Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 5 de 5
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
J Imaging Inform Med ; 2024 Mar 18.
Artigo em Inglês | MEDLINE | ID: mdl-38499705

RESUMO

The incidence of COVID-19, a virus that is responsible for infections in the upper respiratory tract and lungs, witnessed a daily rise in fatalities throughout the pandemic. The timely identification of COVID-19 can contribute to the formulation of strategies to control the disease and the selection of an appropriate treatment pathway. Given the necessity for broader COVID-19 diagnosis, researchers have developed more advanced, rapid, and efficient detection methods. By conducting an initial comparative analysis of various widely used convolutional neural network (CNN) models, we determine an appropriate CNN model. Subsequently, we enhance the chosen CNN model using the feature fusion strategy from multi-modal imaging datasets. Moreover, the Jaya optimization technique is employed to determine the optimal weighting for merging these dual features into a single feature vector. An SVM classifier is employed to categorize samples as either COVID-19 positive or negative. For the purpose of experimentation, a standard dataset consisting of 10,000 samples is used, divided equally between COVID-19 positive and negative classes. The experimental outcomes demonstrate that the proposed fine-tuned system, coupled with optimization techniques for multi-modal data, exhibits superior performance, achieving accuracy rates of 98.7% as compared to the existing state-of-the-art network models.

2.
J Infect Public Health ; 17(4): 559-572, 2024 Apr.
Artigo em Inglês | MEDLINE | ID: mdl-38367570

RESUMO

Internet of Medical Things (IoMT) is an emerging subset of Internet of Things (IoT), often called as IoT in healthcare, refers to medical devices and applications with internet connectivity, is exponentially gaining researchers' attention due to its wide-ranging applicability in biomedical systems for Smart Healthcare systems. IoMT facilitates remote health biomedical system and plays a crucial role within the healthcare industry to enhance precision, reliability, consistency and productivity of electronic devices used for various healthcare purposes. It comprises a conceptualized architecture for providing information retrieval strategies to extract the data from patient records using sensors for biomedical analysis and diagnostics against manifold diseases to provide cost-effective medical solutions, quick hospital treatments, and personalized healthcare. This article provides a comprehensive overview of IoMT with special emphasis on its current and future trends used in biomedical systems, such as deep learning, machine learning, blockchains, artificial intelligence, radio frequency identification, and industry 5.0.


Assuntos
Inteligência Artificial , Internet , Humanos , Reprodutibilidade dos Testes , Instalações de Saúde , Aprendizado de Máquina
3.
J Appl Genet ; 65(1): 83-93, 2024 Feb.
Artigo em Inglês | MEDLINE | ID: mdl-37875608

RESUMO

Melanoma, a highly invasive type of skin cancer that penetrates the entire dermis layer, is associated with increased mortality rates. Excessive exposure of the skin to sunlight, specifically ultraviolet radiation, is the underlying cause of this malignant condition. The appearance of unique skin moles represents a visible clue, referred to as the "ugly duckling" sign, indicating the presence of melanoma and its association with cellular DNA damage. This research aims to explore potential biomarkers derived from microarray data, employing bioinformatics techniques and methodologies, for a thorough investigation of melanoma skin cancer. The microarray dataset for melanoma skin cancer was obtained from the GEO database, and thorough data analysis and quality control measures were performed to identify differentially expressed genes (DEGs). The top 14 highly expressed DEGs were identified, and their gene information and protein sequences were retrieved from the NCBI gene and protein database. These proteins were further analyzed for domain identification and network analysis. Gene expression analysis was conducted to visualize the upregulated and downregulated genes. Additionally, gene metabolite network analysis was carried out to understand the interactions between highly interconnected genes and regulatory transcripts. Molecular docking was employed to investigate the ligand-binding sites and visualize the three-dimensional structure of proteins. Our research unveiled a collection of genes with varying expression levels, some elevated and others reduced, which could function as promising biomarkers closely linked to the development and advancement of melanoma skin cancer. Through molecular docking analysis of the GINS2 protein, we identified two natural compounds (PubChem-156021169 and PubChem-60700) with potential as inhibitors against melanoma. This research has implications for early detection, treatment, and understanding the molecular basis of melanoma.


Assuntos
Melanoma , Neoplasias Cutâneas , Humanos , Melanoma/genética , Melanoma/metabolismo , Simulação de Acoplamento Molecular , Raios Ultravioleta , Neoplasias Cutâneas/genética , Perfilação da Expressão Gênica/métodos , Biomarcadores , Redes Reguladoras de Genes , Biologia Computacional/métodos , Biomarcadores Tumorais/genética , Regulação Neoplásica da Expressão Gênica , Proteínas Cromossômicas não Histona/genética , Proteínas Cromossômicas não Histona/metabolismo
4.
Sensors (Basel) ; 23(6)2023 Mar 20.
Artigo em Inglês | MEDLINE | ID: mdl-36991997

RESUMO

Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to "information security," they are referring to the study and use of methods that make data transfers harder to intercept. When we talk about "information security," this is what we have in mind. Using private keys to encrypt and decode messages is a part of this procedure. Because of its vital role in modern information theory, computer security, and engineering, cryptography is now considered to be a branch of both mathematics and computer science. Because of its mathematical properties, the Galois field may be used to encrypt and decode information, making it relevant to the subject of cryptography. The ability to encrypt and decode information is one such use. In this case, the data may be encoded as a Galois vector, and the scrambling process could include the application of mathematical operations that involve an inverse. While this method is unsafe when used on its own, it forms the foundation for secure symmetric algorithms like AES and DES when combined with other bit shuffling methods. A two-by-two encryption matrix is used to protect the two data streams, each of which contains 25 bits of binary information which is included in the proposed work. Each cell in the matrix represents an irreducible polynomial of degree 6. Fine-tuning the values of the bits that make up each of the two 25-bit binary data streams using the Discrete Cosine Transform (DCT) with the Advanced Encryption Standard (AES) Method yields two polynomials of degree 6. Optimization is carried out using the Black Widow Optimization technique is used to tune the key generation in the cryptographic processing. By doing so, we can produce two polynomials of the same degree, which was our original aim. Users may also use cryptography to look for signs of tampering, such as whether a hacker obtained unauthorized access to a patient's medical records and made any changes to them. Cryptography also allows people to look for signs of tampering with data. Indeed, this is another use of cryptography. It also has the added value of allowing users to check for indications of data manipulation. Users may also positively identify faraway people and objects, which is especially useful for verifying a document's authenticity since it lessens the possibility that it was fabricated. The proposed work achieves higher accuracy of 97.24%, higher throughput of 93.47%, and a minimum decryption time of 0.0047 s.

5.
Sensors (Basel) ; 22(22)2022 Nov 11.
Artigo em Inglês | MEDLINE | ID: mdl-36433326

RESUMO

Modern wheelchairs, with advanced and robotic technologies, could not reach the life of millions of disabled people due to their high costs, technical limitations, and safety issues. This paper proposes a gesture-controlled smart wheelchair system with an IoT-enabled fall detection mechanism to overcome these problems. It can recognize gestures using Convolutional Neural Network (CNN) model along with computer vision algorithms and can control the wheelchair automatically by utilizing these gestures. It maintains the safety of the users by performing fall detection with IoT-based emergency messaging systems. The development cost of the overall system is cheap and is lesser than USD 300. Hence, it is expected that the proposed smart wheelchair should be affordable, safe, and helpful to physically disordered people in their independent mobility.


Assuntos
Pessoas com Deficiência , Cadeiras de Rodas , Humanos , Gestos , Dedos , Redes Neurais de Computação
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...