Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 6 de 6
Filtrar
Mais filtros











Base de dados
Intervalo de ano de publicação
1.
Sensors (Basel) ; 24(18)2024 Sep 20.
Artigo em Inglês | MEDLINE | ID: mdl-39338847

RESUMO

This paper describes a revolutionary design paradigm for monitoring aquatic life. This unique methodology addresses issues such as limited memory, insufficient bandwidth, and excessive noise levels by combining two approaches to create a comprehensive predictive filtration system, as well as multiple-transfer route analysis. This work focuses on proposing a novel filtration learning approach for underwater sensor nodes. This model was created by merging two adaptive filters, the finite impulse response (FIR) and the adaptive line enhancer (ALE). The FIR integrated filter eliminates unwanted noise from the signal by obtaining a linear response phase and passes the signal without distortion. The goal of the ALE filter is to properly separate the noise signal from the measured signal, resulting in the signal of interest. The cluster head level filters are the adaptive cuckoo filter (ACF) and the Kalman filter. The ACF assesses whether an emitter node is part of a set or not. The Kalman filter improves the estimation of state values for a dynamic underwater sensor networking system. It uses distributed learning long short-term memory (LSTM-CNN) technology to ensure that the anticipated value of the square of the gap between the prediction and the correct state is the smallest possible. Compared to prior methods, our suggested deep filtering-learning model achieved 98.5% of the sensory filtration method in the majority of the obtained data and close to 99.1% of an adaptive prediction method, while also consuming little energy during lengthy monitoring.

2.
Sensors (Basel) ; 24(18)2024 Sep 13.
Artigo em Inglês | MEDLINE | ID: mdl-39338678

RESUMO

The explosive growth of the Internet of Things (IoT) has highlighted the urgent need for strong network security measures. The distinctive difficulties presented by Internet of Things (IoT) environments, such as the wide variety of devices, the intricacy of network traffic, and the requirement for real-time detection capabilities, are difficult for conventional intrusion detection systems (IDS) to adjust to. To address these issues, we propose DCGR_IoT, an innovative intrusion detection system (IDS) based on deep neural learning that is intended to protect bidirectional communication networks in the IoT environment. DCGR_IoT employs advanced techniques to enhance anomaly detection capabilities. Convolutional neural networks (CNN) are used for spatial feature extraction and superfluous data are filtered to improve computing efficiency. Furthermore, complex gated recurrent networks (CGRNs) are used for the temporal feature extraction module, which is utilized by DCGR_IoT. Furthermore, DCGR_IoT harnesses complex gated recurrent networks (CGRNs) to construct multidimensional feature subsets, enabling a more detailed spatial representation of network traffic and facilitating the extraction of critical features that are essential for intrusion detection. The effectiveness of the DCGR_IoT was proven through extensive evaluations of the UNSW-NB15, KDDCup99, and IoT-23 datasets, which resulted in a high detection accuracy of 99.2%. These results demonstrate the DCG potential of DCGR-IoT as an effective solution for defending IoT networks against sophisticated cyber-attacks.

3.
Sensors (Basel) ; 23(22)2023 Nov 08.
Artigo em Inglês | MEDLINE | ID: mdl-38005421

RESUMO

Machine learning, powered by cloud servers, has found application in medical diagnosis, enhancing the capabilities of smart healthcare services. Research literature demonstrates that the support vector machine (SVM) consistently demonstrates remarkable accuracy in medical diagnosis. Nonetheless, safeguarding patients' health data privacy and preserving the intellectual property of diagnosis models is of paramount importance. This concern arises from the common practice of outsourcing these models to third-party cloud servers that may not be entirely trustworthy. Few studies in the literature have delved into addressing these issues within SVM-based diagnosis systems. These studies, however, typically demand substantial communication and computational resources and may fail to conceal classification results and protect model intellectual property. This paper aims to tackle these limitations within a multi-class SVM medical diagnosis system. To achieve this, we have introduced modifications to an inner product encryption cryptosystem and incorporated it into our medical diagnosis framework. Notably, our cryptosystem proves to be more efficient than the Paillier and multi-party computation cryptography methods employed in previous research. Although we focus on a medical application in this paper, our approach can also be used for other applications that need the evaluation of machine learning models in a privacy-preserving way such as electricity theft detection in the smart grid, electric vehicle charging coordination, and vehicular social networks. To assess the performance and security of our approach, we conducted comprehensive analyses and experiments. Our findings demonstrate that our proposed method successfully fulfills our security and privacy objectives while maintaining high classification accuracy and minimizing communication and computational overhead.


Assuntos
Privacidade , Máquina de Vetores de Suporte , Humanos , Segurança Computacional , Confidencialidade , Aprendizado de Máquina
4.
Sensors (Basel) ; 23(20)2023 Oct 20.
Artigo em Inglês | MEDLINE | ID: mdl-37896705

RESUMO

With the increased use of automated systems, the Internet of Things (IoT), and sensors for real-time water quality monitoring, there is a greater requirement for the timely detection of unexpected values. Technical faults can introduce anomalies, and a large incoming data rate might make the manual detection of erroneous data difficult. This research introduces and applies a pioneering technology, Multivariate Multiple Convolutional Networks with Long Short-Term Memory (MCN-LSTM), to real-time water quality monitoring. MCN-LSTM is a cutting-edge deep learning technology designed to address the difficulty of detecting anomalies in complicated time series data, particularly in monitoring water quality in a real-world setting. The growing reliance on automated systems, the Internet of Things (IoT), and sensor networks for continuous water quality monitoring is driving the development and deployment of the MCN-LSTM approach. As these technologies become more widely used, the rapid and precise identification of unexpected or aberrant data points becomes critical. Technical difficulties, inherent noise, and a high data influx pose significant hurdles to manual anomaly detection processes. The MCN-LSTM technique takes advantage of deep learning by integrating Multiple Convolutional Networks and Long Short-Term Memory networks. This combination of approaches offers efficient and effective anomaly detection in multivariate time series data, allowing for identifying and flagging unexpected patterns or values that may signal water quality issues. Water quality data anomalies can have far-reaching repercussions, influencing future analyses and leading to incorrect judgments. Anomaly identification must be precise to avoid inaccurate findings and ensure the integrity of water quality tests. Extensive tests were carried out to validate the MCN-LSTM technique utilizing real-world information obtained from sensors installed in water quality monitoring scenarios. The results of these studies proved MCN-LSTM's outstanding efficacy, with an impressive accuracy rate of 92.3%. This high level of precision demonstrates the technique's capacity to discriminate between normal and abnormal data instances in real time. The MCN-LSTM technique is a big step forward in water quality monitoring. It can improve decision-making processes and reduce adverse outcomes caused by undetected abnormalities. This unique technique has significant promise for defending human health and maintaining the environment in an era of increased reliance on automated monitoring systems and IoT technology by contributing to the safety and sustainability of water supplies.

5.
Sensors (Basel) ; 23(19)2023 Oct 06.
Artigo em Inglês | MEDLINE | ID: mdl-37837101

RESUMO

Alzheimer's disease (AD) is a progressive illness with a slow start that lasts many years; the disease's consequences are devastating to the patient and the patient's family. If detected early, the disease's impact and prognosis can be altered significantly. Blood biosamples are often employed in simple medical testing since they are cost-effective and easy to collect and analyze. This research provides a diagnostic model for Alzheimer's disease based on federated learning (FL) and hardware acceleration using blood biosamples. We used blood biosample datasets provided by the ADNI website to compare and evaluate the performance of our models. FL has been used to train a shared model without sharing local devices' raw data with a central server to preserve privacy. We developed a hardware acceleration approach for building our FL model so that we could speed up the training and testing procedures. The VHDL hardware description language and an Altera 10 GX FPGA are utilized to construct the hardware-accelerator approach. The results of the simulations reveal that the proposed methods achieve accuracy and sensitivity for early detection of 89% and 87%, respectively, while simultaneously requiring less time to train than other algorithms considered to be state-of-the-art. The proposed algorithms have a power consumption ranging from 35 to 39 mW, which qualifies them for use in limited devices. Furthermore, the result shows that the proposed method has a lower inference latency (61 ms) than the existing methods with fewer resources.


Assuntos
Doença de Alzheimer , Humanos , Doença de Alzheimer/diagnóstico , Aprendizagem , Diagnóstico Precoce , Aceleração , Algoritmos
6.
Sensors (Basel) ; 23(12)2023 Jun 19.
Artigo em Inglês | MEDLINE | ID: mdl-37420868

RESUMO

The latest version of ZigBee offers improvements in various aspects, including its low power consumption, flexibility, and cost-effective deployment. However, the challenges persist, as the upgraded protocol continues to suffer from a wide range of security weaknesses. Constrained wireless sensor network devices cannot use standard security protocols such as asymmetric cryptography mechanisms, which are resource-intensive and unsuitable for wireless sensor networks. ZigBee uses the Advanced Encryption Standard (AES), which is the best recommended symmetric key block cipher for securing data of sensitive networks and applications. However, AES is expected to be vulnerable to some attacks in the near future. Moreover, symmetric cryptosystems have key management and authentication issues. To address these concerns in wireless sensor networks, particularly in ZigBee communications, in this paper, we propose a mutual authentication scheme that can dynamically update the secret key value of device-to-trust center (D2TC) and device-to-device (D2D) communications. In addition, the suggested solution improves the cryptographic strength of ZigBee communications by improving the encryption process of a regular AES without the need for asymmetric cryptography. To achieve that, we use a secure one-way hash function operation when D2TC and D2D mutually authenticate each other, along with bitwise exclusive OR operations to enhance cryptography. Once authentication is accomplished, the ZigBee-based participants can mutually agree upon a shared session key and exchange a secure value. This secure value is then integrated with the sensed data from the devices and utilized as input for regular AES encryption. By adopting this technique, the encrypted data gains robust protection against potential cryptanalysis attacks. Finally, a comparative analysis is conducted to illustrate how the proposed scheme effectively maintains efficiency in comparison to eight competitive schemes. This analysis evaluates the scheme's performance across various factors, including security features, communication, and computational cost.


Assuntos
Comunicação , Segurança Computacional , Humanos , Redes de Comunicação de Computadores
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA