Background Digital twins are virtual representations of devices and processes that capture the physical properties of the environment and operational algorithms/techniques in the context of medical devices and tech-no...Background Digital twins are virtual representations of devices and processes that capture the physical properties of the environment and operational algorithms/techniques in the context of medical devices and tech-nologies.Digital twins may allow healthcare organizations to determine methods of improving medical processes,enhancing patient experience,lowering operating expenses,and extending the value of care.During the present COVID-19 pandemic,various medical devices,such as X-rays and CT scan machines and processes,are constantly being used to collect and analyze medical images.When collecting and processing an extensive volume of data in the form of images,machines and processes sometimes suffer from system failures,creating critical issues for hospitals and patients.Methods To address this,we introduce a digital-twin-based smart healthcare system in-tegrated with medical devices to collect information regarding the current health condition,configuration,and maintenance history of the device/machine/system.Furthermore,medical images,that is,X-rays,are analyzed by using a deep-learning model to detect the infection of COVID-19.The designed system is based on the cascade recurrent convolution neural network(RCNN)architecture.In this architecture,the detector stages are deeper and more sequentially selective against small and close false positives.This architecture is a multi-stage extension of the RCNN model and sequentially trained using the output of one stage for training the other.At each stage,the bounding boxes are adjusted to locate a suitable value of the nearest false positives during the training of the different stages.In this manner,the arrangement of detectors is adjusted to increase the intersection over union,overcoming the problem of overfitting.We train the model by using X-ray images as the model was previously trained on another dataset.Results The developed system achieves good accuracy during the detection phase of COVID-19.The experimental outcomes reveal the efficiency of the detection architecture,which yields a mean average precision rate of 0.94.展开更多
The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more ...The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more privacy security challenges,the most commom which is privacy leakage.As a privacy protection technology combining data integrity check and identity anonymity,ring signature is widely used in the field of privacy protection.However,introducing signature technology leads to additional signature verification overhead.In the scenario of crowd-sensing,the existing signature schemes have low efficiency in multi-signature verification.Therefore,it is necessary to design an efficient multi-signature verification scheme while ensuring security.In this paper,a batch-verifiable signature scheme is proposed based on the crowd-sensing background,which supports the sensing platform to verify the uploaded multiple signature data efficiently,so as to overcoming the defects of the traditional signature scheme in multi-signature verification.In our proposal,a method for linking homologous data was presented,which was valuable for incentive mechanism and data analysis.Simulation results showed that the proposed scheme has good performance in terms of security and efficiency in crowd-sensing applications with a large number of users and data.展开更多
Collaborative Robotics is one of the high-interest research topics in the area of academia and industry.It has been progressively utilized in numerous applications,particularly in intelligent surveillance systems.It a...Collaborative Robotics is one of the high-interest research topics in the area of academia and industry.It has been progressively utilized in numerous applications,particularly in intelligent surveillance systems.It allows the deployment of smart cameras or optical sensors with computer vision techniques,which may serve in several object detection and tracking tasks.These tasks have been considered challenging and high-level perceptual problems,frequently dominated by relative information about the environment,where main concerns such as occlusion,illumination,background,object deformation,and object class variations are commonplace.In order to show the importance of top view surveillance,a collaborative robotics framework has been presented.It can assist in the detection and tracking of multiple objects in top view surveillance.The framework consists of a smart robotic camera embedded with the visual processing unit.The existing pre-trained deep learning models named SSD and YOLO has been adopted for object detection and localization.The detection models are further combined with different tracking algorithms,including GOTURN,MEDIANFLOW,TLD,KCF,MIL,and BOOSTING.These algorithms,along with detection models,help to track and predict the trajectories of detected objects.The pre-trained models are employed;therefore,the generalization performance is also investigated through testing the models on various sequences of top view data set.The detection models achieved maximum True Detection Rate 93%to 90%with a maximum 0.6%False Detection Rate.The tracking results of different algorithms are nearly identical,with tracking accuracy ranging from 90%to 94%.Furthermore,a discussion has been carried out on output results along with future guidelines.展开更多
Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new ...Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new energy theft detection(ETD)techniques have been proposed by utilising different data mining(DM)techniques,state&network(S&N)based techniques,and game theory(GT)techniques.Here,a detailed survey is presented where many state-of-the-art ETD techniques are studied and analysed for their strengths and limitations.Three levels of taxonomy are presented to classify state-of-the-art ETD techniques.Different types and ways of energy theft and their consequences are studied and summarised and different parameters to benchmark the performance of proposed techniques are extracted from literature.The challenges of different ETD techniques and their mitigation are suggested for future work.It is observed that the literature on ETD lacks knowledge management techniques that can be more effective,not only for ETD but also for theft tracking.This can help in the prevention of energy theft,in the future,as well as for ETD.展开更多
The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS,SLAMSA,(p,k)-Angelization,and(p,l)-Angelizatio...The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS,SLAMSA,(p,k)-Angelization,and(p,l)-Angelization,but these were found to be insufficient in terms of robust privacy and performance.(p,l)-Angelization was successful against different privacy disclosures,but it was not efficient.To the best of our knowledge,no robust privacy model based on fuzzy logic has been proposed to protect the privacy of sensitive attributes with multiple records.In this paper,we suggest an improved version of(p,l)-Angelization based on a hybrid AI approach and privacy-preserving approach like Generalization.Fuzz-classification(p,l)-Angel uses artificial intelligence based fuzzy logic for classification,a high-dimensional segmentation technique for segmenting quasi-identifiers and multiple sensitive attributes.We demonstrate the feasibility of the proposed solution by modelling and analyzing privacy violations using High-Level Petri Nets.The results of the experiment demonstrate that the proposed approach produces better results in terms of efficiency and utility.展开更多
Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,S...Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)interactions.Tapping into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart home.The Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger system.The work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the system.The simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a time.This is done to measure the system's consistency across a variety of device capabilities.The experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times.展开更多
Shield tunnel lining is prone to water leakage,which may further bring about corrosion and structural damage to the walls,potentially leading to dangerous accidents.To avoid tedious and inefficient manual inspection,m...Shield tunnel lining is prone to water leakage,which may further bring about corrosion and structural damage to the walls,potentially leading to dangerous accidents.To avoid tedious and inefficient manual inspection,many projects use artificial intelligence(Al)to detect cracks and water leakage.A novel method for water leakage inspection in shield tunnel lining that utilizes deep learning is introduced in this paper.Our proposal includes a ConvNeXt-S backbone,deconvolutional-feature pyramid network(D-FPN),spatial attention module(SPAM).and a detection head.It can extract representative features of leaking areas to aid inspection processes.To further improve the model's robustness,we innovatively use an inversed low-light enhancement method to convert normally illuminated images to low light ones and introduce them into the training samples.Validation experiments are performed,achieving the average precision(AP)score of 56.8%,which outperforms previous work by a margin of 5.7%.Visualization illustrations also support our method's practical effectiveness.展开更多
文摘Background Digital twins are virtual representations of devices and processes that capture the physical properties of the environment and operational algorithms/techniques in the context of medical devices and tech-nologies.Digital twins may allow healthcare organizations to determine methods of improving medical processes,enhancing patient experience,lowering operating expenses,and extending the value of care.During the present COVID-19 pandemic,various medical devices,such as X-rays and CT scan machines and processes,are constantly being used to collect and analyze medical images.When collecting and processing an extensive volume of data in the form of images,machines and processes sometimes suffer from system failures,creating critical issues for hospitals and patients.Methods To address this,we introduce a digital-twin-based smart healthcare system in-tegrated with medical devices to collect information regarding the current health condition,configuration,and maintenance history of the device/machine/system.Furthermore,medical images,that is,X-rays,are analyzed by using a deep-learning model to detect the infection of COVID-19.The designed system is based on the cascade recurrent convolution neural network(RCNN)architecture.In this architecture,the detector stages are deeper and more sequentially selective against small and close false positives.This architecture is a multi-stage extension of the RCNN model and sequentially trained using the output of one stage for training the other.At each stage,the bounding boxes are adjusted to locate a suitable value of the nearest false positives during the training of the different stages.In this manner,the arrangement of detectors is adjusted to increase the intersection over union,overcoming the problem of overfitting.We train the model by using X-ray images as the model was previously trained on another dataset.Results The developed system achieves good accuracy during the detection phase of COVID-19.The experimental outcomes reveal the efficiency of the detection architecture,which yields a mean average precision rate of 0.94.
基金supported by National Natural Science Foundation of China under Grant No.61972360Shandong Provincial Natural Science Foundation of China under Grant Nos.ZR2020MF148,ZR2020QF108.
文摘The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more privacy security challenges,the most commom which is privacy leakage.As a privacy protection technology combining data integrity check and identity anonymity,ring signature is widely used in the field of privacy protection.However,introducing signature technology leads to additional signature verification overhead.In the scenario of crowd-sensing,the existing signature schemes have low efficiency in multi-signature verification.Therefore,it is necessary to design an efficient multi-signature verification scheme while ensuring security.In this paper,a batch-verifiable signature scheme is proposed based on the crowd-sensing background,which supports the sensing platform to verify the uploaded multiple signature data efficiently,so as to overcoming the defects of the traditional signature scheme in multi-signature verification.In our proposal,a method for linking homologous data was presented,which was valuable for incentive mechanism and data analysis.Simulation results showed that the proposed scheme has good performance in terms of security and efficiency in crowd-sensing applications with a large number of users and data.
基金the Framework of International Cooperation Program managed by the National Research Foundation of Korea(2019K1A3A1A8011295711).
文摘Collaborative Robotics is one of the high-interest research topics in the area of academia and industry.It has been progressively utilized in numerous applications,particularly in intelligent surveillance systems.It allows the deployment of smart cameras or optical sensors with computer vision techniques,which may serve in several object detection and tracking tasks.These tasks have been considered challenging and high-level perceptual problems,frequently dominated by relative information about the environment,where main concerns such as occlusion,illumination,background,object deformation,and object class variations are commonplace.In order to show the importance of top view surveillance,a collaborative robotics framework has been presented.It can assist in the detection and tracking of multiple objects in top view surveillance.The framework consists of a smart robotic camera embedded with the visual processing unit.The existing pre-trained deep learning models named SSD and YOLO has been adopted for object detection and localization.The detection models are further combined with different tracking algorithms,including GOTURN,MEDIANFLOW,TLD,KCF,MIL,and BOOSTING.These algorithms,along with detection models,help to track and predict the trajectories of detected objects.The pre-trained models are employed;therefore,the generalization performance is also investigated through testing the models on various sequences of top view data set.The detection models achieved maximum True Detection Rate 93%to 90%with a maximum 0.6%False Detection Rate.The tracking results of different algorithms are nearly identical,with tracking accuracy ranging from 90%to 94%.Furthermore,a discussion has been carried out on output results along with future guidelines.
基金supported by the European Union’s Horizon 2020 Research and Innovation Programme under the Marie Sk?odowska-Curie Grant Agreement(801522)Science Foundation Ireland and co-funded by the European Regional Development Fund through the ADAPT Centre for Digital Content Technology(13/RC/2106_P2)。
文摘Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new energy theft detection(ETD)techniques have been proposed by utilising different data mining(DM)techniques,state&network(S&N)based techniques,and game theory(GT)techniques.Here,a detailed survey is presented where many state-of-the-art ETD techniques are studied and analysed for their strengths and limitations.Three levels of taxonomy are presented to classify state-of-the-art ETD techniques.Different types and ways of energy theft and their consequences are studied and summarised and different parameters to benchmark the performance of proposed techniques are extracted from literature.The challenges of different ETD techniques and their mitigation are suggested for future work.It is observed that the literature on ETD lacks knowledge management techniques that can be more effective,not only for ETD but also for theft tracking.This can help in the prevention of energy theft,in the future,as well as for ETD.
文摘The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS,SLAMSA,(p,k)-Angelization,and(p,l)-Angelization,but these were found to be insufficient in terms of robust privacy and performance.(p,l)-Angelization was successful against different privacy disclosures,but it was not efficient.To the best of our knowledge,no robust privacy model based on fuzzy logic has been proposed to protect the privacy of sensitive attributes with multiple records.In this paper,we suggest an improved version of(p,l)-Angelization based on a hybrid AI approach and privacy-preserving approach like Generalization.Fuzz-classification(p,l)-Angel uses artificial intelligence based fuzzy logic for classification,a high-dimensional segmentation technique for segmenting quasi-identifiers and multiple sensitive attributes.We demonstrate the feasibility of the proposed solution by modelling and analyzing privacy violations using High-Level Petri Nets.The results of the experiment demonstrate that the proposed approach produces better results in terms of efficiency and utility.
文摘Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)interactions.Tapping into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart home.The Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger system.The work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the system.The simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a time.This is done to measure the system's consistency across a variety of device capabilities.The experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times.
基金This work is funded by the National Natural Science Foundation of China(Grant Nos.62171114 and 52222810)the Fundamental Research Funds for the Central Universities(No.DUT22RC(3)099).
文摘Shield tunnel lining is prone to water leakage,which may further bring about corrosion and structural damage to the walls,potentially leading to dangerous accidents.To avoid tedious and inefficient manual inspection,many projects use artificial intelligence(Al)to detect cracks and water leakage.A novel method for water leakage inspection in shield tunnel lining that utilizes deep learning is introduced in this paper.Our proposal includes a ConvNeXt-S backbone,deconvolutional-feature pyramid network(D-FPN),spatial attention module(SPAM).and a detection head.It can extract representative features of leaking areas to aid inspection processes.To further improve the model's robustness,we innovatively use an inversed low-light enhancement method to convert normally illuminated images to low light ones and introduce them into the training samples.Validation experiments are performed,achieving the average precision(AP)score of 56.8%,which outperforms previous work by a margin of 5.7%.Visualization illustrations also support our method's practical effectiveness.