10 research outputs found

    Moisture computing-based internet of vehicles (IoV) architecture for smart cities

    Get PDF
    Recently, the concept of combining 'things' on the Internet to provide various services has gained tremendous momentum. Such a concept has also impacted the automotive industry, giving rise to the Internet of Vehicles (IoV). IoV enables Internet connectivity and communication between smart vehicles and other devices on the network. Shifting the computing towards the edge of the network reduces communication delays and provides various services instantly. However, both distributed (i.e., edge computing) and central computing (i.e., cloud computing) architectures suffer from several inherent issues, such as high latency, high infrastructure cost, and performance degradation. We propose a novel concept of computation, which we call moisture computing (MC) to be deployed slightly away from the edge of the network but below the cloud infrastructure. The MC-based IoV architecture can be used to assist smart vehicles in collaborating to solve traffic monitoring, road safety, and management issues. Moreover, the MC can be used to dispatch emergency and roadside assistance in case of incidents and accidents. In contrast to the cloud which covers a broader area, the MC provides smart vehicles with critical information with fewer delays. We argue that the MC can help reduce infrastructure costs efficiently since it requires a medium-scale data center with moderate resources to cover a wider area compared to small-scale data centers in edge computing and large-scale data centers in cloud computing. We performed mathematical analyses to demonstrate that the MC reduces network delays and enhances the response time in contrast to the edge and cloud infrastructure. Moreover, we present a simulation-based implementation to evaluate the computational performance of the MC. Our simulation results show that the total processing time (computation delay and communication delay) is optimized, and delays are minimized in the MC as apposed to the traditional approaches

    The development and validation of a scoring tool to predict the operative duration of elective laparoscopic cholecystectomy

    Get PDF
    Background: The ability to accurately predict operative duration has the potential to optimise theatre efficiency and utilisation, thus reducing costs and increasing staff and patient satisfaction. With laparoscopic cholecystectomy being one of the most commonly performed procedures worldwide, a tool to predict operative duration could be extremely beneficial to healthcare organisations. Methods: Data collected from the CholeS study on patients undergoing cholecystectomy in UK and Irish hospitals between 04/2014 and 05/2014 were used to study operative duration. A multivariable binary logistic regression model was produced in order to identify significant independent predictors of long (> 90 min) operations. The resulting model was converted to a risk score, which was subsequently validated on second cohort of patients using ROC curves. Results: After exclusions, data were available for 7227 patients in the derivation (CholeS) cohort. The median operative duration was 60 min (interquartile range 45–85), with 17.7% of operations lasting longer than 90 min. Ten factors were found to be significant independent predictors of operative durations > 90 min, including ASA, age, previous surgical admissions, BMI, gallbladder wall thickness and CBD diameter. A risk score was then produced from these factors, and applied to a cohort of 2405 patients from a tertiary centre for external validation. This returned an area under the ROC curve of 0.708 (SE = 0.013, p  90 min increasing more than eightfold from 5.1 to 41.8% in the extremes of the score. Conclusion: The scoring tool produced in this study was found to be significantly predictive of long operative durations on validation in an external cohort. As such, the tool may have the potential to enable organisations to better organise theatre lists and deliver greater efficiencies in care

    Tokens Shuffling Approach for Privacy, Security, and Reliability in IoHT under a Pandemic

    No full text
    Privacy and security are unavoidable challenges in the future of smart health services and systems. Several approaches for preserving privacy have been provided in the Internet of Health Things (IoHT) applications. However, with the emergence of COVID-19, the healthcare centers needed to track, collect, and share more critical data such as the location of those infected and monitor social distancing. Unfortunately, the traditional privacy-preserving approaches failed to deal effectively with emergency circumstances. In the proposed research, we introduce a Tokens Shuffling Approach (TSA) to preserve collected data’s privacy, security, and reliability during the pandemic without the need to trust a third party or service providers. TSA depends on a smartphone application and the proposed protocol to collect and share data reliably and safely. TSA depends on a proposed algorithm for swapping the identities temporarily between cooperated users and then hiding the identities by employing fog nodes. The fog node manages the cooperation process between users in a specific area to improve the system’s performance. Finally, TSA uses blockchain to save data reliability, ensure data integrity, and facilitate access. The results prove that TSA performed better than traditional approaches regarding data privacy and the performance level. Further, we noticed that it adapted better during emergency circumstances. Moreover, TSA did not affect the accuracy of the collected data or its related statistics. On the contrary, TSA will not affect the quality of primary healthcare services

    An Innovative Method for Preserving Privacy in Internet of Things

    No full text
    Preservation of privacy of users’ personal data has always been a critical issue to deal with. This issue in the Internet of Things (IoT), which facilitates millions of applications, has become even more challenging. Currently, several approaches and methods are available to safeguard privacy but each of them suffers from one or more anomalies. In particular, Trusted Third-Party approach relies on the trust of a third-party server, Cooperation needs the trust of other peers, Obfuscation is known to return inaccurate results, and Dummy generates too much overhead. Moreover, these and most of the other well-known approaches deal only with specific types of applications linked to the location-based services. In this paper, we present two new methods, namely: Blind Third Party (BTP) and Blind Peers ( B L P ), and combine them to form a new one to be known as the Blind Approach ( B L A ). With the help of simulation results we shall demonstrate the effectiveness and superiority of B L A over the other available methods. The simulation results also exhibit that B L A is free from all the existing problems of the other approaches. However, B L A causes a slight increase in the average (response) time, which we consider to be a minor issue. We shall also discuss the capability and superiority of the Blind Approach in the cases of E-health, Smart Transportation, and Smart Home systems

    A Framework for Crowd Management during COVID-19 with Artificial Intelligence

    No full text
    COVID-19 requires crowded events to enforce restrictions, aimed to contain the spread of the virus. However, we have seen numerous events not observing these restrictions, thus becoming super spreader events. In order to contain the spread of a human to human communicable disease, a number of restrictions, including wearing face masks, maintaining social distancing, and adhering to regular cleaning and sanitization, are critical. These restrictions are absolutely essential for crowded events. Some crowded events can take place spontaneously, such as a political rally or a protest march or a funeral procession. Controlling spontaneous crowded events, like a protest march, political rally, celebration after a sporting event, or concert, can be quite difficult, especially during a crisis like the COVID-19 pandemic. In this article, we review some well-known crowded events that have taken place during the ongoing pandemic. Guided by our review, we provide a framework using machine learning to effectively organize crowded events during the ongoing and for future crises. We also provide details of metrics for the validation of some components in the proposed framework, and an extensive algorithm. Finally, we offer explanations of its various functions of the algorithm. The proposed framework can also be adapted in other crises

    A Framework for Crowd Management during COVID-19 with Artificial Intelligence

    No full text
    COVID-19 requires crowded events to enforce restrictions, aimed to contain the spread of the virus. However, we have seen numerous events not observing these restrictions, thus becoming super spreader events. In order to contain the spread of a human to human communicable disease, a number of restrictions, including wearing face masks, maintaining social distancing, and adhering to regular cleaning and sanitization, are critical. These restrictions are absolutely essential for crowded events. Some crowded events can take place spontaneously, such as a political rally or a protest march or a funeral procession. Controlling spontaneous crowded events, like a protest march, political rally, celebration after a sporting event, or concert, can be quite difficult, especially during a crisis like the COVID-19 pandemic. In this article, we review some well-known crowded events that have taken place during the ongoing pandemic. Guided by our review, we provide a framework using machine learning to effectively organize crowded events during the ongoing and for future crises. We also provide details of metrics for the validation of some components in the proposed framework, and an extensive algorithm. Finally, we offer explanations of its various functions of the algorithm. The proposed framework can also be adapted in other crises

    A Two-Phase Machine Learning Framework for Context-Aware Service Selection to Empower People with Disabilities

    No full text
    The use of software and IoT services is increasing significantly among people with special needs, who constitute 15% of the world’s population. However, selecting appropriate services to create a composite assistive service based on the evolving needs and context of disabled user groups remains a challenging research endeavor. Our research applies a scenario-based design technique to contribute (1) an inclusive disability ontology for assistive service selection, (2) semi-synthetic generated disability service datasets, and (3) a machine learning (ML) framework to choose services adaptively to suit the dynamic requirements of people with special needs. The ML-based selection framework is applied in two complementary phases. In the first phase, all available atomic tasks are assessed to determine their appropriateness to the user goal and profiles, whereas in the subsequent phase, the list of service providers is narrowed by matching their quality-of-service factors against the context and characteristics of the disabled person. Our methodology is centered around a myriad of user characteristics, including their disability profile, preferences, environment, and available IT resources. To this end, we extended the widely used QWS V2.0 and WS-DREAM web services datasets with a fusion of selected accessibility features. To ascertain the validity of our approach, we compared its performance against common multi-criteria decision making (MCDM) models, namely AHP, SAW, PROMETHEE, and TOPSIS. The findings demonstrate superior service selection accuracy in contrast to the other methods while ensuring accessibility requirements are satisfied

    Utilisation of an operative difficulty grading scale for laparoscopic cholecystectomy (vol 33, pg 110, 2019)

    No full text

    Preoperative risk factors for conversion from laparoscopic to open cholecystectomy: a validated risk score derived from a prospective U.K. database of 8820 patients

    No full text
    corecore