Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 10 de 10
Filter
Add more filters










Publication year range
1.
Bioengineering (Basel) ; 11(7)2024 Jul 10.
Article in English | MEDLINE | ID: mdl-39061782

ABSTRACT

The application of magnetic resonance imaging (MRI) in the classification of brain tumors is constrained by the complex and time-consuming characteristics of traditional diagnostics procedures, mainly because of the need for a thorough assessment across several regions. Nevertheless, advancements in deep learning (DL) have facilitated the development of an automated system that improves the identification and assessment of medical images, effectively addressing these difficulties. Convolutional neural networks (CNNs) have emerged as steadfast tools for image classification and visual perception. This study introduces an innovative approach that combines CNNs with a hybrid attention mechanism to classify primary brain tumors, including glioma, meningioma, pituitary, and no-tumor cases. The proposed algorithm was rigorously tested with benchmark data from well-documented sources in the literature. It was evaluated alongside established pre-trained models such as Xception, ResNet50V2, Densenet201, ResNet101V2, and DenseNet169. The performance metrics of the proposed method were remarkable, demonstrating classification accuracy of 98.33%, precision and recall of 98.30%, and F1-score of 98.20%. The experimental finding highlights the superior performance of the new approach in identifying the most frequent types of brain tumors. Furthermore, the method shows excellent generalization capabilities, making it an invaluable tool for healthcare in diagnosing brain conditions accurately and efficiently.

2.
Data Brief ; 54: 110461, 2024 Jun.
Article in English | MEDLINE | ID: mdl-38774244

ABSTRACT

The world's need for energy is rising due to factors like population growth, economic expansion, and technological breakthroughs. However, there are major consequences when gas and coal are burnt to meet this surge in energy needs. Although these fossil fuels are still essential for meeting energy demands, their combustion releases a large amount of carbon dioxide and other pollutants into the atmosphere. This significantly jeopardizes community health in addition to exacerbating climate change, thus it is essential need to move swiftly to incorporate renewable energy sources by employing advanced information and communication technologies. However, this change brings up several security issues emphasizing the need for innovative cyber threats detection and prevention solutions. Consequently, this study presents bigdata sets obtained from the solar and wind powered distributed energy systems through the blockchain-based energy networks in the smart grid (SG). A hybrid machine learning (HML) model that combines both the Deep Learning (DL) and Long-Short-Term-Memory (LSTM) models characteristics is developed and applied to identify the unique patterns of Denial of Service (DoS) and Distributed Denial of Service (DDoS) cyberattacks in the power generation, transmission, and distribution processes. The presented big datasets are essential and significantly helps in identifying and classifying cyberattacks, leading to predicting the accurate energy systems behavior in the SG.

3.
Data Brief ; 53: 110212, 2024 Apr.
Article in English | MEDLINE | ID: mdl-38439994

ABSTRACT

Blockchain-based reliable, resilient, and secure communication for Distributed Energy Resources (DERs) is essential in Smart Grid (SG). The Solana blockchain, due to its high stability, scalability, and throughput, along with low latency, is envisioned to enhance the reliability, resilience, and security of DERs in SGs. This paper presents big datasets focusing on SQL Injection, Spoofing, and Man-in-the-Middle (MitM) cyberattacks, which have been collected from Solana blockchain-based Industrial Wireless Sensor Networks (IWSNs) for events monitoring and control in DERs. The datasets provided include both raw (unprocessed) and refined (processed) data, which highlight distinct trends in cyberattacks in DERs. These distinctive patterns demonstrate problems like superfluous mass data generation, transmitting invalid packets, sending deceptive data packets, heavily using network bandwidth, rerouting, causing memory overflow, overheads, and creating high latency. These issues result in ineffective real-time events monitoring and control of DERs in SGs. The thorough nature of these datasets is expected to play a crucial role in identifying and mitigating a wide range of cyberattacks across different smart grid applications.

4.
Healthc Technol Lett ; 10(4): 87-98, 2023 Aug.
Article in English | MEDLINE | ID: mdl-37529409

ABSTRACT

Recently, medical technologies have developed, and the diagnosis of diseases through medical images has become very important. Medical images often pass through the branches of the network from one end to the other. Hence, high-level security is required. Problems arise due to unauthorized use of data in the image. One of the methods used to secure data in the image is encryption, which is one of the most effective techniques in this field. Confusion and diffusion are the two main steps addressed here. The contribution here is the adaptation of the deep neural network by the weight that has the highest impact on the output, whether it is an intermediate output or a semi-final output in additional to a chaotic system that is not detectable using deep neural network algorithm. The colour and grayscale images were used in the proposed method by dividing the images according to the Region of Interest by the deep neural network algorithm. The algorithm was then used to generate random numbers to randomly create a chaotic system based on the replacement of columns and rows, and randomly distribute the pixels on the designated area. The proposed algorithm evaluated in several ways, and compared with the existing methods to prove the worth of the proposed method.

5.
Comput Math Methods Med ; 2022: 9878749, 2022.
Article in English | MEDLINE | ID: mdl-35838368

ABSTRACT

[This corrects the article DOI: 10.1155/2022/3041811.].

6.
Comput Math Methods Med ; 2022: 6927170, 2022.
Article in English | MEDLINE | ID: mdl-35251298

ABSTRACT

In the past few years, big data related to healthcare has become more important, due to the abundance of data, the increasing cost of healthcare, and the privacy of healthcare. Create, analyze, and process large and complex data that cannot be processed by traditional methods. The proposed method is based on classifying data into several classes using the data weight derived from the features extracted from the big data. Three important criteria were used to evaluate the study as well as to benchmark the current study with previous studies using a standard dataset.


Subject(s)
Big Data , Delivery of Health Care/statistics & numerical data , Machine Learning , Algorithms , Computational Biology , Databases, Factual/statistics & numerical data , Electronic Health Records/statistics & numerical data , Humans
7.
Comput Math Methods Med ; 2022: 3041811, 2022.
Article in English | MEDLINE | ID: mdl-38170039

ABSTRACT

We develop effective medical image classification techniques, with an emphasis on histopathology and magnetic resonance imaging (MRI). The trainer utilized the curriculum as a starting point for a set of data and a restricted number of samples, and we used it as a starting point for a set of data. As calibrating a machine learning model is difficult, we used alternative methods as unsupervised feature extracts or weight-conditioning factors for identifying pathological histology pictures. As a result, the pretrained models will be trained on 3-channel RGB pictures, while the MRI sample has more slices. To alter the working model using the MRI data, the convolutional neural network (CNN) must be fine-tuned. Pretrained models are placed and then used as feature snippets. However, there is a scarcity of well-done medical photos, making training machine learning models a difficult endeavor to begin with. In any case, data augmentation aids in the generation of sufficient training samples; however, it is unclear if data augmentation aids in the prediction of unknown data samples. As a result, we fine-tuned machine learning models without using any additional data. Furthermore, rather than utilizing a standard machine learning classifier for the MRI data, we created a unique CNN that uses both 3D shear descriptors and deep features as input. This custom network identifies the MRI sample after processing our representation of the characteristics from beginning to end. On the hidden MRI dataset, our bespoke CNN outperforms traditional machine learning. Our CNN model is less prone to overfitting as a result of this. Furthermore, we have given cutting-edge outcomes employing machine learning.

8.
Sensors (Basel) ; 21(12)2021 Jun 08.
Article in English | MEDLINE | ID: mdl-34201100

ABSTRACT

Recently, green computing has received significant attention for Internet of Things (IoT) environments due to the growing computing demands under tiny sensor enabled smart services. The related literature on green computing majorly focuses on a cover set approach that works efficiently for target coverage, but it is not applicable in case of area coverage. In this paper, we present a new variant of a cover set approach called a grouping and sponsoring aware IoT framework (GS-IoT) that is suitable for area coverage. We achieve non-overlapping coverage for an entire sensing region employing sectorial sensing. Non-overlapping coverage not only guarantees a sufficiently good coverage in case of large number of sensors deployed randomly, but also maximizes the life span of the whole network with appropriate scheduling of sensors. A deployment model for distribution of sensors is developed to ensure a minimum threshold density of sensors in the sensing region. In particular, a fast converging grouping (FCG) algorithm is developed to group sensors in order to ensure minimal overlapping. A sponsoring aware sectorial coverage (SSC) algorithm is developed to set off redundant sensors and to balance the overall network energy consumption. GS-IoT framework effectively combines both the algorithms for smart services. The simulation experimental results attest to the benefit of the proposed framework as compared to the state-of-the-art techniques in terms of various metrics for smart IoT environments including rate of overlapping, response time, coverage, active sensors, and life span of the overall network.


Subject(s)
Internet of Things , Algorithms , Computer Simulation , Confidentiality
9.
Sensors (Basel) ; 21(5)2021 Mar 08.
Article in English | MEDLINE | ID: mdl-33800227

ABSTRACT

Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still in its infancy. Most postquantum based cryptosystems have longer keys and signature sizes and require more computations that span several orders of magnitude in energy consumption and computation time, hence the sizes of the keys and signature are considered as another aspect of security by green design. To address these issues, the security solutions should migrate to the advanced and potent methods for protection against quantum attacks and offer energy efficient and faster cryptocomputations. In this context, a novel security framework Lightweight Postquantum ID-based Signature (LPQS) for secure communication in the IoE environment is presented. The proposed LPQS framework incorporates a supersingular isogeny curve to present a digital signature with small key sizes which is quantum-resistant. To reduce the size of the keys, compressed curves are used and the validation of the signature depends on the commutative property of the curves. The unforgeability of LPQS under an adaptively chosen message attack is proved. Security analysis and the experimental validation of LPQS are performed under a realistic software simulation environment to assess its lightweight performance considering embedded nodes. It is evident that the size of keys and the signature of LPQS is smaller than that of existing signature-based postquantum security techniques for IoE. It is robust in the postquantum environment and efficient in terms of energy and computations.

10.
Sensors (Basel) ; 20(24)2020 Dec 18.
Article in English | MEDLINE | ID: mdl-33353003

ABSTRACT

In this paper, we propose a non-localization routing protocol for underwater wireless sensor networks (UWSNs), namely, the triangle metric based multi-layered routing protocol (TM2RP). The main idea of the proposed TM2RP is to utilize supernodes along with depth information and residual energy to balance the energy consumption between sensors. Moreover, TM2RP is the first multi-layered and multi-metric pressure routing protocol that considers link quality with residual energy to improve the selection of next forwarding nodes with more reliable and energy-efficient links. The aqua-sim package based on the ns-2 simulator was used to evaluate the performance of the proposed TM2RP. The obtained results were compared to other similar methods such as depth based routing (DBR) and multi-layered routing protocol (MRP). Simulation results showed that the proposed protocol (TM2RP) obtained better outcomes in terms of energy consumption, network lifetime, packet delivery ratio, and end-to-end delay.

SELECTION OF CITATIONS
SEARCH DETAIL
...