Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 11 de 11
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
PeerJ Comput Sci ; 10: e2091, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38983196

RESUMO

With the increasing demand for the use of technology in all matters of daily life and business, the demand has increased dramatically to transform business electronically especially regards COVID-19. The Internet of Things (IoT) has greatly helped in accomplishing tasks. For example, at a high temperature, it would be possible to switch on the air conditioner using a personal mobile device while the person is in the car. The Internet of Things (IoT) eases lots of tasks. A wireless sensor network is an example of IoT. Wireless sensor network (WSN) is an infrastructure less self-configured that can monitor environmental conditions such as vibration, temperature, wind speed, sound, pressure, and vital signs. Thus, WSNs can occur in many fields. Smart homes give a good example of that. The security concern is important, and it is an essential requirement to ensure secure data. Different attacks and privacy concerns can affect the data. Authentication is the first defence line against threats and attacks. This study proposed a new protocol based on using four factors of authentication to improve the security level in WSN to secure communications. The simulation results prove the strength of the proposed method which reflects the importance of the usage of such protocol in authentication areas.

2.
Front Comput Neurosci ; 18: 1307305, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38444404

RESUMO

Introduction: Dementia is one of the major global health issues among the aging population, characterized clinically by a progressive decline in higher cognitive functions. This paper aims to apply various artificial intelligence (AI) approaches to detect patients with mild cognitive impairment (MCI) or dementia accurately. Methods: Quantitative research was conducted to address the objective of this study using randomly selected 343 Saudi patients. The Chi-square test was conducted to determine the association of the patient's cognitive function with various features, including demographical and medical history. Two widely used AI algorithms, logistic regression and support vector machine (SVM), were used for detecting cognitive decline. This study also assessed patients' cognitive function based on gender and developed the predicting models for males and females separately. Results: Fifty four percent of patients have normal cognitive function, 34% have MCI, and 12% have dementia. The prediction accuracies for all the developed models are greater than 71%, indicating good prediction capability. However, the developed SVM models performed the best, with an accuracy of 93.3% for all patients, 94.4% for males only, and 95.5% for females only. The top 10 significant predictors based on the developed SVM model are education, bedtime, taking pills for chronic pain, diabetes, stroke, gender, chronic pains, coronary artery diseases, and wake-up time. Conclusion: The results of this study emphasize the higher accuracy and reliability of the proposed methods in cognitive decline prediction that health practitioners can use for the early detection of dementia. This research can also stipulate substantial direction and supportive intuitions for scholars to enhance their understanding of crucial research, emerging trends, and new developments in future cognitive decline studies.

3.
Heliyon ; 10(3): e25257, 2024 Feb 15.
Artigo em Inglês | MEDLINE | ID: mdl-38327435

RESUMO

Image encryption involves applying cryptographic approaches to convert the content of an image into an illegible or encrypted format, reassuring that illegal users cannot simply interpret or access the actual visual details. Commonly employed models comprise symmetric key algorithms for the encryption of the image data, necessitating a secret key for decryption. This study introduces a new Chaotic Image Encryption Algorithm with an Improved Bonobo Optimizer and DNA Coding (CIEAIBO-DNAC) for enhanced security. The presented CIEAIBO-DNAC technique involves different processes such as initial value generation, substitution, diffusion, and decryption. Primarily, the key is related to the input image pixel values by the MD5 hash function, and the hash value produced by the input image can be utilized as a primary value of the chaotic model to boost key sensitivity. Besides, the CIEAIBO-DNAC technique uses the Improved Bonobo Optimizer (IBO) algorithm for scrambling the pixel position in the block and the scrambling process among the blocks takes place. Moreover, in the diffusion stage, DNA encoding, obfuscation, and decoding process were carried out to attain encrypted images. Extensive experimental evaluations and security analyses are conducted to assess the outcome of the CIEAIBO-DNAC technique. The simulation outcome demonstrates excellent security properties, including resistance against several attacks, ensuring it can be applied to real-time image encryption scenarios.

4.
Sensors (Basel) ; 23(23)2023 Nov 24.
Artigo em Inglês | MEDLINE | ID: mdl-38067756

RESUMO

Cloud computing (CC) is an internet-enabled environment that provides computing services such as networking, databases, and servers to clients and organizations in a cost-effective manner. Despite the benefits rendered by CC, its security remains a prominent concern to overcome. An intrusion detection system (IDS) is generally used to detect both normal and anomalous behavior in networks. The design of IDS using a machine learning (ML) technique comprises a series of methods that can learn patterns from data and forecast the outcomes consequently. In this background, the current study designs a novel multi-objective seagull optimization algorithm with a deep learning-enabled vulnerability detection (MOSOA-DLVD) technique to secure the cloud platform. The MOSOA-DLVD technique uses the feature selection (FS) method and hyperparameter tuning strategy to identify the presence of vulnerabilities or attacks in the cloud infrastructure. Primarily, the FS method is implemented using the MOSOA technique. Furthermore, the MOSOA-DLVD technique uses a deep belief network (DBN) method for intrusion detection and its classification. In order to improve the detection outcomes of the DBN algorithm, the sooty tern optimization algorithm (STOA) is applied for the hyperparameter tuning process. The performance of the proposed MOSOA-DLVD system was validated with extensive simulations upon a benchmark IDS dataset. The improved intrusion detection results of the MOSOA-DLVD approach with a maximum accuracy of 99.34% establish the proficiency of the model compared with recent methods.

5.
Sensors (Basel) ; 23(17)2023 Aug 24.
Artigo em Inglês | MEDLINE | ID: mdl-37687826

RESUMO

Smart grids (SGs) play a vital role in the smart city environment, which exploits digital technology, communication systems, and automation for effectively managing electricity generation, distribution, and consumption. SGs are a fundamental module of smart cities that purpose to leverage technology and data for enhancing the life quality for citizens and optimize resource consumption. The biggest challenge in dealing with SGs and smart cities is the potential for cyberattacks comprising Distributed Denial of Service (DDoS) attacks. DDoS attacks involve overwhelming a system with a huge volume of traffic, causing disruptions and potentially leading to service outages. Mitigating and detecting DDoS attacks in SGs is of great significance to ensuring their stability and reliability. Therefore, this study develops a new White Shark Equilibrium Optimizer with a Hybrid Deep-Learning-based Cybersecurity Solution (WSEO-HDLCS) technique for a Smart City Environment. The goal of the WSEO-HDLCS technique is to recognize the presence of DDoS attacks, in order to ensure cybersecurity. In the presented WSEO-HDLCS technique, the high-dimensionality data problem can be resolved by the use of WSEO-based feature selection (WSEO-FS) approach. In addition, the WSEO-HDLCS technique employs a stacked deep autoencoder (SDAE) model for DDoS attack detection. Moreover, the gravitational search algorithm (GSA) is utilized for the optimal selection of the hyperparameters related to the SDAE model. The simulation outcome of the WSEO-HDLCS system is validated on the CICIDS-2017 dataset. The widespread simulation values highlighted the promising outcome of the WSEO-HDLCS methodology over existing methods.

6.
Sensors (Basel) ; 23(11)2023 May 28.
Artigo em Inglês | MEDLINE | ID: mdl-37299876

RESUMO

Global warming and climate change are responsible for many disasters. Floods pose a serious risk and require immediate management and strategies for optimal response times. Technology can respond in place of humans in emergencies by providing information. As one of these emerging artificial intelligence (AI) technologies, drones are controlled in their amended systems by unmanned aerial vehicles (UAVs). In this study, we propose a secure method of flood detection in Saudi Arabia using a Flood Detection Secure System (FDSS) based on deep active learning (DeepAL) based classification model in federated learning to minimize communication costs and maximize global learning accuracy. We use blockchain-based federated learning and partially homomorphic encryption (PHE) for privacy protection and stochastic gradient descent (SGD) to share optimal solutions. InterPlanetary File System (IPFS) addresses issues with limited block storage and issues posed by high gradients of information transmitted in blockchains. In addition to enhancing security, FDSS can prevent malicious users from compromising or altering data. Utilizing images and IoT data, FDSS can train local models that detect and monitor floods. A homomorphic encryption technique is used to encrypt each locally trained model and gradient to achieve ciphertext-level model aggregation and model filtering, which ensures that the local models can be verified while maintaining privacy. The proposed FDSS enabled us to estimate the flooded areas and track the rapid changes in dam water levels to gauge the flood threat. The proposed methodology is straightforward, easily adaptable, and offers recommendations for Saudi Arabian decision-makers and local administrators to address the growing danger of flooding. This study concludes with a discussion of the proposed method and its challenges in managing floods in remote regions using artificial intelligence and blockchain technology.


Assuntos
Blockchain , Inundações , Humanos , Arábia Saudita , Dispositivos Aéreos não Tripulados , Inteligência Artificial
7.
Sensors (Basel) ; 22(20)2022 Oct 16.
Artigo em Inglês | MEDLINE | ID: mdl-36298206

RESUMO

Multiple Sclerosis (MS) is a disease that impacts the central nervous system (CNS), which can lead to brain, spinal cord, and optic nerve problems. A total of 2.8 million are estimated to suffer from MS. Globally, a new case of MS is reported every five minutes. In this review, we discuss the proposed approaches to diagnosing MS using machine learning (ML) published between 2011 and 2022. Numerous models have been developed using different types of data, including magnetic resonance imaging (MRI) and clinical data. We identified the methods that achieved the best results in diagnosing MS. The most implemented approaches are SVM, RF, and CNN. Moreover, we discussed the challenges and opportunities in MS diagnosis to improve AI systems to enable researchers and practitioners to enhance their approaches and improve the automated diagnosis of MS. The challenges faced by automated MS diagnosis include difficulty distinguishing the disease from other diseases showing similar symptoms, protecting the confidentiality of the patients' data, achieving reliable ML models that are also easily understood by non-experts, and the difficulty of collecting a large reliable dataset. Moreover, we discussed several opportunities in the field such as the implementation of secure platforms, employing better AI solutions, developing better disease prognosis systems, combining more than one data type for better MS prediction and using OCT data for diagnosis, utilizing larger, multi-center datasets to improve the reliability of the developed models, and commercialization.


Assuntos
Aprendizado Profundo , Esclerose Múltipla , Humanos , Esclerose Múltipla/diagnóstico por imagem , Reprodutibilidade dos Testes , Aprendizado de Máquina , Imageamento por Ressonância Magnética
8.
Sensors (Basel) ; 22(18)2022 Sep 09.
Artigo em Inglês | MEDLINE | ID: mdl-36146190

RESUMO

In vehicular ad hoc networks (VANETs), helpful information dissemination establishes the foundation of communication. One of the significant difficulties in developing a successful dissemination system for VANETs is avoiding traffic fatalities. Another essential success metric is the transfer of reliable and secure warning messages through the shortest path, particularly on highways with high mobility. Clustering vehicles is a general solution to these challenges, as it allows warning alerts to be re-broadcast to nearby clusters by fewer vehicles. Hence, trustworthy cluster head (CH) selections are critical to decreasing the number of retransmissions. In this context, we suggest a clustering technique called Optimal Path Routing Protocol for Warning Messages (OPRP) for dissemination in highway VANETs. OPRP relies on mobility measured to reinforce cluster creation, evade transmission overhead, and sustain message authenticity in a high mobility environment. Moreover, we consider communication between the cluster heads to reduce the number of transmissions. Furthermore, the cluster head is chosen using the median technique based on an odd or even number of vehicles for a stable and lengthy cluster life. By altering traffic densities and speeds, OPRP is compared with prominent schemes. Simulation results revealed that OPRP offers enhanced throughput, end-to-end delay, maximizing packet delivery ratio, and message validity.

9.
Sensors (Basel) ; 21(21)2021 Oct 25.
Artigo em Inglês | MEDLINE | ID: mdl-34770375

RESUMO

The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks. Network attacks refer to all types of unauthorized access to a network including any attempts to damage and disrupt the network, often leading to serious consequences. Network attack detection is an active area of research in the community of cybersecurity. In the literature, there are various descriptions of network attack detection systems involving various intelligent-based techniques including machine learning (ML) and deep learning (DL) models. However, although such techniques have proved useful within specific domains, no technique has proved useful in mitigating all kinds of network attacks. This is because some intelligent-based approaches lack essential capabilities that render them reliable systems that are able to confront different types of network attacks. This was the main motivation behind this research, which evaluates contemporary intelligent-based research directions to address the gap that still exists in the field. The main components of any intelligent-based system are the training datasets, the algorithms, and the evaluation metrics; these were the main benchmark criteria used to assess the intelligent-based systems included in this research article. This research provides a rich source of references for scholars seeking to determine their scope of research in this field. Furthermore, although the paper does present a set of suggestions about future inductive directions, it leaves the reader free to derive additional insights about how to develop intelligent-based systems to counter current and future network attacks.


Assuntos
Segurança Computacional , Aprendizado de Máquina , Algoritmos , Previsões , Tecnologia
10.
Artigo em Inglês | MEDLINE | ID: mdl-34198547

RESUMO

The COVID-19 outbreak is currently one of the biggest challenges facing countries around the world. Millions of people have lost their lives due to COVID-19. Therefore, the accurate early detection and identification of severe COVID-19 cases can reduce the mortality rate and the likelihood of further complications. Machine Learning (ML) and Deep Learning (DL) models have been shown to be effective in the detection and diagnosis of several diseases, including COVID-19. This study used ML algorithms, such as Decision Tree (DT), Logistic Regression (LR), Random Forest (RF), Extreme Gradient Boosting (XGBoost), and K-Nearest Neighbor (KNN) and DL model (containing six layers with ReLU and output layer with sigmoid activation), to predict the mortality rate in COVID-19 cases. Models were trained using confirmed COVID-19 patients from 146 countries. Comparative analysis was performed among ML and DL models using a reduced feature set. The best results were achieved using the proposed DL model, with an accuracy of 0.97. Experimental results reveal the significance of the proposed model over the baseline study in the literature with the reduced feature set.


Assuntos
COVID-19 , Algoritmos , Humanos , Modelos Logísticos , Aprendizado de Máquina , SARS-CoV-2
11.
Artigo em Inglês | MEDLINE | ID: mdl-33396713

RESUMO

In March 2020, the World Health Organization (WHO) declared the outbreak of Coronavirus disease 2019 (COVID-19) as a pandemic, which affected all countries worldwide. During the outbreak, public sentiment analyses contributed valuable information toward making appropriate public health responses. This study aims to develop a model that predicts an individual's awareness of the precautionary procedures in five main regions in Saudi Arabia. In this study, a dataset of Arabic COVID-19 related tweets was collected, which fell in the period of the curfew. The dataset was processed, based on several machine learning predictive models: Support Vector Machine (SVM), K-nearest neighbors (KNN), and Naïve Bayes (NB), along with the N-gram feature extraction technique. The results show that applying the SVM classifier along with bigram in Term Frequency-Inverse Document Frequency (TF-IDF) outperformed other models with an accuracy of 85%. The results of awareness prediction showed that the south region observed the highest level of awareness towards COVID-19 containment measures, whereas the middle region was the least. The proposed model can support the medical sectors and decision-makers to decide the appropriate procedures for each region based on their attitudes towards the pandemic.


Assuntos
COVID-19/prevenção & controle , Surtos de Doenças/prevenção & controle , Conhecimentos, Atitudes e Prática em Saúde , Teorema de Bayes , Humanos , Saúde Pública , Arábia Saudita/epidemiologia , Máquina de Vetores de Suporte
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...