92 research outputs found

    The Investigating of Photoplethysmogram Waveform Amplitude Changes: Aging and Atherosclerosis

    Get PDF
    This paper focuses on the analysis of PPG waveform amplitude changes. As PPG signal reflects blood volume changes, studying its (peaks and valleys) amplitudes changes is highly appreciated. The results showed a strong positive relationship between age and RI index (R square = 0.657) and a strongly negative relationship between age and systolic peak index (R square = -0.651). The obtained results underline the importance of studying PPG's (peaks and valleys) amplitude changes and their association with age and atherosclerosis. The association between aging, atherosclerosis, arterial stiffness and PPG's morphology can provide a fruitful tool towards disease prevention and early-risk prediction. The increment of systolic peak as we age might indicate the present of atherosclerosis and the start of arterial stiffness. In addition, the increment of RI index as we age, may contribute to the process of high-risk atherosclerosis prediction and therefore approaching risk prevention

    Countering Malicious URLs in Internet of Things Using a Knowledge-Based Approach and a Simulated Expert

    Get PDF
    © 2014 IEEE. This article proposes a novel methodology to detect malicious uniform resource locators (URLs) using simulated expert (SE) and knowledge-base system (KBS). The proposed study not only efficiently detects known malicious URLs but also adapts countermeasure against the newly generated malicious URLs. Moreover, this article also explored which lexical features are contributing more in final decision using a factor analysis method, and thus help in avoiding the involvement of human experts. Furthermore, we apply the following state-of-the-art machine learning (ML) algorithms, i.e., naïve Bayes (NB), decision tree (DT), gradient boosted trees (GBT), generalized linear model (GLM), logistic regression (LR), deep learning (DL), and random rest (RF), and evaluate the performance of these algorithms on a large-scale real data set of data-driven Web applications. The experimental results clearly demonstrate the efficiency of NB in the proposed model as NB outperforms when compared to the rest of the aforementioned algorithms in terms of average minimum execution time (i.e., 3 s) and is able to accurately classify the 107 586 URLs with 0.2% error rate and 99.8% accuracy rate

    Design and Performance Optimisation of the Hexaboards for CMS HGCAL On-Cassette Readout Electronics

    No full text
    A new high-granularity endcap calorimeter, HGCAL, is foreseen to be installed later this decade in the CMS experiment. We present the design and performance of the Hexaboard, a complex hexagonal multi-layer PCB equipped with multiple HGCROC ASICs to read out the signals from silicon pads with low noise and large dynamic range. The Hexaboards are glued to silicon sensors and connect to their pads via wire bonds through holes in the PCBs. The Hexaboard also connects to mezzanine boards for powering, trigger and data concentration and transfer. More than ten variants of the Hexa\-board are required to cover the circular fiducial area of the CMS endcaps. Detailed performance measurements, and comparative PCB simulations using Ansys SIwave, are presented

    Energy-efficient Harvested-Aware clustering and cooperative Routing Protocol for WBAN (E-HARP)

    Get PDF
    Wireless Body Area Network (WBAN) is an interconnection of small bio-sensor nodes that are deployed in/on different parts of human body. It is used to sense health-related data such as rate of heart beat, blood pressure, blood glucose level, Electro-cardiogram (ECG), Electro-myography (EMG) etc. of human body and pass these readings to real-time health monitoring systems. WBANs is an important research area and is used in different applications such as medical field, sports, entertainment, social welfare etc. Bio-Sensor Nodes (BSNs) or simply called as Sensor Nodes (SNs) are the main backbone of WBANs. SNs normally have very limited resources due to its smaller size. Therefore, minimum consumption of energy is an essential design requirement of WBAN schemes. In the proposed work, Energy-efficient Harvested-Aware clustering and cooperative Routing Protocol for WBAN (E-HARP) are presented. The presented protocol mainly proposes a novel multi-attribute-based technique for dynamic Cluster Head (CH) selection and cooperative routing. In the first phase of this two-phased technique, optimum CH is selected among the cluster members, based on calculated Cost Factor (CF). The parameters used for calculation of CF are; residual energy of SN, required transmission power, communication link Signal-to-Noise-Ratio (SNR) and total network energy loss. In order to distribute load on one CH, E-HARP selects new CH in each data transmission round. In the second phase of E-HARP, data is routed with cooperative effort of the SN, which saves the node energy by prohibiting the transmission of redundant data packets. To evaluate the performance of the proposed technique, comprehensive experimentations using NS-2 simulation tool has been conducted. The results are compared with some latest techniques named as EH-RCB, ELR-W, Co-LAEEBA, and EECBSR. The acquired results show a significant enhancement of E-HARP in terms of network stability, network life time, throughput, end-to-end delay and packet delivery ratio

    Privacy by Architecture Pseudonym Framework for Delay Tolerant Network

    No full text
    Delay Tolerant Network (DTN) enables communication in opportunistic networks where disruptive links result into intermittent connectivity. Routing protocols in such opportunistic environments mainly rely on broadcast/multicast communication in order to maximize the chances of packet delivery to destination node. Lack of end-to-end path and the essential requirement of store-carry-forward decision of packets by intermediate nodes, pose a serious threat to security and privacy concerns in DTNs. This article proposes a novel approach for secure and private communication in DTNs by hiding the identity of nodes using pseudonyms. The approach is based on Privacy by Architecture (PbA) where minimal identifying information of a user is sent to a certificate authority (CA) while requesting for a certificate. The novel PbA based scheme is composed of a set of protocols to address the aforementioned challenges; the Pseudonym Credential and Pseudonym Identity/Certificate Issuance protocols. The proposed approach is validated using formal modeling in CasperFDR which is the state-of-the art compiler for performance analysis of security protocols. To strengthen our claim, an information theoretic quantification method is employed to measure the Degree of Anonymity (DoA) of the approach. The approach performs efficiently and requires no end-to-end connectivity for messages exchange between the user and the certificate authority, thus making it an ideal choice for ensuring security and privacy in DTNs. Results show that the proposed approach guards against privacy attacks and delivers a high degree of anonymity even in the presence of compromised nodes in the network

    Provenance based data integrity checking and verification in cloud environments

    No full text
    <div><p>Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-held devices into large scale processing hubs and data centers respectively. It has been proposed as an effective solution for data outsourcing and on demand computing to control the rising cost of IT setups and management in enterprises. However, with Cloud platforms user’s data is moved into remotely located storages such that users lose control over their data. This unique feature of the Cloud is facing many security and privacy challenges which need to be clearly understood and resolved. One of the important concerns that needs to be addressed is to provide the proof of data integrity, i.e., correctness of the user’s data stored in the Cloud storage. The data in Clouds is physically not accessible to the users. Therefore, a mechanism is required where users can check if the integrity of their valuable data is maintained or compromised. For this purpose some methods are proposed like mirroring, checksumming and using third party auditors amongst others. However, these methods use extra storage space by maintaining multiple copies of data or the presence of a third party verifier is required. In this paper, we address the problem of proving data integrity in Cloud computing by proposing a scheme through which users are able to check the integrity of their data stored in Clouds. In addition, users can track the violation of data integrity if occurred. For this purpose, we utilize a relatively new concept in the Cloud computing called “Data Provenance”. Our scheme is capable to reduce the need of any third party services, additional hardware support and the replication of data items on client side for integrity checking.</p></div
    corecore