Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 5 de 5
Filter
Add more filters










Database
Language
Publication year range
1.
Sensors (Basel) ; 22(7)2022 Mar 25.
Article in English | MEDLINE | ID: mdl-35408144

ABSTRACT

Autonomous vehicles offer various advantages to both vehicle owners and automobile companies. However, despite the advantages, there are various risks associated with these vehicles. These vehicles interact with each other by forming a vehicular network, also known as VANET, in a centralized manner. This centralized network is vulnerable to cyber-attacks which can cause data loss, resulting in road accidents. Thus, to prevent the vehicular network from being attacked and to prevent the privacy of the data, key management is used. However, key management alone over a centralized network is not effective in ensuring data integrity in a vehicular network. To resolve this issue, various studies have introduced a blockchain-based approach and enabled key management over a decentralized network. This technique is also found effective in ensuring the privacy of all the stakeholders involved in a vehicular network. Furthermore, a blockchain-based key management system can also help in storing a large amount of data over a distributed network, which can encourage a faster exchange of information between vehicles in a network. However, there are certain limitations of blockchain technology that may affect the efficient working of autonomous vehicles. Most of the existing blockchain-based systems are implemented over Ethereum or Bitcoin. The transaction-processing capability of these blockchains is in the range of 5 to 20 transactions per second, whereas hashgraphs are capable of processing thousands of transactions per second as the data are processed exponentially. Furthermore, a hashgraph prevents the user from altering the order of the transactions being processed, and they do not need high computational powers to operate, which may help in reducing the overall cost of the system. Due to the advantages offered by a hashgraph, an advanced key management framework based on a hashgraph for secure communication between the vehicles is suggested in this paper. The framework is developed using the concept of Leaving of Vehicles based on a Logical Key Hierarchy (LKH) and Batch Rekeying. The system is tested and compared with other closely related systems on the basis of the transaction compilation time and change in traffic rates.


Subject(s)
Autonomous Vehicles , Blockchain , Privacy , Technology
2.
JAMIA Open ; 4(4): ooab099, 2021 Oct.
Article in English | MEDLINE | ID: mdl-34888492

ABSTRACT

OBJECTIVES: Although there exists a variety of anonymous survey software, this study aimed to develop an improved system that incentivizes responses and proactively detects fraud attempts while maintaining anonymity. MATERIALS AND METHODS: The Anonymous Incentive Method (AIM) was designed to utilize a Secure Hash Algorithm, which deterministically assigned anonymous identifiers to respondents. An anonymous raffle system was established to randomly select participants for a reward. Since the system provided participants with their unique identifiers and passwords upon survey completion, participants were able to return to the survey website, input their passwords, and receive their rewards at a later date. As a case study, the validity of this novel approach was assessed in an ongoing study on vaping in high school friendship networks. RESULTS: AIM successfully assigned irreversible, deterministic identifiers to survey respondents. Additionally, the particular case study used to assess the efficacy of AIM verified the deterministic aspect of the identifiers. DISCUSSION: Potential limitations, such as scammers changing the entry used to create the identifier, are acknowledged and given practical mitigation protocols. Although AIM exhibits particular usefulness for network studies, it is compatible with a wide range of applications to help preempt survey fraud and expedite study approval. CONCLUSION: The improvements introduced by AIM are 2-fold: (1) duplicate responses can be filtered out while maintaining anonymity and (2) the requirement for the participant to keep their identifier and password for some time before returning to the survey website to claim a reward ensures that rewards only go to actual respondents.

3.
J Healthc Eng ; 2021: 6668985, 2021.
Article in English | MEDLINE | ID: mdl-34326978

ABSTRACT

Early diagnosis of pandemic diseases such as COVID-19 can prove beneficial in dealing with difficult situations and helping radiologists and other experts manage staffing more effectively. The application of deep learning techniques for genetics, microscopy, and drug discovery has created a global impact. It can enhance and speed up the process of medical research and development of vaccines, which is required for pandemics such as COVID-19. However, current drugs such as remdesivir and clinical trials of other chemical compounds have not shown many impressive results. Therefore, it can take more time to provide effective treatment or drugs. In this paper, a deep learning approach based on logistic regression, SVM, Random Forest, and QSAR modeling is suggested. QSAR modeling is done to find the drug targets with protein interaction along with the calculation of binding affinities. Then deep learning models were used for training the molecular descriptor dataset for the robust discovery of drugs and feature extraction for combating COVID-19. Results have shown more significant binding affinities (greater than -18) for many molecules that can be used to block the multiplication of SARS-CoV-2, responsible for COVID-19.


Subject(s)
COVID-19 Drug Treatment , Computer Simulation , Drug Discovery/methods , SARS-CoV-2/drug effects , Algorithms , Deep Learning , Humans , Pandemics , Pharmaceutical Preparations
4.
Nat Genet ; 53(4): 529-538, 2021 04.
Article in English | MEDLINE | ID: mdl-33753930

ABSTRACT

Exciting therapeutic targets are emerging from CRISPR-based screens of high mutational-burden adult cancers. A key question, however, is whether functional genomic approaches will yield new targets in pediatric cancers, known for remarkably few mutations, which often encode proteins considered challenging drug targets. To address this, we created a first-generation pediatric cancer dependency map representing 13 pediatric solid and brain tumor types. Eighty-two pediatric cancer cell lines were subjected to genome-scale CRISPR-Cas9 loss-of-function screening to identify genes required for cell survival. In contrast to the finding that pediatric cancers harbor fewer somatic mutations, we found a similar complexity of genetic dependencies in pediatric cancer cell lines compared to that in adult models. Findings from the pediatric cancer dependency map provide preclinical support for ongoing precision medicine clinical trials. The vulnerabilities observed in pediatric cancers were often distinct from those in adult cancer, indicating that repurposing adult oncology drugs will be insufficient to address childhood cancers.


Subject(s)
Chromosome Mapping/methods , Gene Expression Regulation, Neoplastic , Genome, Human , Mutation , Neoplasm Proteins/genetics , Neoplasms/genetics , Adult , CRISPR-Associated Protein 9/genetics , CRISPR-Associated Protein 9/metabolism , CRISPR-Cas Systems , Cell Line, Tumor , Child , Clustered Regularly Interspaced Short Palindromic Repeats , Gene Editing , Gene Expression Profiling , Genetic Predisposition to Disease , Humans , Neoplasm Proteins/classification , Neoplasm Proteins/metabolism , Neoplasms/metabolism , Neoplasms/pathology , RNA, Guide, Kinetoplastida/genetics , RNA, Guide, Kinetoplastida/metabolism
5.
Sensors (Basel) ; 20(11)2020 Jun 10.
Article in English | MEDLINE | ID: mdl-32531911

ABSTRACT

The Internet of things (IoT), the Internet of vehicles, and blockchain technology have become very popular these days because of their versatility. Road traffic, which is increasing day by day, is causing more and more deaths worldwide. The world needs a product that would reduce the number of road accidents. This paper suggests combining IoT and blockchain technology to mitigate road hazards. The new intelligent transportation system technologies and the subsequent emergence of 5G technologies will be a blessing, delivering the necessary speed to ensure both safety and quality of service (QoS). Hashgraph technology, a distributed ledger technology is used to create communication networks between the different vehicles and other relevant parameters. Scheduling the requests according to the priorities for ensuring better QoS quotient can be effectively done using hashgraph. We demonstrated how the hashgraph outstrips other equivalents platforms. The proposed model was simulated using OMNeT++ with proper design and network description files. A hardware implementation of the proposed model was also done. Messages were transferred between the vehicles and prioritized using a hashgraph. This paper proposes an effective model in reducing the accidents in terms of parameters like speed, security, stability, and fairness.

SELECTION OF CITATIONS
SEARCH DETAIL
...