efficient finite difference approach is adopted to analyze the solution of a novel fractional-order mathematical model to control the co-circulation of double strains of dengue and COVID-19. The model is primarily built on a non-integer Caputo fractional derivative. The famous fixed-point theorem developed by Banach is employed to ensure that the solution of the formulated model exists and is ultimately unique. The model is examined for stability around the infection-free equilibrium point analysis, and it was observed that it is stable (asymptotically) when the maximum reproduction number is strictly below unity. Furthermore, global stability analysis of the disease-present equilibrium is conducted via the direct Lyapunov method. The non-standard finite difference (NSFD) approach is adopted to solve the formulated model. Furthermore, numerical experiments on the model reveal that the trajectories of the infected compartments converge to the disease-present equilibrium when the basic reproduction number ([Formula: see text]) is greater than one and disease-free equilibrium when the basic reproduction number is less than one respectively. This convergence is independent of the fractional orders and assumed initial conditions. The paper equally emphasized the outcome of altering the fractional orders, infection and recovery rates on the disease patterns. Similarly, we also remarked the importance of some key control measures to curtail the co-spread of double strains of dengue and COVID-19.


Assuntos
COVID-19 , Dengue , Osteopatia , Humanos , Número Básico de Reprodução , Modelos Teóricos , Dengue/epidemiologia
9.
Sci Rep ; 13(1): 13547, 2023 Aug 20.
Artigo em Inglês | MEDLINE | ID: mdl-37599295

RESUMO

The extended exponential weighted moving average (EEWMA) statistic is a memory type statistic that uses past observations along with the current information for the estimation of a population parameter to improve the efficiency of the estimators. This study utilized the EEWMA statistic to estimate the population mean with a suitable auxiliary variable. The ratio and product estimators are proposed for the surveys that are time-based by using current information along with that information. The approximate mean square errors are computed for the proposed memory type estimators and mathematical comparison is discussed to demonstrate the efficiency of the estimator. The simulation study was carried out to evaluate the performance of the proposed memory type estimators. It can be seen from the results that the efficiency of the estimator enhances by utilizing the current sample as well as past information. A real-life example is presented to illustrate the usage of proposed estimators.

10.
Sensors (Basel) ; 23(16)2023 Aug 18.
Artigo em Inglês | MEDLINE | ID: mdl-37631793

RESUMO

Predicting attacks in Android malware devices using machine learning for recommender systems-based IoT can be a challenging task. However, it is possible to use various machine-learning techniques to achieve this goal. An internet-based framework is used to predict and recommend Android malware on IoT devices. As the prevalence of Android devices grows, the malware creates new viruses on a regular basis, posing a threat to the central system's security and the privacy of the users. The suggested system uses static analysis to predict the malware in Android apps used by consumer devices. The training of the presented system is used to predict and recommend malicious devices to block them from transmitting the data to the cloud server. By taking into account various machine-learning methods, feature selection is performed and the K-Nearest Neighbor (KNN) machine-learning model is proposed. Testing was carried out on more than 10,000 Android applications to check malicious nodes and recommend that the cloud server block them. The developed model contemplated all four machine-learning algorithms in parallel, i.e., naive Bayes, decision tree, support vector machine, and the K-Nearest Neighbor approach and static analysis as a feature subset selection algorithm, and it achieved the highest prediction rate of 93% to predict the malware in real-world applications of consumer devices to minimize the utilization of energy. The experimental results show that KNN achieves 93%, 95%, 90%, and 92% accuracy, precision, recall and f1 measures, respectively.

11.
Sensors (Basel) ; 23(12)2023 Jun 07.
Artigo em Inglês | MEDLINE | ID: mdl-37420558

RESUMO

Retinal optical coherence tomography (OCT) imaging is a valuable tool for assessing the condition of the back part of the eye. The condition has a great effect on the specificity of diagnosis, the monitoring of many physiological and pathological procedures, and the response and evaluation of therapeutic effectiveness in various fields of clinical practices, including primary eye diseases and systemic diseases such as diabetes. Therefore, precise diagnosis, classification, and automated image analysis models are crucial. In this paper, we propose an enhanced optical coherence tomography (EOCT) model to classify retinal OCT based on modified ResNet (50) and random forest algorithms, which are used in the proposed study's training strategy to enhance performance. The Adam optimizer is applied during the training process to increase the efficiency of the ResNet (50) model compared with the common pre-trained models, such as spatial separable convolutions and visual geometry group (VGG) (16). The experimentation results show that the sensitivity, specificity, precision, negative predictive value, false discovery rate, false negative rate accuracy, and Matthew's correlation coefficient are 0.9836, 0.9615, 0.9740, 0.9756, 0.0385, 0.0260, 0.0164, 0.9747, 0.9788, and 0.9474, respectively.


Assuntos
Aprendizado Profundo , Redes Neurais de Computação , Tomografia de Coerência Óptica/métodos , Retina/diagnóstico por imagem , Valor Preditivo dos Testes
12.
Sensors (Basel) ; 23(12)2023 Jun 08.
Artigo em Inglês | MEDLINE | ID: mdl-37420607

RESUMO

In this paper, we present a hybrid frequency shift keying and frequency division multiplexing (i.e., FSK-FDM) approach for information embedding in dual-function radar and communication (DFRC) design to achieve an improved communication data rate. Since most of the existing works focus on merely two-bit transmission in each pulse repetition interval (PRI) using different amplitude modulation (AM)- and phased modulation (PM)-based techniques, this paper proposes a new technique that doubles the data rate by using a hybrid FSK-FDM technique. Note that the AM-based techniques are used when the communication receiver resides in the side lobe region of the radar. In contrast, the PM-based techniques perform better if the communication receiver is in the main lobe region. However, the proposed design facilitates the delivery of information bits to the communication receivers with an improved bit rate (BR) and bit error rate (BER) regardless of their locations in the radar's main lobe or side lobe regions. That is, the proposed scheme enables information encoding according to the transmitted waveforms and frequencies using FSK modulation. Next, the modulated symbols are added together to achieve a double data rate using the FDM technique. Finally, each transmitted composite symbol contains multiple FSK-modulated symbols, resulting in an increased data rate for the communication receiver. Numerous simulation results are presented to validate the effectiveness of the proposed technique.


Assuntos
Comunicação , Radar , Simulação por Computador
13.
Entropy (Basel) ; 25(7)2023 Jul 06.
Artigo em Inglês | MEDLINE | ID: mdl-37509974

RESUMO

In this paper, we design constant modulus waveforms for dual-function radar-communication (DFRC) systems based on a multi-input multi-output (MIMO) configuration of sensors for a far-field scenario. At first, we formulate a non-convex optimization problem subject to waveform synthesis for minimizing the interference power while maintaining a constant modulus constraint. Next, we solve this non-convex problem, iteratively, using the alternating direction method of multipliers (ADMM) algorithm. Importantly, the designed waveforms approximate a desired beampattern in terms of a high-gain radar beam and a slightly high gain communication beam while maintaining a desired low sidelobe level. The designed waveforms ensure an improved detection probability and an improved bit error rate (BER) for radar and communications parts, respectively. Finally, we demonstrate the effectiveness of the proposed method through simulation results.

14.
Sensors (Basel) ; 23(13)2023 Jul 06.
Artigo em Inglês | MEDLINE | ID: mdl-37448038

RESUMO

By definition, the aggregating methodology ensures that transmitted data remain visible in clear text in the aggregated units or nodes. Data transmission without encryption is vulnerable to security issues such as data confidentiality, integrity, authentication and attacks by adversaries. On the other hand, encryption at each hop requires extra computation for decrypting, aggregating, and then re-encrypting the data, which results in increased complexity, not only in terms of computation but also due to the required sharing of keys. Sharing the same key across various nodes makes the security more vulnerable. An alternative solution to secure the aggregation process is to provide an end-to-end security protocol, wherein intermediary nodes combine the data without decoding the acquired data. As a consequence, the intermediary aggregating nodes do not have to maintain confidential key values, enabling end-to-end security across sensor devices and base stations. This research presents End-to-End Homomorphic Encryption (EEHE)-based safe and secure data gathering in IoT-based Wireless Sensor Networks (WSNs), whereby it protects end-to-end security and enables the use of aggregator functions such as COUNT, SUM and AVERAGE upon encrypted messages. Such an approach could also employ message authentication codes (MAC) to validate data integrity throughout data aggregation and transmission activities, allowing fraudulent content to also be identified as soon as feasible. Additionally, if data are communicated across a WSN, then there is a higher likelihood of a wormhole attack within the data aggregation process. The proposed solution also ensures the early detection of wormhole attacks during data aggregation.


Assuntos
Segurança Computacional , Agregação de Dados , Redes de Comunicação de Computadores , Algoritmos , Confidencialidade
15.
Sensors (Basel) ; 23(11)2023 May 23.
Artigo em Inglês | MEDLINE | ID: mdl-37299731

RESUMO

In recent years, Internet of Things (IoT) advancements have led to the development of vastly improved remote healthcare services. Scalability, high bandwidth, low latency, and low power consumption are all essential features of the applications that make these services possible. An upcoming healthcare system and wireless sensor network that can fulfil these needs is based on fifth-generation network slicing. For better resource management, organizations can implement network slicing, which partitions the physical network into distinct logical slices according to quality of service (QoS) needs. Based on the findings of this research, an IoT-fog-cloud architecture is proposed for use in e-Health services. The framework is made up of three different but interconnected systems: a cloud radio access network, a fog computing system, and a cloud computing system. A queuing network serves as a model for the proposed system. The model's constituent parts are then subjected to analysis. To assess the system's performance, we run a numerical example simulation using Java modelling tools and then analyze the results to identify the key performance parameters. The analytical formulas that were derived ensure the precision of the results. Finally, the results show that the proposed model improves eHealth services' quality of service in an efficient way by selecting the right slice compared to the traditional systems.


Assuntos
Telemedicina , Telemedicina/instrumentação , Telemedicina/métodos , Computação em Nuvem , Internet das Coisas , Redes Neurais de Computação , Simulação por Computador
16.
Sensors (Basel) ; 23(11)2023 May 27.
Artigo em Inglês | MEDLINE | ID: mdl-37299838

RESUMO

The 5G network is designed to serve three main use cases: enhanced mobile broadband (eMBB), massive machine-type communications (mMTC), and ultra-reliable and low-latency communications (uRLLC). There are many new technological enablers, including the cloud radio access network (C-RAN) and network slicing, that can support 5G and meet its requirements. The C-RAN combines both network virtualization and based band unit (BBU) centralization. Using the network slicing concept, the C-RAN BBU pool can be virtually sliced into three different slices. 5G slices require a number of Quality of service (QoS) metrics, such as average response time and resource utilization. In order to enhance the C-RAN BBUs utilization while protecting the minimum QoS of the coexisting three slices, a priority-based resource allocation with queuing model is proposed. The uRLLC is given the highest priority, while eMBB has a higher priority than mMTC services. The proposed model allows the eMBB and mMTC to be queued and the interrupted mMTC to be restored in its queue to increase its chance to reattempt the service later. The proposed model's performance measures are defined and derived using a continuous-time Markov chain (CTMC) model and evaluated and compared using different methodologies. Based on the results, the proposed scheme can increase C-RAN resource utilization without degrading the QoS of the highest-priority uRLLC slice. Additionally, it can reduce the forced termination priority of the interrupted mMTC slice by allowing it to re-join its queue. Therefore, the comparison of the results shows that the proposed scheme outperforms the other states of the art in terms of improving the C-RAN utilization and enhancing the QoS of eMBB and mMTC slices without degrading the QoS of the highest priority use case.


Assuntos
Conscientização , Comunicação , Benchmarking , Cadeias de Markov , Alocação de Recursos
17.
Sci Rep ; 13(1): 9463, 2023 Jun 10.
Artigo em Inglês | MEDLINE | ID: mdl-37301897

RESUMO

The memory-type control charts, such as cumulative sum (CUSUM) and exponentially weighted moving average control chart, are more desirable for detecting a small or moderate shift in the production process of a location parameter. In this article, a novel Bayesian adaptive EWMA (AEWMA) control chat utilizing ranked set sampling (RSS) designs is proposed under two different loss functions, i.e., square error loss function (SELF) and linex loss function (LLF), and with informative prior distribution to monitor the mean shift of the normally distributed process. The extensive Monte Carlo simulation method is used to check the performance of the suggested Bayesian-AEWMA control chart using RSS schemes. The effectiveness of the proposed AEWMA control chart is evaluated through the average run length (ARL) and standard deviation of run length (SDRL). The results indicate that the proposed Bayesian control chart applying RSS schemes is more sensitive in detecting mean shifts than the existing Bayesian AEWAM control chart based on simple random sampling (SRS). Finally, to demonstrate the effectiveness of the proposed Bayesian-AEWMA control chart under different RSS schemes, we present a numerical example involving the hard-bake process in semiconductor fabrication. Our results show that the Bayesian-AEWMA control chart using RSS schemes outperforms the EWMA and AEWMA control charts utilizing the Bayesian approach under simple random sampling in detecting out-of-control signals.


Assuntos
Colina O-Acetiltransferase , Projetos de Pesquisa , Teorema de Bayes , Simulação por Computador , Método de Monte Carlo
18.
Healthcare (Basel) ; 11(1)2023 Jan 01.
Artigo em Inglês | MEDLINE | ID: mdl-36611599

RESUMO

In recent years, the healthcare system, along with the technology that surrounds it, has become a sector in much need of development. It has already improved in a wide range of areas thanks to significant and continuous research into the practical implications of biomedical and telemedicine studies. To ensure the continuing technological improvement of hospitals, physicians now also must properly maintain and manage large volumes of patient data. Transferring large amounts of data such as images to IoT servers based on machine-to-machine communication is difficult and time consuming over MQTT and MLLP protocols, and since IoT brokers only handle a limited number of bytes of data, such protocols can only transfer patient information and other text data. It is more difficult to handle the monitoring of ultrasound, MRI, or CT image data via IoT. To address this problem, this study proposes a model in which the system displays images as well as patient data on an IoT dashboard. A Raspberry Pi processes HL7 messages received from medical devices like an ultrasound machine (ULSM) and extracts only the image data for transfer to an FTP server. The Raspberry Pi 3 (RSPI3) forwards the patient information along with a unique encrypted image data link from the FTP server to the IoT server. We have implemented an authentic and NS3-based simulation environment to monitor real-time ultrasound image data on the IoT server and have analyzed the system performance, which has been impressive. This method will enrich the telemedicine facilities both for patients and physicians by assisting with overall monitoring of data.

19.
Neural Comput Appl ; : 1-14, 2022 Nov 17.
Artigo em Inglês | MEDLINE | ID: mdl-36415284

RESUMO

The COVID-19 pandemic has devastated the entire globe since its first appearance at the end of 2019. Although vaccines are now in production, the number of contaminations remains high, thus increasing the number of specialized personnel that can analyze clinical exams and points out the final diagnosis. Computed tomography and X-ray images are the primary sources for computer-aided COVID-19 diagnosis, but we still lack better interpretability of such automated decision-making mechanisms. This manuscript presents an insightful comparison of three approaches based on explainable artificial intelligence (XAI) to light up interpretability in the context of COVID-19 diagnosis using deep networks: Composite Layer-wise Propagation, Single Taylor Decomposition, and Deep Taylor Decomposition. Two deep networks have been used as the backbones to assess the explanation skills of the XAI approaches mentioned above: VGG11 and VGG16. We hope that such work can be used as a basis for further research on XAI and COVID-19 diagnosis for each approach figures its own positive and negative points.

20.
Sensors (Basel) ; 22(18)2022 Sep 06.
Artigo em Inglês | MEDLINE | ID: mdl-36146089

RESUMO

The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data are not endangered after illegal access by hackers and other unauthorized persons. In parallel, these large volumes of confidential industrial data need to be processed within reasonable time for effective deliverables. Currently, there are many mathematical-based symmetric and asymmetric key cryptographic approaches and identity- and attribute-based public key cryptographic approaches that exist to address the abovementioned concerns and limitations such as computational overheads and taking more time for crucial generation as part of the encipherment and decipherment process for large-scale data privacy and security. In addition, the required key for the encipherment and decipherment process may be generated by a third party which may be compromised and lead to man-in-the-middle attacks, brute force attacks, etc. In parallel, there are some other quantum key distribution approaches available to produce keys for the encipherment and decipherment process without the need for a third party. However, there are still some attacks such as photon number splitting attacks and faked state attacks that may be possible with these existing QKD approaches. The primary motivation of our work is to address and avoid such abovementioned existing problems with better and optimal computational overhead for key generation, encipherment, and the decipherment process compared to the existing conventional models. To overcome the existing problems, we proposed a novel dynamic quantum key distribution (QKD) algorithm for critical public infrastructure, which will secure all cyber-physical systems as part of IIoT. In this paper, we used novel multi-state qubit representation to support enhanced dynamic, chaotic quantum key generation with high efficiency and low computational overhead. Our proposed QKD algorithm can create a chaotic set of qubits that act as a part of session-wise dynamic keys used to encipher the IIoT-based large scales of information for secure communication and distribution of sensitive information.


Assuntos
Segurança Computacional , Privacidade , Algoritmos , Comunicação , Confidencialidade , Humanos
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...