With the integration of Wireless Sensor Networks and the Internet of Things, the smart grid is being projected as a solution for the challenges regarding electricity supply in the future. However, ...security and privacy issues in the consumption and trading of electricity data pose serious challenges in the adoption of the smart grid. To address these challenges, blockchain technology is being researched for applicability in the smart grid. In this paper, important application areas of blockchain in the smart grid are discussed. One use case of each area is discussed in detail, suggesting a suitable blockchain architecture, a sample block structure and the potential blockchain technicalities employed in it. The blockchain can be used for peer-to-peer energy trading, where a credit-based payment scheme can enhance the energy trading process. Efficient data aggregation schemes based on the blockchain technology can be used to overcome the challenges related to privacy and security in the grid. Energy distribution systems can also use blockchain to remotely control energy flow to a particular area by monitoring the usage statistics of that area. Further, blockchain-based frameworks can also help in the diagnosis and maintenance of smart grid equipment. We also discuss several commercial implementations of blockchain in the smart grid. Finally, various challenges to be addressed for integrating these two technologies are discussed.
The prediction of the quaternary structure of biomolecular macromolecules is of paramount importance for fundamental understanding of cellular processes and drug design. In the era of integrative ...structural biology, one way of increasing the accuracy of modeling methods used to predict the structure of biomolecular complexes is to include as much experimental or predictive information as possible in the process. This has been at the core of our information-driven docking approach HADDOCK. We present here the updated version 2.2 of the HADDOCK portal, which offers new features such as support for mixed molecule types, additional experimental restraints and improved protocols, all of this in a user-friendly interface. With well over 6000 registered users and 108,000 jobs served, an increasing fraction of which on grid resources, we hope that this timely upgrade will help the community to solve important biological questions and further advance the field. The HADDOCK2.2 Web server is freely accessible to non-profit users at http://haddock.science.uu.nl/services/HADDOCK2.2.
Display omitted
•The HADDOCK Web server has been upgraded to use HADDOCK version 2.2.•It supports mixed-type molecules, for example, protein–nucleic acid, such as nucleosomes.•NMR-based pseudocontact shifts and radius of gyration restraints are included.•The multi-body and solvated docking protocol are extended.•The HADDOCK Web server counts over 6000 users and has served more than 100,000 jobs.
In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of ...Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication is successful, they establish a session key between them for secure communication. To achieve this goal, a novel device authentication and key management mechanism for the edge based IoT environment, called the lightweight authentication and key management scheme for the edge based IoT environment (LDAKM-EIoT), was designed. The detailed security analysis and formal security verification conducted by the widely used "Automated Validation of Internet Security Protocols and Applications (AVISPA)" tool prove that the proposed LDAKM-EIoT is secure against several attack vectors that exist in the infrastructure of the edge based IoT environment. The elaborated comparative analysis of the proposed LDAKM-EIoT and different closely related schemes provides evidence that LDAKM-EIoT is more secure with less communication and computation costs. Finally, the network performance parameters are calculated and analyzed using the NS2 simulation to demonstrate the practical facets of the proposed LDAKM-EIoT.
•A deep learning-based framework is proposed for the classification of breast cancer in breast cytology images.•Three different deep learning architectures (GoogLeNet, VGGNet, and ResNet) have been ...analysed.•The proposed framework gives a high level of accuracy in the classification of breast cancer.
Breast cancer is among the leading cause of mortality among women in developing as well as under-developing countries. The detection and classification of breast cancer in the early stages of its development may allow patients to have proper treatment. In this article, we proposed a novel deep learning framework for the detection and classification of breast cancer in breast cytology images using the concept of transfer learning. In general, deep learning architectures are modeled to be problem specific and is performed in isolation. Contrary to classical learning paradigms, which develop and yield in isolation, transfer learning is aimed to utilize the gained knowledge during the solution of one problem into another related problem. In the proposed framework, features from images are extracted using pre-trained CNN architectures, namely, GoogLeNet, Visual Geometry Group Network (VGGNet) and Residual Networks (ResNet), which are fed into a fully connected layer for classification of malignant and benign cells using average pooling classification. To evaluate the performance of the proposed framework, experiments are performed on standard benchmark data sets. It has been observed that the proposed framework outclass all the other deep learning architectures in terms of accuracy in detection and classification of breast tumor in cytology images.
The continuous development and usage of multi-media-based applications and services have contributed to the exponential growth of social multimedia traffic. In this context, secure transmission of ...data plays a critical role in realizing all of the key requirements of social multimedia networks such as reliability, scalability, quality of information, and quality of service (QoS). Thus, a trust-based paradigm for multimedia analytics is highly desired to meet the increasing user requirements and deliver more timely and actionable insights. In this regard, software-defined networks (SDNs) play a vital role; however, several factors such as as-runtime security, and energy-aware networking limit its capabilities to facilitate efficient network control and management. Thus, with the view to enhance the reliability of the SDN, a hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in the context of social multimedia is proposed. It consists of the following two modules: 1) an anomaly detection module that leverages improved restricted Boltzmann machine and gradient descent-based support vector machine to detect the abnormal activities, and 2) an end-to-end data delivery module to satisfy strict QoS requirements of the SDN, that is, high bandwidth and low latency. Finally, the proposed scheme has been experimentally evaluated on both real-time and benchmark datasets to prove its effectiveness and efficiency in terms of anomaly detection and data delivery essential for social multimedia. Further, a large-scale analysis over a Carnegie Mellon University (CMU)-based insider threat dataset has been conducted to identify its performance in terms of detecting malicious events such as-Identity theft, profile cloning, confidential data collection, etc.
Human emotions are strongly coupled with physical and mental health of any individual. While emotions exbibit complex physiological and biological phenomenon, yet studies reveal that physiological ...signals can be used as an indirect measure of emotions. In unprecedented circumstances alike the coronavirus (Covid-19) outbreak, a remote Internet of Things (IoT) enabled solution, coupled with AI can interpret and communicate emotions to serve substantially in healthcare and related fields. This work proposes an integrated IoT framework that enables wireless communication of physiological signals to data processing hub where long short-term memory (LSTM)-based emotion recognition is performed. The proposed framework offers real-time communication and recognition of emotions that enables health monitoring and distance learning support amidst pandemics. In this study, the achieved results are very promising. In the proposed IoT protocols (TS-MAC and R-MAC), ultralow latency of 1 ms is achieved. R-MAC also offers improved reliability in comparison to state of the art. In addition, the proposed deep learning scheme offers high performance (<inline-formula> <tex-math notation="LaTeX">f </tex-math></inline-formula>-score) of 95%. The achieved results in communications and AI match the interdependency requirements of deep learning and IoT frameworks, thus ensuring the suitability of proposed work in distance learning, student engagement, healthcare, emotion support, and general wellbeing.
Internet of Things has been one of the catalysts in revolutionizing conventional healthcare services. With the growing society, traditional healthcare systems reach their capacity in providing ...sufficient and high-quality services. The world is facing the aging population and the inherent need for assisted-living environments for senior citizens. There is also a commitment by national healthcare organizations to increase support for personalized, integrated care to prevent and manage chronic conditions. Many applications related to In-Home Health Monitoring have been introduced over the last few decades, thanks to the advances in mobile and Internet of Things technologies and services. Such advances include improvements in optimized network architecture, indoor networks coverage, increased device reliability and performance, ultra-low device cost, low device power consumption, and improved device and network security and privacy. Current studies of in-home health monitoring systems presented many benefits including improved safety, quality of life and reduction in hospitalization and cost. However, many challenges of such a paradigm shift still exist, that need to be addressed to support scale-up and wide uptake of such systems, including technology acceptance and adoption by patients, healthcare providers and policymakers. The aim of this paper is three folds: First, review of key factors that drove the adoption and growth of the IoT-based in-home remote monitoring; Second, present the latest advances of IoT based in-home remote monitoring system architecture and key building blocks; Third, discuss future outlook and our recommendations of the in-home remote monitoring applications going forward.
Respiratory diseases are among the leading causes of death globally, with the COVID-19 pandemic serving as a prominent example. Issues such as infections affect a large population and, depending on ...the mode of transmission, can rapidly spread worldwide, impacting thousands of individuals. These diseases manifest in mild and severe forms, with severely affected patients requiring ventilatory support. The air-oxygen blender is a critical component of mechanical ventilators, responsible for mixing air and oxygen in precise proportions to ensure a constant supply. The most commonly used version of this equipment is the analog model, which faces several challenges. These include a lack of precision in adjustments and the inspiratory fraction of oxygen, as well as gas wastage from cylinders as pressure decreases. The research proposes a blender model utilizing only dynamic pressure sensors to calculate oxygen saturation, based on Bernoulli's equation. The model underwent validation through simulation, revealing a linear relationship between pressures and oxygen saturation up to a mixture outlet pressure of 500 cmH
O. Beyond this value, the relationship begins to exhibit non-linearities. However, these non-linearities can be mitigated through a calibration algorithm that adjusts the mathematical model. This research represents a relevant advancement in the field, addressing the scarcity of work focused on this essential equipment crucial for saving lives.
At present times, the drastic advancements in the 5G cellular and internet of things (IoT) technologies find useful in different applications of the healthcare sector. At the same time, COVID-19 is ...commonly spread from animals to persons, but today it is transmitting among persons by adapting the structure. It is a severe virus and inappropriately resulted in a global pandemic. Radiologists utilize X-ray or computed tomography (CT) images to diagnose COVID-19 disease. It is essential to identify and classify the disease through the use of image processing techniques. So, a new intelligent disease diagnosis model is in need to identify the COVID-19. In this view, this paper presents a novel IoT enabled Depthwise separable convolution neural network (DWS-CNN) with Deep support vector machine (DSVM) for COVID-19 diagnosis and classification. The proposed DWS-CNN model aims to detect both binary and multiple classes of COVID-19 by incorporating a set of processes namely data acquisition, Gaussian filtering (GF) based preprocessing, feature extraction, and classification. Initially, patient data will be collected in the data acquisition stage using IoT devices and sent to the cloud server. Besides, the GF technique is applied to remove the existence of noise that exists in the image. Then, the DWS-CNN model is employed for replacing default convolution for automatic feature extraction. Finally, the DSVM model is applied to determine the binary and multiple class labels of COVID-19. The diagnostic outcome of the DWS-CNN model is tested against Chest X-ray (CXR) image dataset and the results are investigated interms of distinct performance measures. The experimental results ensured the superior results of the DWS-CNN model by attaining maximum classification performance with the accuracy of 98.54% and 99.06% on binary and multiclass respectively.
The emergence of the Internet of Things (IoT) and its applications has taken the attention of several researchers. In an effort to provide interoperability and IPv6 support for the IoT devices, the ...Internet Engineering Task Force (IETF) proposed the 6LoWPAN stack. However, the particularities and hardware limitations of networks associated with IoT devices lead to several challenges, mainly for routing protocols. On its stack proposal, IETF standardizes the RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) as the routing protocol for Low-power and Lossy Networks (LLNs). RPL is a tree-based proactive routing protocol that creates acyclic graphs among the nodes to allow data exchange. Although widely considered and used by current applications, different recent studies have shown its limitations and drawbacks. Among these, it is possible to highlight the weak support of mobility and P2P traffic, restrictions for multicast transmissions, and lousy adaption for dynamic throughput. Motivated by the presented issues, several new solutions have emerged during recent years. The approaches range from the consideration of different routing metrics to an entirely new solution inspired by other routing protocols. In this context, this work aims to present an extensive survey study about routing solutions for IoT/LLN, not limited to RPL enhancements. In the course of the paper, the routing requirements of LLNs, the initial protocols, and the most recent approaches are presented. The IoT routing enhancements are divided according to its main objectives and then studied individually to point out its most important strengths and weaknesses. Furthermore, as the main contribution, this study presents a comprehensive discussion about the considered approaches, identifying the still remaining open issues and suggesting future directions to be recognized by new proposals.