378 research outputs found

    Statistical Review of Health Monitoring Models for Real-Time Hospital Scenarios

    Get PDF
    Health Monitoring System Models (HMSMs) need speed, efficiency, and security to work. Cascading components ensure data collection, storage, communication, retrieval, and privacy in these models. Researchers propose many methods to design such models, varying in scalability, multidomain efficiency, flexibility, usage and deployment, computational complexity, cost of deployment, security level, feature usability, and other performance metrics. Thus, HMSM designers struggle to find the best models for their application-specific deployments. They must test and validate different models, which increases design time and cost, affecting deployment feasibility. This article discusses secure HMSMs' application-specific advantages, feature-specific limitations, context-specific nuances, and deployment-specific future research scopes to reduce model selection ambiguity. The models based on the Internet of Things (IoT), Machine Learning Models (MLMs), Blockchain Models, Hashing Methods, Encryption Methods, Distributed Computing Configurations, and Bioinspired Models have better Quality of Service (QoS) and security than their counterparts. Researchers can find application-specific models. This article compares the above models in deployment cost, attack mitigation performance, scalability, computational complexity, and monitoring applicability. This comparative analysis helps readers choose HMSMs for context-specific application deployments. This article also devises performance measuring metrics called Health Monitoring Model Metrics (HM3) to compare the performance of various models based on accuracy, precision, delay, scalability, computational complexity, energy consumption, and security

    A Survey of Using Machine Learning in IoT Security and the Challenges Faced by Researchers

    Get PDF
    The Internet of Things (IoT) has become more popular in the last 15 years as it has significantly improved and gained control in multiple fields. We are nowadays surrounded by billions of IoT devices that directly integrate with our lives, some of them are at the center of our homes, and others control sensitive data such as military fields, healthcare, and datacenters, among others. This popularity makes factories and companies compete to produce and develop many types of those devices without caring about how secure they are. On the other hand, IoT is considered a good insecure environment for cyber thefts. Machine Learning (ML) and Deep Learning (DL) also gained more importance in the last 15 years; they achieved success in the networking security field too. IoT has some similar security requirements such as traditional networks, but with some differences according to its characteristics, some specific security features, and environmental limitations, some differences are made such as low energy resources, limited computational capability, and small memory. These limitations inspire some researchers to search for the perfect and lightweight security ways which strike a balance between performance and security. This survey provides a comprehensive discussion about using machine learning and deep learning in IoT devices within the last five years. It also lists the challenges faced by each model and algorithm. In addition, this survey shows some of the current solutions and other future directions and suggestions. It also focuses on the research that took the IoT environment limitations into consideration

    Systematic Approaches for Telemedicine and Data Coordination for COVID-19 in Baja California, Mexico

    Get PDF
    Conference proceedings info: ICICT 2023: 2023 The 6th International Conference on Information and Computer Technologies Raleigh, HI, United States, March 24-26, 2023 Pages 529-542We provide a model for systematic implementation of telemedicine within a large evaluation center for COVID-19 in the area of Baja California, Mexico. Our model is based on human-centric design factors and cross disciplinary collaborations for scalable data-driven enablement of smartphone, cellular, and video Teleconsul-tation technologies to link hospitals, clinics, and emergency medical services for point-of-care assessments of COVID testing, and for subsequent treatment and quar-antine decisions. A multidisciplinary team was rapidly created, in cooperation with different institutions, including: the Autonomous University of Baja California, the Ministry of Health, the Command, Communication and Computer Control Center of the Ministry of the State of Baja California (C4), Colleges of Medicine, and the College of Psychologists. Our objective is to provide information to the public and to evaluate COVID-19 in real time and to track, regional, municipal, and state-wide data in real time that informs supply chains and resource allocation with the anticipation of a surge in COVID-19 cases. RESUMEN Proporcionamos un modelo para la implementación sistemática de la telemedicina dentro de un gran centro de evaluación de COVID-19 en el área de Baja California, México. Nuestro modelo se basa en factores de diseño centrados en el ser humano y colaboraciones interdisciplinarias para la habilitación escalable basada en datos de tecnologías de teleconsulta de teléfonos inteligentes, celulares y video para vincular hospitales, clínicas y servicios médicos de emergencia para evaluaciones de COVID en el punto de atención. pruebas, y para el tratamiento posterior y decisiones de cuarentena. Rápidamente se creó un equipo multidisciplinario, en cooperación con diferentes instituciones, entre ellas: la Universidad Autónoma de Baja California, la Secretaría de Salud, el Centro de Comando, Comunicaciones y Control Informático. de la Secretaría del Estado de Baja California (C4), Facultades de Medicina y Colegio de Psicólogos. Nuestro objetivo es proporcionar información al público y evaluar COVID-19 en tiempo real y rastrear datos regionales, municipales y estatales en tiempo real que informan las cadenas de suministro y la asignación de recursos con la anticipación de un aumento de COVID-19. 19 casos.ICICT 2023: 2023 The 6th International Conference on Information and Computer Technologieshttps://doi.org/10.1007/978-981-99-3236-

    Raspberry Pi Technology

    Get PDF

    CPS Attacks Mitigation Approaches on Power Electronic Systems with Security Challenges for Smart Grid Applications: A Review

    Get PDF
    This paper presents an inclusive review of the cyber-physical (CP) attacks, vulnerabilities, mitigation approaches on the power electronics and the security challenges for the smart grid applications. With the rapid evolution of the physical systems in the power electronics applications for interfacing renewable energy sources that incorporate with cyber frameworks, the cyber threats have a critical impact on the smart grid performance. Due to the existence of electronic devices in the smart grid applications, which are interconnected through communication networks, these networks may be subjected to severe cyber-attacks by hackers. If this occurs, the digital controllers can be physically isolated from the control loop. Therefore, the cyber-physical systems (CPSs) in the power electronic systems employed in the smart grid need special treatment and security. In this paper, an overview of the power electronics systems security on the networked smart grid from the CP perception, as well as then emphases on prominent CP attack patterns with substantial influence on the power electronics components operation along with analogous defense solutions. Furthermore, appraisal of the CPS threats attacks mitigation approaches, and encounters along the smart grid applications are discussed. Finally, the paper concludes with upcoming trends and challenges in CP security in the smart grid applications

    Applications of artificial intelligence in dentistry: A comprehensive review

    Get PDF
    This work was funded by the Spanish Ministry of Sciences, Innovation and Universities under Projects RTI2018-101674-B-I00 and PGC2018-101904-A-100, University of Granada project A.TEP. 280.UGR18, I+D+I Junta de Andalucia 2020 project P20-00200, and Fapergs/Capes do Brasil grant 19/25510000928-3. Funding for open-access charge: Universidad de Granada/CBUAObjective: To perform a comprehensive review of the use of artificial intelligence (AI) and machine learning (ML) in dentistry, providing the community with a broad insight on the different advances that these technologies and tools have produced, paying special attention to the area of esthetic dentistry and color research. Materials and methods: The comprehensive review was conducted in MEDLINE/ PubMed, Web of Science, and Scopus databases, for papers published in English language in the last 20 years. Results: Out of 3871 eligible papers, 120 were included for final appraisal. Study methodologies included deep learning (DL; n = 76), fuzzy logic (FL; n = 12), and other ML techniques (n = 32), which were mainly applied to disease identification, image segmentation, image correction, and biomimetic color analysis and modeling. Conclusions: The insight provided by the present work has reported outstanding results in the design of high-performance decision support systems for the aforementioned areas. The future of digital dentistry goes through the design of integrated approaches providing personalized treatments to patients. In addition, esthetic dentistry can benefit from those advances by developing models allowing a complete characterization of tooth color, enhancing the accuracy of dental restorations. Clinical significance: The use of AI and ML has an increasing impact on the dental profession and is complementing the development of digital technologies and tools, with a wide application in treatment planning and esthetic dentistry procedures.Spanish Ministry of Sciences, Innovation and Universities RTI2018-101674-B-I00 PGC2018-101904-A-100University of Granada project A.TEP. 280.UGR18Junta de Andalucia P20-00200Fapergs/Capes do Brasil grant 19/25510000928-3Universidad de Granada/CBU

    5G wireless network support using umanned aerial vehicles for rural and low-Income areas

    Get PDF
    >Magister Scientiae - MScThe fifth-generation mobile network (5G) is a new global wireless standard that enables state-of-the-art mobile networks with enhanced cellular broadband services that support a diversity of devices. Even with the current worldwide advanced state of broadband connectivity, most rural and low-income settings lack minimum Internet connectivity because there are no economic incentives from telecommunication providers to deploy wireless communication systems in these areas. Using a team of Unmanned Aerial Vehicles (UAVs) to extend or solely supply the 5G coverage is a great opportunity for these zones to benefit from the advantages promised by this new communication technology. However, the deployment and applications of innovative technology in rural locations need extensive research

    Data ethics : building trust : how digital technologies can serve humanity

    Get PDF
    Data is the magic word of the 21st century. As oil in the 20th century and electricity in the 19th century: For citizens, data means support in daily life in almost all activities, from watch to laptop, from kitchen to car, from mobile phone to politics. For business and politics, data means power, dominance, winning the race. Data can be used for good and bad, for services and hacking, for medicine and arms race. How can we build trust in this complex and ambiguous data world? How can digital technologies serve humanity? The 45 articles in this book represent a broad range of ethical reflections and recommendations in eight sections: a) Values, Trust and Law, b) AI, Robots and Humans, c) Health and Neuroscience, d) Religions for Digital Justice, e) Farming, Business, Finance, f) Security, War, Peace, g) Data Governance, Geopolitics, h) Media, Education, Communication. The authors and institutions come from all continents. The book serves as reading material for teachers, students, policy makers, politicians, business, hospitals, NGOs and religious organisations alike. It is an invitation for dialogue, debate and building trust! The book is a continuation of the volume “Cyber Ethics 4.0” published in 2018 by the same editors

    Smart Healthcare solutions in China and Europe, an international business perspective

    Get PDF
    The thesis is part of the Marie Curie Fellowship project addressing health related challenges with IoT solutions. The author tries to address the challenge for the implementation of telehealth solutions by finding out the demand of the telehealth solution in selected European economies and in China (chapter 1), analyzing the emerging business models for telehealth solution ecosystems in China (chapter 2), how to integrate telehealth solutions with institutional stakeholders (chapter 3) and why are elderly users willing to use telehealth solutions in China. Chapter 1 and chapter 2 form the theoretical background for empirical work in chapter 3 and chapter 4. The thesis addressed four research questions, namely “Which societal and social-economics unmet needs that Internet of Healthcare Things can help to resolve?”, “What are the business model innovation for tech companies in China for the smart health industry?”, “What are the facilitators and hurdles for implementing telehealth solutions”, “Are elderly users willing to use telehealth solutions in China?”. Both qualitative study and quantitative analysis has been made based on data collected by in depth interviews with stakeholders, focus group study work with urban and rural residents in China. The digital platform framework was used in chapter 2 as the theoretical framework where as the stakeholder power mapping framework was used in chapter 3. The discretion choice experiment was used in chapter 4 to design questionnaire study while ordered logit regression was used to analyze the data. Telehealth solutions have great potential to fill in the gap for lack of community healthcare and ensuring health continuity between home care setting, community healthcare and hospitals. There is strong demand for such solutions if they can prove the medical value in managing chronic disease by raising health awareness and lowering health risks by changing the patients’ lifestyle. Analyzing how to realize the value for preventive healthcare by proving the health-economic value of digital health solutions (telehealth solutions) is the focus of research. There remain hurdles to build trust for telehealth solutions and the use of AI in healthcare. Next step of research can also be extended to addressing such challenges by analyzing how to improve the transparency of algorithms by disclosing the data source, and how the algorithms were built. Further research can be done on data interoperability between the EHR systems and telehealth solutions. The medical value of telehealth solutions can improve if doctors could interpret data collected from telehealth solutions; furthermore, if doctors could make diagnosis and provide treatment, adjust healthcare management plans based on such data, telehealth solutions then can be included in insurance packages, making them more accessible
    corecore