Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 10 de 10
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Comput Biol Med ; 167: 107630, 2023 12.
Artigo em Inglês | MEDLINE | ID: mdl-37952305

RESUMO

The Corona virus outbreak sped up the process of digitalizing healthcare. The ubiquity of IoT devices in healthcare has thrust the Healthcare Internet of Things (HIoT) to the forefront as a viable answer to the shortage of healthcare professionals. However, the medical field's ability to utilize this technology may be constrained by rules governing the sharing of data and privacy issues. Furthermore, endangering human life is what happens when a medical machine learning system is tricked or hacked. As a result, robust protections against cyberattacks are essential in the medical sector. This research uses two technologies, namely federated learning and blockchain, to solve these problems. The ultimate goal is to construct a trusted federated learning system on the blockchain that can predict people who are at risk for developing diabetes. The study's findings were deemed satisfactory as it achieved a multilayer perceptron accuracy of 97.11% and an average federated learning accuracy of 93.95%.


Assuntos
Blockchain , Infecções por Coronavirus , Coronavirus , Educação Médica , Humanos , Privacidade
3.
Med Biol Eng Comput ; 60(12): 3475-3496, 2022 Dec.
Artigo em Inglês | MEDLINE | ID: mdl-36205834

RESUMO

The coronavirus infection continues to spread rapidly worldwide, having a devastating impact on the health of the global population. To fight against COVID-19, we propose a novel autonomous decision-making process which combines two modules in order to support the decision-maker: (1) Bayesian Networks method-based data-analysis module, which is used to specify the severity of coronavirus symptoms and classify cases as mild, moderate, and severe, and (2) autonomous decision-making module-based association rules mining method. This method allows the autonomous generation of the adequate decision based on the FP-growth algorithm and the distance between objects. To build the Bayesian Network model, we propose a novel data-based method that enables to effectively learn the network's structure, namely, MIGT-SL algorithm. The experimentations are performed over pre-processed discrete dataset. The proposed algorithm allows to correctly generate 74%, 87.5%, and 100% of the original structure of ALARM, ASIA, and CANCER networks. The proposed Bayesian model performs well in terms of accuracy with 96.15% and 94.77%, respectively, for binary and multi-class classification. The developed decision-making model is evaluated according to its utility in solving the decisional problem, and its accuracy of proposing the adequate decision is about 97.80%.


Assuntos
COVID-19 , Humanos , Teorema de Bayes , Algoritmos
4.
Sensors (Basel) ; 22(3)2022 Feb 01.
Artigo em Inglês | MEDLINE | ID: mdl-35161859

RESUMO

Currently, law enforcement and legal consultants are heavily utilizing social media platforms to easily access data associated with the preparators of illegitimate events. However, accessing this publicly available information for legal use is technically challenging and legally intricate due to heterogeneous and unstructured data and privacy laws, thus generating massive workloads of cognitively demanding cases for investigators. Therefore, it is critical to develop solutions and tools that can assist investigators in their work and decision making. Automating digital forensics is not exclusively a technical problem; the technical issues are always coupled with privacy and legal matters. Here, we introduce a multi-layer automation approach that addresses the automation issues from collection to evidence analysis in online social network forensics. Finally, we propose a set of analysis operators based on domain correlations. These operators can be embedded in software tools to help the investigators draw realistic conclusions. These operators are implemented using Twitter ontology and tested through a case study. This study describes a proof-of-concept approach for forensic automation on online social networks.


Assuntos
Semântica , Mídias Sociais , Automação , Humanos , Privacidade , Rede Social
5.
Sci Rep ; 12(1): 266, 2022 01 07.
Artigo em Inglês | MEDLINE | ID: mdl-34997109

RESUMO

Central management of electronic medical systems faces a major challenge because it requires trust in a single entity that cannot effectively protect files from unauthorized access or attacks. This challenge makes it difficult to provide some services in central electronic medical systems, such as file search and verification, although they are needed. This gap motivated us to develop a system based on blockchain that has several characteristics: decentralization, security, anonymity, immutability, and tamper-proof. The proposed system provides several services: storage, verification, and search. The system consists of a smart contract that connects to a decentralized user application through which users can transact with the system. In addition, the system uses an interplanetary file system (IPFS) and cloud computing to store patients' data and files. Experimental results and system security analysis show that the system performs search and verification tasks securely and quickly through the network.

6.
Biomolecules ; 13(1)2022 12 29.
Artigo em Inglês | MEDLINE | ID: mdl-36671456

RESUMO

Enhancers are sequences with short motifs that exhibit high positional variability and free scattering properties. Identification of these noncoding DNA fragments and their strength are extremely important because they play a key role in controlling gene regulation on a cellular basis. The identification of enhancers is more complex than that of other factors in the genome because they are freely scattered, and their location varies widely. In recent years, bioinformatics tools have enabled significant improvement in identifying this biological difficulty. Cell line-specific screening is not possible using these existing computational methods based solely on DNA sequences. DNA segment chromatin accessibility may provide useful information about its potential function in regulation, thereby identifying regulatory elements based on its chromatin accessibility. In chromatin, the entanglement structure allows positions far apart in the sequence to encounter each other, regardless of their proximity to the gene to be acted upon. Thus, identifying enhancers and assessing their strength is difficult and time-consuming. The goal of our work was to overcome these limitations by presenting a convolutional neural network (CNN) with attention-gated recurrent units (AttGRU) based on Deep Learning. It used a CNN and one-hot coding to build models, primarily to identify enhancers and secondarily to classify their strength. To test the performance of the proposed model, parallels were drawn between enhancer-CNNAttGRU and existing state-of-the-art methods to enable comparisons. The proposed model performed the best for predicting stage one and stage two enhancer sequences, as well as their strengths, in a cross-species analysis, achieving best accuracy values of 87.39% and 84.46%, respectively. Overall, the results showed that the proposed model provided comparable results to state-of-the-art models, highlighting its usefulness.


Assuntos
Cromatina , Elementos Facilitadores Genéticos , Elementos Facilitadores Genéticos/genética , Cromatina/genética , Biologia Computacional/métodos , DNA/genética , DNA/química , Redes Neurais de Computação
7.
Neural Comput Appl ; 33(22): 15091-15118, 2021.
Artigo em Inglês | MEDLINE | ID: mdl-34404964

RESUMO

Specialized data preparation techniques, ranging from data cleaning, outlier detection, missing value imputation, feature selection (FS), amongst others, are procedures required to get the most out of data and, consequently, get the optimal performance of predictive models for classification tasks. FS is a vital and indispensable technique that enables the model to perform faster, eliminate noisy data, remove redundancy, reduce overfitting, improve precision and increase generalization on testing data. While conventional FS techniques have been leveraged for classification tasks in the past few decades, they fail to optimally reduce the high dimensionality of the feature space of texts, thus breeding inefficient predictive models. Emerging technologies such as the metaheuristics and hyper-heuristics optimization methods provide a new paradigm for FS due to their efficiency in improving the accuracy of classification, computational demands, storage, as well as functioning seamlessly in solving complex optimization problems with less time. However, little details are known on best practices for case-to-case usage of emerging FS methods. The literature continues to be engulfed with clear and unclear findings in leveraging effective methods, which, if not performed accurately, alters precision, real-world-use feasibility, and the predictive model's overall performance. This paper reviews the present state of FS with respect to metaheuristics and hyper-heuristic methods. Through a systematic literature review of over 200 articles, we set out the most recent findings and trends to enlighten analysts, practitioners and researchers in the field of data analytics seeking clarity in understanding and implementing effective FS optimization methods for improved text classification tasks.

8.
Comput Math Methods Med ; 2021: 6834800, 2021.
Artigo em Inglês | MEDLINE | ID: mdl-35003323

RESUMO

The healthcare sector is rapidly being transformed to one that operates in new computing environments. With researchers increasingly committed to finding and expanding healthcare solutions to include the Internet of Things (IoT) and edge computing, there is a need to monitor more closely than ever the data being collected, shared, processed, and stored. The advent of cloud, IoT, and edge computing paradigms poses huge risks towards the privacy of data, especially, in the healthcare environment. However, there is a lack of comprehensive research focused on seeking efficient and effective solutions that ensure data privacy in the healthcare domain. The data being collected and processed by healthcare applications is sensitive, and its manipulation by malicious actors can have catastrophic repercussions. This paper discusses the current landscape of privacy-preservation solutions in IoT and edge healthcare applications. It describes the common techniques adopted by researchers to integrate privacy in their healthcare solutions. Furthermore, the paper discusses the limitations of these solutions in terms of their technical complexity, effectiveness, and sustainability. The paper closes with a summary and discussion of the challenges of safeguarding privacy in IoT and edge healthcare solutions which need to be resolved for future applications.


Assuntos
Segurança Computacional , Atenção à Saúde , Internet das Coisas , Privacidade , Computação em Nuvem , Biologia Computacional , Registros Eletrônicos de Saúde , Humanos
9.
Artigo em Inglês | MEDLINE | ID: mdl-24110656

RESUMO

EHR technology has come into widespread use and has attracted attention in healthcare institutions as well as in research. Cloud services are used to build efficient EHR systems and obtain the greatest benefits of EHR implementation. Many issues relating to building an ideal EHR system in the cloud, especially the tradeoff between flexibility and security, have recently surfaced. The privacy of patient records in cloud platforms is still a point of contention. In this research, we are going to improve the management of access control by restricting participants' access through the use of distinct encrypted parameters for each participant in the cloud-based database. Also, we implement and improve an existing secure index search algorithm to enhance the efficiency of information control and flow through a cloud-based EHR system. At the final stage, we contribute to the design of reliable, flexible and secure access control, enabling quick access to EHR information.


Assuntos
Redes de Comunicação de Computadores , Segurança Computacional , Confidencialidade , Registros Eletrônicos de Saúde , Algoritmos , Bases de Dados Factuais , Humanos , Privacidade , Linguagens de Programação , Software
10.
Int Arch Allergy Immunol ; 151(2): 149-54, 2010.
Artigo em Inglês | MEDLINE | ID: mdl-19752569

RESUMO

BACKGROUND: Autosomal dominant hereditary angioedema (HAE) results in episodes of subcutaneous edema in any body part and/or submucosal edema of the upper respiratory or gastrointestinal tracts. This disorder is caused by mutations in the C1NH gene, many of which have been described primarily in European patients. However, the genetic cause of HAE in Middle Eastern Arab patients has not yet been determined. METHODS: Four unrelated Arab families, in which 15 patients were diagnosed with HAE, were studied. DNA from 13 patients was analyzed for mutations in the C1NH gene by DNA sequencing. RESULTS: Three novel and 2 recurrent mutations were identified in the C1NH gene of HAE patients. In family 1, the patient was heterozygous for a novel c.856C>T and a recurrent c.1361T>A missense mutation encoding for p.Arg264Cys and p.Val432Glu, respectively. In patients from family 2, a novel c.509C>T missense mutation encoding for a p.Ser148Phe was identified. In patients from family 3, a novel c.1142delC nonsense mutation encoding for a p.Ala359AlafsX15 was discovered. In family 4, a recurrent c.1397G>A missense mutation encoding for a p.Arg444His was present. CONCLUSION: This is the first ever report of C1NH gene mutations in Middle Eastern Arab patients. Our study suggests that, despite the numerous existing mutations in the C1NH gene, there are novel and recurrent mutations in HAE patients of non-European origin. We conclude that the spectrum of C1NH gene mutations in HAE patients is wider due to the likely presence of novel and recurrent mutations in patients of other ethnicities.


Assuntos
Árabes/genética , Proteínas Inativadoras do Complemento 1/genética , Angioedema Hereditário Tipos I e II/genética , Adolescente , Adulto , Idoso , Criança , Pré-Escolar , Códon sem Sentido/genética , Proteínas Inativadoras do Complemento 1/metabolismo , Proteína Inibidora do Complemento C1 , Complemento C3/metabolismo , Complemento C4/metabolismo , Danazol/uso terapêutico , Feminino , Angioedema Hereditário Tipos I e II/sangue , Angioedema Hereditário Tipos I e II/tratamento farmacológico , Humanos , Masculino , Pessoa de Meia-Idade , Oriente Médio , Mutação de Sentido Incorreto/genética , Linhagem , Adulto Jovem
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...