53 research outputs found
Blockchain-IoT peer device storage optimization using an advanced time-variant multi-objective particle swarm optimization algorithm
The integration of Internet of Things devices onto the Blockchain implies an increase in the transactions that occur on the Blockchain, thus increasing the storage requirements.
A solution approach is to leverage cloud resources for storing blocks within the chain. The paper, therefore, proposes two solutions to this problem. The first being an improved hybrid architecture design which uses containerization to create a side chain on a fog node for the devices connected to it and an Advanced Time‑variant Multi‑objective Particle Swarm Optimization Algorithm (AT‑MOPSO) for determining the optimal number of blocks that should be transferred to the cloud for storage. This algorithm uses time‑variant weights for the velocity of the particle swarm optimization and the non‑dominated sorting and mutation schemes from NSGA‑III. The proposed algorithm was compared with results from the original MOPSO algorithm, the Strength Pareto Evolutionary Algorithm (SPEA‑II), and the Pareto Envelope‑based Selection Algorithm with region‑based selection (PESA‑II), and NSGA‑III. The proposed AT‑MOPSO showed better results than the aforementioned MOPSO algorithms in cloud storage cost and query probability optimization. Importantly, AT‑MOPSO achieved 52% energy efficiency compared to NSGA‑III.
To show how this algorithm can be applied to a real‑world Blockchain system, the BISS industrial Blockchain architecture was adapted and modified to show how the AT‑MOPSO can be used with existing Blockchain systems and the benefits it provides
Adaptive Storage Optimization Scheme for Blockchain-IIoT Applications Using Deep Reinforcement Learning
Blockchain-IIoT integration into industrial processes promises greater security, transparency, and traceability. However, this advancement faces significant storage and scalability issues with existing blockchain technologies. Each peer in the blockchain network maintains a full copy of the ledger which is updated through consensus. This full replication approach places a burden on the storage space of the peers and would quickly outstrip the storage capacity of resource-constrained IIoT devices. Various solutions utilizing compression, summarization or different storage schemes have been proposed in literature. The use of cloud resources for blockchain storage has been extensively studied in recent years. Nonetheless, block selection remains a substantial challenge associated with cloud resources and blockchain integration. This paper proposes a deep reinforcement learning (DRL) approach as an alternative to solving the block selection problem, which involves identifying the blocks to be transferred to the cloud. We propose a DRL approach to solve our problem by converting the multi-objective optimization of block selection into a Markov decision process (MDP). We design a simulated blockchain environment for training and testing our proposed DRL approach. We utilize two DRL algorithms, Advantage Actor-Critic (A2C), and Proximal Policy Optimization (PPO) to solve the block selection problem and analyze their performance gains. PPO and A2C achieve 47.8% and 42.9% storage reduction on the blockchain peer compared to the full replication approach of conventional blockchain systems. The slowest DRL algorithm, A2C, achieves a run-time 7.2 times shorter than the benchmark evolutionary algorithms used in earlier works, which validates the gains introduced by the DRL algorithms. The simulation results further show that our DRL algorithms provide an adaptive and dynamic solution to the time-sensitive blockchain-IIoT environment
Interobserver agreement in interpretation of chest radiographs for pediatric community acquired pneumonia: Findings of the pedCAPNETZ-cohort.
Although chest radiograph (CXR) is commonly used in diagnosing pediatric community acquired pneumonia (pCAP), limited data on interobserver agreement among radiologists exist. PedCAPNETZ is a prospective, observational, and multicenter study on pCAP. N = 233 CXR from patients with clinical diagnosis of pCAP were retrieved and n = 12 CXR without pathological findings were added. All CXR were interpreted by a radiologist at the site of recruitment and by two external, blinded pediatric radiologists. To evaluate interobserver agreement, the reporting of presence or absence of pCAP in CXR was analyzed, and prevalence and bias-adjusted kappa (PABAK) statistical testing was applied. Overall, n = 190 (82%) of CXR were confirmed as pCAP by two external pediatric radiologists. Compared with patients with pCAP negative CXR, patients with CXR-confirmed pCAP displayed higher C-reactive protein levels and a longer duration of symptoms before enrollment (p < .007). Further parameters, that is, age, respiratory rate, and oxygen saturation showed no significant difference. The interobserver agreement between the onsite radiologists and each of the two independent pediatric radiologists for the presence of pCAP was poor to fair (69%; PABAK = 0.39% and 76%; PABAK = 0.53, respectively). The concordance between the external radiologists was fair (81%; PABAK = 0.62). With regard to typical CXR findings for pCAP, chance corrected interrater agreement was highest for pleural effusions, infiltrates, and consolidations and lowest for interstitial patterns and peribronchial thickening. Our data show a poor interobserver agreement in the CXR-based diagnosis of pCAP and emphasized the need for harmonized interpretation standards
Community-level prevalence of epilepsy and of neurocysticercosis among people with epilepsy in the Balaka district of Malawi: A cross-sectional study
Background
Epilepsy and neurocysticercosis (NCC) prevalence estimates in sub-Saharan Africa are still scarce but show important variation due to the population studied and different screening and diagnosis strategies used. The aims of this study were to estimate the prevalence of epileptic seizures and epilepsy in the sampled population, and the proportion of NCC among people with epilepsy (PWE) in a large cross-sectional study in a rural district of southern Malawi.
Methods
We conducted a community-based door-to-door screening study for epileptic seizures in Balaka, Malawi between October and December 2012. Past epileptic seizures were reported through a 15-item questionnaire answered by at least one person per household generating five major criteria. People who screened positive were further examined by a neurologist to establish diagnosis. Patients diagnosed with epilepsy were examined and offered Taenia solium cyst antigen and antibody serological tests, and a CT scan for the diagnosis of NCC.
Results
In total, screening information on 69,595 individuals was obtained for lifetime occurrence of epileptic seizures. 3,100 (4.5%) participants screened positive, of whom 1,913 (62%) could be followed-up and underwent further assessment. Lifetime prevalence was 3.0% (95% Bayesian credible interval [CI] 2.8 to 3.1%) and 1.2% (95%BCI 0.9 to 1.6%) for epileptic seizures and epilepsy, respectively. NCC prevalence among PWE was estimated to be 4.4% (95%BCI 0.8 to 8.5%). A diagnosis of epilepsy was ultimately reached for 455 participants.
Conclusion
The results of this large community-based study contribute to the evaluation and understanding of the burden of epilepsy in the population and of NCC among PWE in sub-Saharan Africa
Quantitative EEG may predict weaning failure in ventilated patients on the neurological intensive care unit
Neurocritical patients suffer from a substantial risk of extubation failure. The aim of this prospective study was to analyze if quantitative EEG (qEEG) monitoring is able to predict successful extubation in these patients. We analyzed EEG-monitoring for at least six hours before extubation in patients receiving mechanical ventilation (MV) on our neurological intensive care unit (NICU) between November 2017 and May 2019. Patients were divided in 2 groups: patients with successful extubation (SE) versus patients with complications after MV withdrawal (failed extubation; FE), including reintubation, need for non-invasive ventilation (NIV) or death. Bipolar six channel EEG was applied. Unselected raw EEG signal underwent automated artefact rejection and Short Time Fast Fourier Transformation. The following relative proportions of global EEG spectrum were analyzed: relative beta (RB), alpha (RA), theta (RT), delta (RD) as well as the alpha delta ratio (ADR). Coefficient of variation (CV) was calculated as a measure of fluctuations in the different power bands. Mann–Whitney U test and logistic regression were applied to analyze group differences. 52 patients were included (26 male, mean age 65 ± 17 years, diagnosis: 40% seizures/status epilepticus, 37% ischemia, 13% intracranial hemorrhage, 10% others). Successful extubation was possible in 40 patients (77%), reintubation was necessary in 6 patients (12%), 5 patients (10%) required NIV, one patient died. In contrast to FE patients, SE patients showed more stable EEG power values (lower CV) considering all EEG channels (RB: p < 0.0005; RA: p = 0.045; RT: p = 0.045) with RB as an independent predictor of weaning success in logistic regression (p = 0.004). The proportion of the EEG frequency bands (RB, RA RT, RD) of the entire EEG power spectrum was not significantly different between SE and FE patients. Higher fluctuations in qEEG frequency bands, reflecting greater fluctuation in alertness, during the hours before cessation of MV were associated with a higher rate of complications after extubation in this cohort. The stability of qEEG power values may represent a non-invasive, examiner-independent parameter to facilitate weaning assessment in neurocritical patients
A method for implementation of machine learning solutions for predictive maintenance in small and medium sized enterprises
In recent years, machine learning algorithms have made a huge development in performance and applicability in industry and especially maintenance. Their application enables predictive maintenance and thus offers efficiency increases. However, a successful implementation of such solutions still requires high effort in data preparation to obtain the right information, interdisciplinarity in teams as well as a good communication to employees. Here, small and medium sized enterprises (SME) often lack in experience, competence and capacity. This paper presents a systematic and practice-oriented method for an implementation of machine learning solutions for predictive maintenance in SME, which has already been validated
Schloss: Blockchain-Based System Architecture for Secure Industrial IoT
Industrial companies can use blockchain to assist them in resolving their trust and security issues. In this research, we provide a fully distributed blockchain-based architecture for industrial IoT, relying on trust management and reputation to enhance nodes’ trustworthiness. The purpose of this contribution is to introduce our system architecture to show how to secure network access for users with dynamic authorization management. All decisions in the system are made by trustful nodes’ consensus and are fully distributed. The remarkable feature of this system architecture is that the influence of the nodes’ power is lowered depending on their Proof of Work (PoW) and Proof of Stake (PoS), and the nodes’ significance and authority is determined by their behavior in the network. This impact is based on game theory and an incentive mechanism for reputation between nodes. This system design can be used on legacy machines, which means that security and distributed systems can be put in place at a low cost on industrial systems. While there are no numerical results yet, this work, based on the open questions regarding the majority problem and the proposed solutions based on a game-theoretic mechanism and a trust management system, points to what and how industrial IoT and existing blockchain frameworks that are focusing only on the power of PoW and PoS can be secured more effectively
Schloss: Blockchain-Based System Architecture for Secure Industrial IoT
Industrial companies can use blockchain to assist them in resolving their trust and security issues. In this research, we provide a fully distributed blockchain-based architecture for industrial IoT, relying on trust management and reputation to enhance nodes’ trustworthiness. The purpose of this contribution is to introduce our system architecture to show how to secure network access for users with dynamic authorization management. All decisions in the system are made by trustful nodes’ consensus and are fully distributed. The remarkable feature of this system architecture is that the influence of the nodes’ power is lowered depending on their Proof of Work (PoW) and Proof of Stake (PoS), and the nodes’ significance and authority is determined by their behavior in the network. This impact is based on game theory and an incentive mechanism for reputation between nodes. This system design can be used on legacy machines, which means that security and distributed systems can be put in place at a low cost on industrial systems. While there are no numerical results yet, this work, based on the open questions regarding the majority problem and the proposed solutions based on a game-theoretic mechanism and a trust management system, points to what and how industrial IoT and existing blockchain frameworks that are focusing only on the power of PoW and PoS can be secured more effectively
Trust Management System for Hybrid Industrial Blockchains
As industrial networks continue to expand and connect more devices and users, they face growing security challenges such as unauthorized access and data breaches. This paper delves into the crucial role of security and trust in industrial networks and how trust management systems (TMS) can mitigate malicious access to these networks.The TMS presented in this paper leverages distributed ledger technology (blockchain) to evaluate the trustworthiness of blockchain nodes, including devices and users, and make access decisions accordingly. While this approach is applicable to blockchain, it can also be extended to other areas. This approach can help prevent malicious actors from penetrating industrial networks and causing harm. The paper also presents the results of a simulation to demonstrate the behavior of the TMS and provide insights into its effectiveness
Trust Management System for Hybrid Industrial Blockchains
As industrial networks continue to expand and connect more devices and users, they face growing security challenges such as unauthorized access and data breaches. This paper delves into the crucial role of security and trust in industrial networks and how trust management systems (TMS) can mitigate malicious access to these networks.
The TMS presented in this paper leverages distributed ledger technology (blockchain) to evaluate the trustworthiness of blockchain nodes, including devices and users, and make access decisions accordingly. While this approach is applicable to blockchain, it can also be extended to other areas. This approach can help prevent malicious actors from penetrating industrial networks and causing harm. The paper also presents the results of a simulation to demonstrate the behavior of the TMS and provide insights into its effectiveness
- …