Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 46
Filtrar
1.
J Med Syst ; 48(1): 54, 2024 May 23.
Artigo em Inglês | MEDLINE | ID: mdl-38780839

RESUMO

Artificial Intelligence (AI), particularly AI-Generated Imagery, has the potential to impact medical and patient education. This research explores the use of AI-generated imagery, from text-to-images, in medical education, focusing on congenital heart diseases (CHD). Utilizing ChatGPT's DALL·E 3, the research aims to assess the accuracy and educational value of AI-created images for 20 common CHDs. In this study, we utilized DALL·E 3 to generate a comprehensive set of 110 images, comprising ten images depicting the normal human heart and five images for each of the 20 common CHDs. The generated images were evaluated by a diverse group of 33 healthcare professionals. This cohort included cardiology experts, pediatricians, non-pediatric faculty members, trainees (medical students, interns, pediatric residents), and pediatric nurses. Utilizing a structured framework, these professionals assessed each image for anatomical accuracy, the usefulness of in-picture text, its appeal to medical professionals, and the image's potential applicability in medical presentations. Each item was assessed on a Likert scale of three. The assessments produced a total of 3630 images' assessments. Most AI-generated cardiac images were rated poorly as follows: 80.8% of images were rated as anatomically incorrect or fabricated, 85.2% rated to have incorrect text labels, 78.1% rated as not usable for medical education. The nurses and medical interns were found to have a more positive perception about the AI-generated cardiac images compared to the faculty members, pediatricians, and cardiology experts. Complex congenital anomalies were found to be significantly more predicted to anatomical fabrication compared to simple cardiac anomalies. There were significant challenges identified in image generation. Based on our findings, we recommend a vigilant approach towards the use of AI-generated imagery in medical education at present, underscoring the imperative for thorough validation and the importance of collaboration across disciplines. While we advise against its immediate integration until further validations are conducted, the study advocates for future AI-models to be fine-tuned with accurate medical data, enhancing their reliability and educational utility.


Assuntos
Inteligência Artificial , Cardiopatias Congênitas , Humanos , Cardiopatias Congênitas/diagnóstico por imagem , Cardiopatias Congênitas/diagnóstico
3.
Sensors (Basel) ; 23(11)2023 May 30.
Artigo em Inglês | MEDLINE | ID: mdl-37299924

RESUMO

With the rapid growth in wireless communication and IoT technologies, Radio Frequency Identification (RFID) is applied to the Internet of Vehicles (IoV) to ensure the security of private data and the accuracy of identification and tracking. However, in traffic congestion scenarios, frequent mutual authentication increases the overall computing and communication overhead of the network. For this reason, in this work, we propose a lightweight RFID security fast authentication protocol for traffic congestion scenarios, designing an ownership transfer protocol to transfer access rights to vehicle tags in non-congestion scenarios. The edge server is used for authentication, and the elliptic curve cryptography (ECC) algorithm and the hash function are combined to ensure the security of vehicles' private data. The Scyther tool is used for the formal analysis of the proposed scheme, and this analysis shows that the proposed scheme can resist typical attacks in mobile communication of the IoV. Experimental results show that, compared to other RFID authentication protocols, the calculation and communication overheads of the tags proposed in this work are reduced by 66.35% in congested scenarios and 66.67% in non-congested scenarios, while the lowest are reduced by 32.71% and 50%, respectively. The results of this study demonstrate a significant reduction in the computational and communication overhead of tags while ensuring security.


Assuntos
Dispositivo de Identificação por Radiofrequência , Dispositivo de Identificação por Radiofrequência/métodos , Segurança Computacional , Internet , Algoritmos , Comunicação
4.
Cluster Comput ; 26(1): 119-135, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-35125934

RESUMO

A sentiment analysis system has been proposed in this paper for pain detection using cutting edge techniques in a smart healthcare framework. This proposed system may be eligible for detecting pain sentiments by analyzing facial expressions on the human face. The implementation of the proposed system has been divided into four components. The first component is about detecting the face region from the input image using a tree-structured part model. Statistical and deep learning-based feature analysis has been performed in the second component to extract more valuable and distinctive patterns from the extracted facial region. In the third component, the prediction models based on statistical and deep feature analysis derive scores for the pain intensities (no-pain, low-pain, and high-pain) on the facial region. The scores due to the statistical and deep feature analysis are fused to enhance the performance of the proposed method in the fourth component. We have employed two benchmark facial pain expression databases during experimentation, such as UNBC-McMaster shoulder pain and 2D Face-set database with Pain-expression. The performance concerning these databases has been compared with some existing state-of-the-art methods. These comparisons show the superiority of the proposed system.

5.
Multimed Tools Appl ; 82(14): 21243-21277, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-36276604

RESUMO

In the last few decades, there has been an increase in food safety and traceability issues. To prevent accidents and misconduct, it became essential to establish Food Safety Traceability System (FSTS) to trace the food from producer to consumer. The traceability systems can help track food in supply chains from farms to retail. Numerous technologies such as Radio Frequency Identification (RFID), sensor networks, and data mining have been integrated into traditional food supply chain systems to remove unsafe food products from the chain. But, these are not adequate for the current supply chain market. The emerging technology of blockchain can overcome safety and tracking issues. This can be possible with the help of blockchain features like transparent, decentralized, distributed, and immutable. Most of the previous works missed the discussion of the systematic process and technology involved in implementing the FSTS using blockchain. In this paper, we have discussed an organized state of research of the existing FSTS using blockchain. This survey paper aims to outline a detailed analysis of blockchain technology, FSTS using blockchain, consensus algorithms, security attacks, and solutions. Several survey papers and solutions based on blockchain are included in this research paper. Also, this work discusses some of the open research issues related to FSTS.

8.
IEEE J Biomed Health Inform ; 26(5): 2020-2031, 2022 05.
Artigo em Inglês | MEDLINE | ID: mdl-34990371

RESUMO

The booming Internet of Things makes smart healthcare a reality, while cloud-based medical storage systems solve the problems of large-scale storage and real-time access of medical data. The integrity of medical data outsourced in cloud-based medical storage systems has become crucial since only complete data can make a correct diagnosis, and public auditing protocol is a key technique to solve this problem. To guarantee the integrity of medical data and reduce the burden of the data owner, we propose an efficient privacy-preserving public auditing protocol for the cloud-based medical storage systems, which supports the functions of batch auditing and dynamic update of data. Detailed security analysis shows that our protocol is secure under the defined security model. In addition, we have conducted extensive performance evaluations, and the results indicate that our protocol not only remarkably reduces the computational costs of both the data owner and the third-party auditor (TPA), but also significantly improves the communication efficiency between the TPA and the cloud server. Specifically, compared with other related work, the computational cost of the TPA in our protocol is negligible and the data owner saves more than 2/3 of computational cost. In addition, as the number of challenged blocks increases, our protocol saves nearly 90% of communication overhead between the TPA and the cloud server.


Assuntos
Computação em Nuvem , Serviços Terceirizados , Segurança Computacional , Confidencialidade , Atenção à Saúde , Humanos , Privacidade
10.
PeerJ Comput Sci ; 7: e707, 2021.
Artigo em Inglês | MEDLINE | ID: mdl-34712793

RESUMO

The traditional methods used for the identification of individuals such as personal identification numbers (PINs), identification tags, etc., are vulnerable as they are easily compromised by the hackers. In this paper, we aim to focus on the existing multibiometric systems that use hand based modalities for the identification of individuals. We cover the existing multibiometric systems in the context of various feature extraction schemes, along with an analysis of their performance using one of the performance measures used for biometric systems. Later, we cover the literature on template protection including various cancelable biometrics and biometric cryptosystems and provide a brief comment about the methods used for multibiometric template protection. Finally, we discuss various open issues and challenges faced by researchers and propose some future directions that can enhance the security of multibiometric templates.

11.
Comput Secur ; 111: 102490, 2021 Dec.
Artigo em Inglês | MEDLINE | ID: mdl-34602684

RESUMO

The COVID-19 pandemic has witnessed a huge surge in the number of ransomware attacks. Different institutions such as healthcare, financial, and government have been targeted. There can be numerous reasons for such a sudden rise in attacks, but it appears working remotely in home-based environments (which is less secure compared to traditional institutional networks) could be one of the reasons. Cybercriminals are constantly exploring different approaches like social engineering attacks, such as phishing attacks, to spread ransomware. Hence, in this paper, we explored recent advances in ransomware prevention and detection and highlighted future research challenges and directions. We also carried out an analysis of a few popular ransomware samples and developed our own experimental ransomware, AESthetic, that was able to evade detection against eight popular antivirus programs.

12.
Sustain Cities Soc ; 75: 103311, 2021 Dec.
Artigo em Inglês | MEDLINE | ID: mdl-34540568

RESUMO

COVID-19 is a global infectious disease that can be easily spread by the contiguity of infected people. To prevent from COVID-19 and reduce its impact in sustainable smart cities, the global research communities are working relentlessly by harnessing the emerging technologies to develop the safest diagnosis, evaluation, and treatment procedures, and Internet of Things (IoT) is one of the pioneers among them. IoT can perform a pivotal role to diminish its immense contagious rate by suitable utilization in emerging healthcare IoT applications in sustainable smart cities. Therefore, the focus of this paper is to outline a survey of the emerging healthcare IoT applications practiced in the perspective of COVID-19 pandemic in terms of network architecture security, trustworthiness, authentication, and data preservation followed by identifying existing challenges to set the future research directions. The salient contributions of this work deal with the accomplishment of a detailed and comprehensive literature review of COVID-19 starting from 2019 through 2021 in the context of emerging healthcare IoT technology. In addition, we extend the correlated contributions of this work by highlighting the weak aspects of the existing emerging healthcare IoT applications, security of different network layers and secure communication environment followed by some associated requirements to address these challenges. Moreover, we also identify future research directions in sustainable smart cities for emerging healthcare IoT utilization in the context of COVID-19 with the most productive results and least network implementation costs.

16.
Telecommun Syst ; 76(1): 1-2, 2021.
Artigo em Inglês | MEDLINE | ID: mdl-33456275
17.
Comput Secur ; 97: 101966, 2020 Oct.
Artigo em Inglês | MEDLINE | ID: mdl-32834254

RESUMO

Due to the popularity of blockchain, there have been many proposed applications of blockchain in the healthcare sector, such as electronic health record (EHR) systems. Therefore, in this paper we perform a systematic literature review of blockchain approaches designed for EHR systems, focusing only on the security and privacy aspects. As part of the review, we introduce relevant background knowledge relating to both EHR systems and blockchain, prior to investigating the (potential) applications of blockchain in EHR systems. We also identify a number of research challenges and opportunities.

18.
J Med Syst ; 42(11): 226, 2018 Oct 08.
Artigo em Inglês | MEDLINE | ID: mdl-30298337

RESUMO

The science of solving clinical problems by analyzing images generated in clinical practice is known as medical image analysis. The aim is to extract information in an affective and efficient manner for improved clinical diagnosis. The recent advances in the field of biomedical engineering have made medical image analysis one of the top research and development area. One of the reasons for this advancement is the application of machine learning techniques for the analysis of medical images. Deep learning is successfully used as a tool for machine learning, where a neural network is capable of automatically learning features. This is in contrast to those methods where traditionally hand crafted features are used. The selection and calculation of these features is a challenging task. Among deep learning techniques, deep convolutional networks are actively used for the purpose of medical image analysis. This includes application areas such as segmentation, abnormality detection, disease classification, computer aided diagnosis and retrieval. In this study, a comprehensive review of the current state-of-the-art in medical image analysis using deep convolutional networks is presented. The challenges and potential of these techniques are also highlighted.


Assuntos
Aprendizado Profundo , Diagnóstico por Computador/métodos , Processamento de Imagem Assistida por Computador/métodos , Algoritmos , Armazenamento e Recuperação da Informação , Redes Neurais de Computação
19.
IEEE J Biomed Health Inform ; 22(4): 1310-1322, 2018 07.
Artigo em Inglês | MEDLINE | ID: mdl-28922132

RESUMO

Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health-related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., Android and iOS device) and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and the mobile terminal. The security of the proposed scheme is then demonstrated through the broadly accepted real-or-random model, as well as using the popular formal security verification tool, known as the Automated validation of Internet security protocols and applications. Finally, we present a comparative summary of the proposed scheme in terms of the overheads such as computation and communication costs, security and functionality features of the proposed scheme and related schemes, and also the evaluation findings from the NS2 simulation.


Assuntos
Segurança Computacional , Confidencialidade , Dispositivos Eletrônicos Vestíveis , Redes de Comunicação de Computadores , Registros Eletrônicos de Saúde , Humanos , Telemedicina/métodos , Telemedicina/normas
20.
PLoS One ; 12(2): e0171581, 2017.
Artigo em Inglês | MEDLINE | ID: mdl-28146580

RESUMO

[This corrects the article DOI: 10.1371/journal.pone.0162746.].

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...