Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 8 de 8
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Sci Rep ; 13(1): 17787, 2023 10 18.
Artigo em Inglês | MEDLINE | ID: mdl-37853028

RESUMO

An efficient finite difference approach is adopted to analyze the solution of a novel fractional-order mathematical model to control the co-circulation of double strains of dengue and COVID-19. The model is primarily built on a non-integer Caputo fractional derivative. The famous fixed-point theorem developed by Banach is employed to ensure that the solution of the formulated model exists and is ultimately unique. The model is examined for stability around the infection-free equilibrium point analysis, and it was observed that it is stable (asymptotically) when the maximum reproduction number is strictly below unity. Furthermore, global stability analysis of the disease-present equilibrium is conducted via the direct Lyapunov method. The non-standard finite difference (NSFD) approach is adopted to solve the formulated model. Furthermore, numerical experiments on the model reveal that the trajectories of the infected compartments converge to the disease-present equilibrium when the basic reproduction number ([Formula: see text]) is greater than one and disease-free equilibrium when the basic reproduction number is less than one respectively. This convergence is independent of the fractional orders and assumed initial conditions. The paper equally emphasized the outcome of altering the fractional orders, infection and recovery rates on the disease patterns. Similarly, we also remarked the importance of some key control measures to curtail the co-spread of double strains of dengue and COVID-19.


Assuntos
COVID-19 , Dengue , Osteopatia , Humanos , Número Básico de Reprodução , Modelos Teóricos , Dengue/epidemiologia
2.
Sensors (Basel) ; 23(13)2023 Jul 06.
Artigo em Inglês | MEDLINE | ID: mdl-37448038

RESUMO

By definition, the aggregating methodology ensures that transmitted data remain visible in clear text in the aggregated units or nodes. Data transmission without encryption is vulnerable to security issues such as data confidentiality, integrity, authentication and attacks by adversaries. On the other hand, encryption at each hop requires extra computation for decrypting, aggregating, and then re-encrypting the data, which results in increased complexity, not only in terms of computation but also due to the required sharing of keys. Sharing the same key across various nodes makes the security more vulnerable. An alternative solution to secure the aggregation process is to provide an end-to-end security protocol, wherein intermediary nodes combine the data without decoding the acquired data. As a consequence, the intermediary aggregating nodes do not have to maintain confidential key values, enabling end-to-end security across sensor devices and base stations. This research presents End-to-End Homomorphic Encryption (EEHE)-based safe and secure data gathering in IoT-based Wireless Sensor Networks (WSNs), whereby it protects end-to-end security and enables the use of aggregator functions such as COUNT, SUM and AVERAGE upon encrypted messages. Such an approach could also employ message authentication codes (MAC) to validate data integrity throughout data aggregation and transmission activities, allowing fraudulent content to also be identified as soon as feasible. Additionally, if data are communicated across a WSN, then there is a higher likelihood of a wormhole attack within the data aggregation process. The proposed solution also ensures the early detection of wormhole attacks during data aggregation.


Assuntos
Segurança Computacional , Agregação de Dados , Redes de Comunicação de Computadores , Algoritmos , Confidencialidade
3.
Front Public Health ; 10: 862497, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35493354

RESUMO

Background and Objective: Viral hepatitis is a major public health concern on a global scale. It predominantly affects the world's least developed countries. The most endemic regions are resource constrained, with a low human development index. Chronic hepatitis can lead to cirrhosis, liver failure, cancer and eventually death. Early diagnosis and treatment of hepatitis infection can help to reduce disease burden and transmission to those at risk of infection or reinfection. Screening is critical for meeting the WHO's 2030 targets. Consequently, automated systems for the reliable prediction of hepatitis illness. When applied to the prediction of hepatitis using imbalanced datasets from testing, machine learning (ML) classifiers and known methodologies for encoding categorical data have demonstrated a wide range of unexpected results. Early research also made use of an artificial neural network to identify features without first gaining a thorough understanding of the sequence data. Methods: To help in accurate binary classification of diagnosis (survivability or mortality) in patients with severe hepatitis, this paper suggests a deep learning-based decision support system (DSS) that makes use of bidirectional long/short-term memory (BiLSTM). Balanced data was utilized to predict hepatitis using the BiLSTM model. Results: In contrast to previous investigations, the trial results of this suggested model were encouraging: 95.08% accuracy, 94% precision, 93% recall, and a 93% F1-score. Conclusions: In the field of hepatitis detection, the use of a BiLSTM model for classification is better than current methods by a significant margin in terms of improved accuracy.


Assuntos
Algoritmos , Hepatite , Humanos , Aprendizado de Máquina , Redes Neurais de Computação , Saúde Pública
4.
Front Public Health ; 10: 855254, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35321193

RESUMO

Deep neural networks have made tremendous strides in the categorization of facial photos in the last several years. Due to the complexity of features, the enormous size of the picture/frame, and the severe inhomogeneity of image data, efficient face image classification using deep convolutional neural networks remains a challenge. Therefore, as data volumes continue to grow, the effective categorization of face photos in a mobile context utilizing advanced deep learning techniques is becoming increasingly important. In the recent past, some Deep Learning (DL) approaches for learning to identify face images have been designed; many of them use convolutional neural networks (CNNs). To address the problem of face mask recognition in facial images, we propose to use a Depthwise Separable Convolution Neural Network based on MobileNet (DWS-based MobileNet). The proposed network utilizes depth-wise separable convolution layers instead of 2D convolution layers. With limited datasets, the DWS-based MobileNet performs exceptionally well. DWS-based MobileNet decreases the number of trainable parameters while enhancing learning performance by adopting a lightweight network. Our technique outperformed the existing state of the art when tested on benchmark datasets. When compared to Full Convolution MobileNet and baseline methods, the results of this study reveal that adopting Depthwise Separable Convolution-based MobileNet significantly improves performance (Acc. = 93.14, Pre. = 92, recall = 92, F-score = 92).


Assuntos
COVID-19 , Humanos , Redes Neurais de Computação , Pandemias
5.
SN Comput Sci ; 2(5): 384, 2021.
Artigo em Inglês | MEDLINE | ID: mdl-34308367

RESUMO

Novel coronavirus (COVID-19) has become a global problem in recent times due to the rapid spread of this disease. Almost all the countries of the world have been affected by this pandemic that made a major consequence on the medical system and healthcare facilities. The healthcare system is going through a critical time because of the COVID-19 pandemic. Modern technologies such as deep learning, machine learning, and data science are contributing to fight COVID-19. The paper aims to highlight the role of machine learning approaches in this pandemic situation. We searched for the latest literature regarding machine learning approaches for COVID-19 from various sources like IEEE Xplore, PubMed, Google Scholar, Research Gate, and Scopus. Then, we analyzed this literature and described them throughout the study. In this study, we noticed four different applications of machine learning methods to combat COVID-19. These applications are trying to contribute in various aspects like helping physicians to make confident decisions, policymakers to take fruitful decisions, and identifying potentially infected people. The major challenges of existing systems with possible future trends are outlined in this paper. The researchers are coming with various technologies using machine learning techniques to face the COVID-19 pandemic. These techniques are serving the healthcare system in a great deal. We recommend that machine learning can be a useful tool for proper analyzing, screening, tracking, forecasting, and predicting the characteristics and trends of COVID-19.

6.
Sensors (Basel) ; 21(7)2021 Mar 26.
Artigo em Inglês | MEDLINE | ID: mdl-33810212

RESUMO

Since the purchase of Siri by Apple, and its release with the iPhone 4S in 2011, virtual assistants (VAs) have grown in number and popularity. The sophisticated natural language processing and speech recognition employed by VAs enables users to interact with them conversationally, almost as they would with another human. To service user voice requests, VAs transmit large amounts of data to their vendors; these data are processed and stored in the Cloud. The potential data security and privacy issues involved in this process provided the motivation to examine the current state of the art in VA research. In this study, we identify peer-reviewed literature that focuses on security and privacy concerns surrounding these assistants, including current trends in addressing how voice assistants are vulnerable to malicious attacks and worries that the VA is recording without the user's knowledge or consent. The findings show that not only are these worries manifold, but there is a gap in the current state of the art, and no current literature reviews on the topic exist. This review sheds light on future research directions, such as providing solutions to perform voice authentication without an external device, and the compliance of VAs with privacy regulations.

7.
Sensors (Basel) ; 21(5)2021 Mar 04.
Artigo em Inglês | MEDLINE | ID: mdl-33806319

RESUMO

Accurate data and strategic business processes are crucial to all parties in a supply chain system. However, the absence of mutual trust can create a barrier to implementation. Several studies have shown that supply chains face challenges arising from a lack of trust with respect to the sharing of data. How well each party trusts the data they receive can have a profound influence on management decisions. Blockchain technology has been widely used to process cryptocurrency transactions. Recently, it has also proved to be effective in creating trust in the Internet of things (IoT) domain. Blockchain technology can facilitate mutual trust between parties who would otherwise have been doubtful of each other's data, allowing for more effective and secure sharing of data. However, if the blockchain is not IoT-optimized, companies can experience significant delays and the need for extensive computational capacity. Moreover, there are still some limitations regarding the consensus between the nodes in the traditional consensus approaches. Here, we propose an alternative approach to creating trust in supply chains with diverse IoT elements. Our streamlined trust model simplifies data sharing and reduces computational, storage, and latency requirements while increasing the security of the IoT-based supply chain management. We evaluate the suggested model using simulations and highlight its viability.

8.
IEEE Access ; 8: 155961-155970, 2020.
Artigo em Inglês | MEDLINE | ID: mdl-34192115

RESUMO

Online social networks (ONSs) such as Twitter have grown to be very useful tools for the dissemination of information. However, they have also become a fertile ground for the spread of false information, particularly regarding the ongoing coronavirus disease 2019 (COVID-19) pandemic. Best described as an infodemic, there is a great need, now more than ever, for scientific fact-checking and misinformation detection regarding the dangers posed by these tools with regards to COVID-19. In this article, we analyze the credibility of information shared on Twitter pertaining the COVID-19 pandemic. For our analysis, we propose an ensemble-learning-based framework for verifying the credibility of a vast number of tweets. In particular, we carry out analyses of a large dataset of tweets conveying information regarding COVID-19. In our approach, we classify the information into two categories: credible or non-credible. Our classifications of tweet credibility are based on various features, including tweet- and user-level features. We conduct multiple experiments on the collected and labeled dataset. The results obtained with the proposed framework reveal high accuracy in detecting credible and non-credible tweets containing COVID-19 information.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...