Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (307)

Search Parameters:
Keywords = IoMT

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 4633 KiB  
Article
Load Equipment Segmentation and Assessment Method Based on Multi-Source Tensor Feature Fusion
by Xiaoli Zhang, Congcong Zhao, Wenjie Lu and Kun Liang
Electronics 2025, 14(5), 1040; https://doi.org/10.3390/electronics14051040 - 5 Mar 2025
Viewed by 265
Abstract
The state monitoring of power load equipment plays a crucial role in ensuring its normal operation. However, in densely deployed environments, the target equipment often exhibits low clarity, making real-time warnings challenging. In this study, a load equipment segmentation and assessment method based [...] Read more.
The state monitoring of power load equipment plays a crucial role in ensuring its normal operation. However, in densely deployed environments, the target equipment often exhibits low clarity, making real-time warnings challenging. In this study, a load equipment segmentation and assessment method based on multi-source tensor feature fusion (LSA-MT) is proposed. First, a lightweight residual block based on the attention mechanism is introduced into the backbone network to emphasize key features of load devices and enhance target segmentation efficiency. Second, a 3D edge detail feature perception module is designed to facilitate multi-scale feature fusion while preserving boundary detail features of different devices, thereby improving local recognition accuracy. Finally, tensor decomposition and reorganization are employed to guide visual feature reconstruction in conjunction with equipment monitoring images, while tensor mapping of equipment monitoring data is utilized for automated fault classification. The experimental results demonstrate that LSE-MT produces visually clearer segmentations compared to models such as the classic UNet++ and the more recent EGE-UNet when segmenting multiple load devices, achieving Dice and mIoU scores of 92.48 and 92.90, respectively. Regarding classification across the four datasets, the average accuracy can reach 92.92%. These findings fully demonstrate the effectiveness of the LSA-MT method in load equipment fault alarms and grid operation and maintenance. Full article
Show Figures

Figure 1

Figure 1
<p>The architecture of LSA-MT.</p>
Full article ">Figure 2
<p>The architecture of LRB-AM.</p>
Full article ">Figure 3
<p>The architecture of 3DPM.</p>
Full article ">Figure 4
<p>The architecture of EA-MTF.</p>
Full article ">Figure 5
<p>Load equipment visual feature representation and enhancement process.</p>
Full article ">Figure 6
<p>Multi-load device segmentation visualization results. Column (<b>a</b>) shows an image of the device load used for testing, and column (<b>b</b>) shows a manually labeled truth split. Columns (<b>c</b>–<b>h</b>) show the segmentation results of various comparison models, and column (<b>i</b>) illustrates the segmentation results achieved using the LSA-MT.</p>
Full article ">Figure 7
<p>Trend graph of load equipment segmentation assessment results.</p>
Full article ">Figure 8
<p>Trends in metrics for each model on equipment state assessments and open datasets.</p>
Full article ">Figure 9
<p>Grad-CAM visualization results of ablation experiments.</p>
Full article ">
48 pages, 1061 KiB  
Review
Navigating Challenges and Harnessing Opportunities: Deep Learning Applications in Internet of Medical Things
by John Mulo, Hengshuo Liang, Mian Qian, Milon Biswas, Bharat Rawal, Yifan Guo and Wei Yu
Future Internet 2025, 17(3), 107; https://doi.org/10.3390/fi17030107 - 1 Mar 2025
Viewed by 400
Abstract
Integrating deep learning (DL) with the Internet of Medical Things (IoMT) is a paradigm shift in modern healthcare, offering enormous opportunities for patient care, diagnostics, and treatment. Implementing DL with IoMT has the potential to deliver better diagnosis, treatment, and patient management. However, [...] Read more.
Integrating deep learning (DL) with the Internet of Medical Things (IoMT) is a paradigm shift in modern healthcare, offering enormous opportunities for patient care, diagnostics, and treatment. Implementing DL with IoMT has the potential to deliver better diagnosis, treatment, and patient management. However, the practical implementation has challenges, including data quality, privacy, interoperability, and limited computational resources. This survey article provides a conceptual IoMT framework for healthcare, synthesizes and identifies the state-of-the-art solutions that tackle the challenges of the current applications of DL, and analyzes existing limitations and potential future developments. Through an analysis of case studies and real-world implementations, this work provides insights into best practices and lessons learned, including the importance of robust data preprocessing, integration with legacy systems, and human-centric design. Finally, we outline future research directions, emphasizing the development of transparent, scalable, and privacy-preserving DL models to realize the full potential of IoMT in healthcare. This survey aims to serve as a foundational reference for researchers and practitioners seeking to navigate the challenges and harness the opportunities in this rapidly evolving field. Full article
(This article belongs to the Special Issue The Future Internet of Medical Things, 3rd Edition)
Show Figures

Figure 1

Figure 1
<p>Layer architecture of smart healthcare.</p>
Full article ">Figure 2
<p>Problem space for DL-empowered IoMT.</p>
Full article ">Figure 3
<p>Workflow of DL models in IoMT for healthcare.</p>
Full article ">
24 pages, 5169 KiB  
Article
A Dual-Headed Teacher–Student Framework with an Uncertainty-Guided Mechanism for Semi-Supervised Skin Lesion Segmentation
by Changman Zou, Wang-Su Jeon, Hye-Rim Ju and Sang-Yong Rhee
Electronics 2025, 14(5), 984; https://doi.org/10.3390/electronics14050984 - 28 Feb 2025
Viewed by 197
Abstract
Medical image segmentation is a challenging task due to limited annotated data, complex lesion boundaries, and the inherent variability in medical images. These challenges make accurate and robust segmentation crucial for clinical applications. In this study, we propose the Uncertainty-Driven Auxiliary Mean Teacher [...] Read more.
Medical image segmentation is a challenging task due to limited annotated data, complex lesion boundaries, and the inherent variability in medical images. These challenges make accurate and robust segmentation crucial for clinical applications. In this study, we propose the Uncertainty-Driven Auxiliary Mean Teacher (UDAMT) model, a novel semi-supervised framework specifically designed for skin lesion segmentation. Our approach employs a dual-headed teacher–student architecture with an uncertainty-guided mechanism, enhancing feature learning and boundary precision. Extensive experiments on the ISIC 2016, ISIC 2017, and ISIC 2018 datasets demonstrate that UDAMT achieves significant improvements over state-of-the-art methods, with increases of 1.17 percentage points in the Dice coefficient and 1.31 percentage points in mean Intersection over Union (mIoU) under low-label settings (5% labeled data). Furthermore, UDAMT requires 12.9 M parameters, which is slightly higher than the baseline model (12.5 M) but significantly lower than MT (14.8 M) and UAMT (15.2 M). It also achieves an inference time of 25.7 ms per image, ensuring computational efficiency. Ablation studies validate the contributions of each component, and cross-dataset evaluations on the PH2 benchmark confirm robustness to small lesions. This work provides a scalable and efficient solution for semi-supervised medical image segmentation, balancing accuracy, efficiency, and clinical applicability. Full article
Show Figures

Figure 1

Figure 1
<p>Difficulties in dermoscopic image segmentation. (<b>a</b>) The lesion area is small; (<b>b</b>) the lesion area is large; (<b>c</b>) the lesion color is light; (<b>d</b>) the lesion image is reflective or has bubbles; (<b>e</b>): the lesion area color is inconsistent; (<b>f</b>) the lesion area is blocked by hair; (<b>g</b>) the lesion area boundary is blurred; (<b>h</b>) there are differences in acquisition between different medical equipment.</p>
Full article ">Figure 2
<p>Overview of the UDAMT framework.</p>
Full article ">Figure 3
<p>Flowchart for UDAMT’s pseudo-labeling algorithm.</p>
Full article ">Figure 4
<p>Comparison of segmentation of each model under the 5% labeled data setting. Green regions indicate areas where UDAMT achieves accurate segmentation while the baseline fails, and red regions highlight errors or missed detections by the baseline that UDAMT successfully corrects.</p>
Full article ">Figure 5
<p>Visual comparison of attention maps from each segmentation head.</p>
Full article ">
43 pages, 729 KiB  
Review
A Systematic Survey of Distributed Decision Support Systems in Healthcare
by Basem Almadani, Hunain Kaisar, Irfan Rashid Thoker and Farouq Aliyu
Systems 2025, 13(3), 157; https://doi.org/10.3390/systems13030157 - 26 Feb 2025
Viewed by 284
Abstract
The global Internet of Medical Things (IoMT) market is growing at a Compound Annual Growth Rate (CAGR) of 17.8%, a testament to the increasing demand for IoMT in the health sector. However, more IoMT devices mean an increase in the volume and velocity [...] Read more.
The global Internet of Medical Things (IoMT) market is growing at a Compound Annual Growth Rate (CAGR) of 17.8%, a testament to the increasing demand for IoMT in the health sector. However, more IoMT devices mean an increase in the volume and velocity of data received by healthcare decision-makers, leading many to develop Distributed Decision Support Systems (DDSSs) to help them make accurate and timely decisions. This research is a systematic review of DDSSs in healthcare using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) framework. The study explores how advanced technologies such as Artificial Intelligence (AI), IoMT, and blockchain enhance clinical decision-making processes. It highlights key innovations in DDSSs, including hybrid imaging techniques for comprehensive disease characterization. It also examines the role of Case-Based Reasoning (CBR) frameworks in improving personalized treatment strategies for chronic diseases like diabetes mellitus. It also presents challenges of applying DDSSs in the healthcare sector, such as security and privacy, system integration, and interoperability issues. Finally, it discusses open issues as future research directions in the field of DDSSs in the healthcare sector, including data structure standardization, alert fatigue for healthcare workers using DDSSs, and the lack of adherence of emerging technologies like blockchain to medical regulations. Full article
(This article belongs to the Special Issue Data-Driven Decision Making for Complex Systems)
Show Figures

Figure 1

Figure 1
<p>Flowchart for Survey Methodology using PRISMA.</p>
Full article ">Figure 2
<p>Taxonomy of Medical DDSSs.</p>
Full article ">Figure 3
<p>A Typical CBR Flowchart.</p>
Full article ">Figure 4
<p>Block Diagram of an Explainable AI Framework.</p>
Full article ">Figure 5
<p>A Typical Federated Learning Process.</p>
Full article ">Figure 6
<p>A Typical Blockchain Transaction.</p>
Full article ">
20 pages, 2002 KiB  
Article
Implementing Anomaly-Based Intrusion Detection for Resource-Constrained Devices in IoMT Networks
by Georgios Zachos, Georgios Mantas, Kyriakos Porfyrakis and Jonathan Rodriguez
Sensors 2025, 25(4), 1216; https://doi.org/10.3390/s25041216 - 17 Feb 2025
Viewed by 256
Abstract
Internet of Medical Things (IoMT) technology has emerged from the introduction of the Internet of Things in the healthcare sector. However, the resource-constrained characteristics and heterogeneity of IoMT networks make these networks susceptible to various types of threats. Thus, it is necessary to [...] Read more.
Internet of Medical Things (IoMT) technology has emerged from the introduction of the Internet of Things in the healthcare sector. However, the resource-constrained characteristics and heterogeneity of IoMT networks make these networks susceptible to various types of threats. Thus, it is necessary to develop novel security solutions (e.g., efficient and accurate Anomaly-based Intrusion Detection Systems), considering the inherent limitations of IoMT networks, before these networks reach their full potential in the market. In this paper, we propose an AIDS specifically designed for resource-constrained devices within IoMT networks. The proposed lightweight AIDS leverages novelty detection and outlier detection algorithms instead of conventional classification algorithms to achieve (a) enhanced detection performance against both known and unknown attack patterns and (b) minimal computational costs. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Architecture of the proposed AIDS in the IoMT network.</p>
Full article ">Figure 2
<p>The Monitoring and Data Acquisition (MDA) component.</p>
Full article ">Figure 3
<p>The Remote Detection Engine (RDE) component.</p>
Full article ">Figure 4
<p>Internal architecture of the “Detection Engine” module of the RDE component.</p>
Full article ">Figure 5
<p>Runtime evaluation results of the six detection algorithms when integrated into the “Detection Engine” module of the RDE component of the AIDS.</p>
Full article ">Figure 6
<p>CPU consumption of the RDE component for different detection algorithms.</p>
Full article ">Figure 7
<p>Memory consumption of the RDE component for different detection algorithms.</p>
Full article ">
15 pages, 1868 KiB  
Article
Integrated Dynamic Power Management Strategy with a Field Programmable Gate Array-Based Cryptoprocessor System for Secured Internet-of-Medical Things Networks
by Javier Vázquez-Castillo, Daniel Visairo, Ramón Atoche-Enseñat, Alejandro Castillo-Atoche, Renán Quijano-Cetina, Carolina Del-Valle-Soto, Jaime Ortegón-Aguilar and Johan J. Estrada-López
Technologies 2025, 13(2), 68; https://doi.org/10.3390/technologies13020068 - 4 Feb 2025
Viewed by 949
Abstract
Advancements in electronics and sensor technologies are driving the deployment of ubiquitous sensor networks across various applications, including asset monitoring, security, and networking. At the same time, ensuring the integrity and confidentiality of data collected by sensor nodes is crucial to prevent unauthorized [...] Read more.
Advancements in electronics and sensor technologies are driving the deployment of ubiquitous sensor networks across various applications, including asset monitoring, security, and networking. At the same time, ensuring the integrity and confidentiality of data collected by sensor nodes is crucial to prevent unauthorized access or modification. However, the limited resources f low-power sensor networks present significant challenges for securing innovative Internet-of-Medical Things (IoMT) applications in complex environments. These miniature sensing systems, essential for diverse healthcare applications, grapple with constrained computational power and energy budgets. To address this challenge, this study proposes a dynamic power management strategy within a resource-constrained FPGA-based cryptoprocessor core for secure IoMT networks. The sensor node design comprises two main modules: an 8-bit reduced instruction set computer (RISC) and a cryptographic engine. These modules collaboratively manage their power consumption during the operational stages of data acquisition, encryption, transmission, and sleep mode activation. The cryptographic engine employs a pseudorandom number generator to generate a keystream for data encryption, utilizing direct sequence spread spectrum (DSSS) encoding to ensure secure communication. The experimental results demonstrate the effectiveness of the proposed dynamic power management strategy within the resource-constrained cryptoprocessor core. The sensor node achieves an average power consumption of 0.1 mW while utilizing 2414 logic cells and 5292 registers. A comparative analysis with other state-of-the-art lightweight sensor nodes highlights the advantages of our dynamic power management approach within the cryptoprocessor sensing system. Full article
(This article belongs to the Special Issue Perpetual Sensor Nodes for Sustainable Wireless Network Applications)
Show Figures

Figure 1

Figure 1
<p>Conceptual design of the proposed IoMT network for dynamic power management analysis on an FPGA-based cryptoprocessor core.</p>
Full article ">Figure 2
<p>Block diagram of the FPGA-based cryptoprocessor system.</p>
Full article ">Figure 3
<p>Design of the DSSS cipher engine.</p>
Full article ">Figure 4
<p>Hybrid cellular automata architecture based on Rules 90 and 150.</p>
Full article ">Figure 5
<p>Low-power mode configuration design.</p>
Full article ">Figure 6
<p>Flowchart diagram of the proposed DPMS.</p>
Full article ">Figure 7
<p>Validation scheme for the proposed FPGA-based cryptoprocessor system.</p>
Full article ">Figure 8
<p>NIST test results for the proposed FPGA-based cryptoprocessor system.</p>
Full article ">
28 pages, 3412 KiB  
Article
Federated Learning for IoMT-Enhanced Human Activity Recognition with Hybrid LSTM-GRU Networks
by Fahad R. Albogamy
Sensors 2025, 25(3), 907; https://doi.org/10.3390/s25030907 - 3 Feb 2025
Viewed by 589
Abstract
The proliferation of wearable sensors and mobile devices has fueled advancements in human activity recognition (HAR), with growing importance placed on both accuracy and privacy preservation. In this paper, the author proposes a federated learning framework for HAR, leveraging a hybrid Long Short-Term [...] Read more.
The proliferation of wearable sensors and mobile devices has fueled advancements in human activity recognition (HAR), with growing importance placed on both accuracy and privacy preservation. In this paper, the author proposes a federated learning framework for HAR, leveraging a hybrid Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) model to enhance feature extraction and classification in decentralized environments. Utilizing three public datasets—UCI-HAR, HARTH, and HAR7+—which contain diverse sensor data collected from free-living activities, the proposed system is designed to address the inherent privacy risks associated with centralized data processing by deploying Federated Averaging for local model training. To optimize recognition accuracy, the author introduces a dual-feature extraction mechanism, combining convolutional blocks for capturing local patterns and a hybrid LSTM-GRU structure to detect complex temporal dependencies. Furthermore, the author integrates an attention mechanism to focus on significant global relationships within the data. The proposed system is evaluated on the three public datasets—UCI-HAR, HARTH, and HAR7+—achieving superior performance compared to recent works in terms of F1-score and recognition accuracy. The results demonstrate that the proposed approach not only provides high classification accuracy but also ensures privacy preservation, making it a scalable and reliable solution for real-world HAR applications in decentralized and privacy-conscious environments. This work showcases the potential of federated learning in transforming human activity recognition, combining advanced feature extraction methodologies and privacy-respecting frameworks to deliver robust, real-time activity classification. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>General framework.</p>
Full article ">Figure 2
<p>Activity distribution across datasets.</p>
Full article ">Figure 3
<p>Model accuracy comparison across communication rounds on HARTH, HAR70+, and UCI-HAR datasets.</p>
Full article ">Figure 4
<p>Model F1-score comparison across communication rounds on HARTH, HAR70+, and UCI-HAR datasets.</p>
Full article ">Figure 5
<p>Model accuracy comparison across communication rounds for homogeneous vs. heterogeneous configurations on HARTH, HAR70+, and UCI-HAR datasets.</p>
Full article ">Figure 6
<p>Model F1-score comparison across communication rounds for homogeneous vs. heterogeneous configurations on HARTH, HAR70+, and UCI-HAR datasets.</p>
Full article ">
21 pages, 1339 KiB  
Article
Stacking Ensemble Deep Learning for Real-Time Intrusion Detection in IoMT Environments
by Easa Alalwany, Bader Alsharif, Yazeed Alotaibi, Abdullah Alfahaid, Imad Mahgoub and Mohammad Ilyas
Sensors 2025, 25(3), 624; https://doi.org/10.3390/s25030624 - 22 Jan 2025
Viewed by 797
Abstract
The Internet of Medical Things (IoMT) is revolutionizing healthcare by enabling advanced patient care through interconnected medical devices and systems. However, its critical role and sensitive data make it a prime target for cyber threats, requiring the implementation of effective security solutions. This [...] Read more.
The Internet of Medical Things (IoMT) is revolutionizing healthcare by enabling advanced patient care through interconnected medical devices and systems. However, its critical role and sensitive data make it a prime target for cyber threats, requiring the implementation of effective security solutions. This paper presents a novel intrusion detection system (IDS) specifically designed for IoMT networks. The proposed IDS leverages machine learning (ML) and deep learning (DL) techniques, employing a stacking ensemble method to enhance detection accuracy by integrating the strengths of multiple classifiers. To ensure real-time performance, the IDS is implemented within a Kappa Architecture framework, enabling continuous processing of IoMT data streams. The system effectively detects and classifies a wide range of cyberattacks, including ARP spoofing, DoS, Smurf, and Port Scan, achieving an outstanding detection accuracy of 0.991 in binary classification and 0.993 in multi-class classification. This research highlights the potential of combining advanced ML and DL methods with ensemble learning to address the unique cybersecurity challenges of IoMT systems, providing a reliable and scalable solution for safeguarding healthcare services. Full article
(This article belongs to the Special Issue Sensors in mHealth Applications)
Show Figures

Figure 1

Figure 1
<p>The workflow of the proposed model.</p>
Full article ">Figure 2
<p>Overview of attack and normal instance distribution.</p>
Full article ">Figure 3
<p>Summary of the dataset’s statistical attributes.</p>
Full article ">Figure 4
<p>Kappa architecture.</p>
Full article ">Figure 5
<p>The architecture of the IoMT network with our proposed scheme integrated.</p>
Full article ">Figure 6
<p>Performance Metrics of Stacking and Machine Learning Models within the Kappa Architecture for Binary Classification.</p>
Full article ">Figure 7
<p>Performance metrics of stacking and machine learning models within the Kappa Architecture for multi-class classification.</p>
Full article ">Figure 8
<p>Model comparison for binary classification.</p>
Full article ">Figure 9
<p>Model comparison for multi-class classification.</p>
Full article ">Figure 10
<p>Detection time comparison: with vs. without Kappa Architecture.</p>
Full article ">
22 pages, 11189 KiB  
Article
VUF-MIWS: A Visible and User-Friendly Watermarking Scheme for Medical Images
by Chia-Chen Lin, Yen-Heng Lin, En-Ting Chu, Wei-Liang Tai and Chun-Jung Lin
Electronics 2025, 14(1), 122; https://doi.org/10.3390/electronics14010122 - 30 Dec 2024
Viewed by 664
Abstract
The integration of Internet of Medical Things (IoMT) technology has revolutionized healthcare, allowing rapid access to medical images and enhancing remote diagnostics in telemedicine. However, this advancement raises serious cybersecurity concerns, particularly regarding unauthorized access and data integrity. This paper presents a novel, [...] Read more.
The integration of Internet of Medical Things (IoMT) technology has revolutionized healthcare, allowing rapid access to medical images and enhancing remote diagnostics in telemedicine. However, this advancement raises serious cybersecurity concerns, particularly regarding unauthorized access and data integrity. This paper presents a novel, user-friendly, visible watermarking scheme for medical images—Visual and User-Friendly Medical Image Watermarking Scheme (VUF-MIWS)—designed to secure medical image ownership while maintaining usability for diagnostic purposes. VUF-MIWS employs a unique combination of inpainting and data hiding techniques to embed hospital logos as visible watermarks, which can be removed seamlessly once image authenticity is verified, restoring the image to its original state. Experimental results demonstrate the scheme’s robust performance, with the watermarking process preserving critical diagnostic information with high fidelity. The method achieved Peak Signal-to-Noise Ratios (PSNR) above 70 dB and Structural Similarity Index Measures (SSIM) of 0.99 for inpainted images, indicating minimal loss of image quality. Additionally, VUF-MIWS effectively restored the ROI region of medical images post-watermark removal, as verified through test cases with restored watermarked regions matching the original images. These findings affirm VUF-MIWS’s suitability for secure telemedicine applications. Full article
Show Figures

Figure 1

Figure 1
<p>Extra verification procedure for doctors.</p>
Full article ">Figure 2
<p>Framework of Yu et al.’s enhanced generative inpainting framework [<a href="#B19-electronics-14-00122" class="html-bibr">19</a>].</p>
Full article ">Figure 3
<p>Inpainting results of Yu et al.’s scheme [<a href="#B19-electronics-14-00122" class="html-bibr">19</a>]. (<b>a</b>) Original image; (<b>b</b>) Original image; (<b>c</b>) Original image; (<b>d</b>) Image (<b>a</b>) with a mask; (<b>e</b>) Image (<b>b</b>) with a mask; (<b>f</b>) Image (<b>c</b>) with a mask; (<b>g</b>) Inpainting results of (<b>d</b>) (PSNR = 26.45 dB); (<b>h</b>) Inpainting results of (<b>e</b>) (PSNR = 43.37 dB); (<b>i</b>) Inpainting results of (<b>f</b>) (PSNR = 54.21 dB).</p>
Full article ">Figure 4
<p>The enhancement of Yu et al.’s [<a href="#B19-electronics-14-00122" class="html-bibr">19</a>] model and the details of GAN network. (<b>a</b>) The enhancement of Yu et al.’s [<a href="#B19-electronics-14-00122" class="html-bibr">19</a>] model; (<b>b</b>) Generative Adversarial Network.</p>
Full article ">Figure 5
<p>Framework of the proposed VUF-MIWS.</p>
Full article ">Figure 6
<p>Flowchart of the recovery information generation phase.</p>
Full article ">Figure 7
<p>Flowchart of the embedding phase.</p>
Full article ">Figure 8
<p>The circular hiding path for embedding at the LL subband.</p>
Full article ">Figure 9
<p>Flowchart of the watermark removal and restoration.</p>
Full article ">Figure 10
<p>Eight medical test images. (<b>a</b>) 10.png; (<b>b</b>) 11.png; (<b>c</b>) 14.png; (<b>d</b>) 16.png; (<b>e</b>) 19.png; (<b>f</b>) 26.png; (<b>g</b>) 31.png; (<b>h</b>) 57.png.</p>
Full article ">Figure 11
<p>Two datasets are used to test the stable performance of the proposed scheme. (<b>a</b>–<b>d</b>) are Dataset 1, images of the pituitary gland taken from back to front. (<b>e</b>–<b>h</b>) are Dataset 2, images of the pituitary gland taken from top to bottom.</p>
Full article ">Figure 12
<p>Six general grayscale images sized 512 × 512 are used for the third experiment.</p>
Full article ">Figure 13
<p>The logo with a size of 64 × 64. (<b>a</b>) NCUT logo, and (<b>b</b>) Squirrel logo.</p>
Full article ">Figure 14
<p>In the first and second experiments, nine sub-regions were designated as position candidates for the visible watermark.</p>
Full article ">Figure 15
<p>Eight watermarked images. (<b>a</b>) Watermarked 10.png; (<b>b</b>) Watermarked 11.png; (<b>c</b>) Watermarked 14.png; (<b>d</b>) Watermarked 16.png; (<b>e</b>) Watermarked 19.png; (<b>f</b>) Watermarked 26.png; (<b>g</b>) Watermarked 31.png; (<b>h</b>) Watermarked 57.png.</p>
Full article ">Figure 16
<p>The restored images. (<b>a</b>) Restored 10.png; (<b>b</b>) Restored 11.png; (<b>c</b>) Restored 14.png; (<b>d</b>) Restored 16.png; (<b>e</b>) Restored 19.png; (<b>f</b>) Restored 26.png; (<b>g</b>) Restored 31.png; (<b>h</b>) Restored 57.png.</p>
Full article ">Figure 17
<p>Image recovery analysis. (<b>a</b>) Enlarged part of 11.png; (<b>b</b>) Enlarged watermarked of (<b>a</b>); (<b>c</b>) Restored image of (<b>b</b>); (<b>d</b>) Enlarged part of 14.png; (<b>e</b>) Enlarged watermarked of (<b>d</b>); (<b>f</b>) Restored image of (<b>e</b>).</p>
Full article ">Figure 18
<p>Inpainting results analysis. (<b>a</b>) Inpainting results of Yu [<a href="#B19-electronics-14-00122" class="html-bibr">19</a>]; (<b>b</b>) Histogram analysis of Yu [<a href="#B19-electronics-14-00122" class="html-bibr">19</a>]; (<b>c</b>) Inpainting results of the proposed scheme; (<b>d</b>) Histogram analysis of the proposed scheme.</p>
Full article ">
21 pages, 2042 KiB  
Article
EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks
by Sakshi Patni and Joohyung Lee
Future Internet 2025, 17(1), 2; https://doi.org/10.3390/fi17010002 - 25 Dec 2024
Viewed by 650
Abstract
The development of medical data and resources has become essential for enhancing patient outcomes and operational efficiency in an age when digital innovation in healthcare is becoming more important. The rapid growth of the Internet of Medical Things (IoMT) is changing healthcare data [...] Read more.
The development of medical data and resources has become essential for enhancing patient outcomes and operational efficiency in an age when digital innovation in healthcare is becoming more important. The rapid growth of the Internet of Medical Things (IoMT) is changing healthcare data management, but it also brings serious issues like data privacy, malicious attacks, and service quality. In this study, we present EdgeGuard, a novel decentralized architecture that combines blockchain technology, federated learning, and edge computing to address those challenges and coordinate medical resources across IoMT networks. EdgeGuard uses a privacy-preserving federated learning approach to keep sensitive medical data local and to promote collaborative model training, solving essential issues. To prevent data modification and unauthorized access, it uses a blockchain-based access control and integrity verification system. EdgeGuard uses edge computing to improve system scalability and efficiency by offloading computational tasks from IoMT devices with limited resources. We have made several technological advances, including a lightweight blockchain consensus mechanism designed for IoMT networks, an adaptive edge resource allocation method based on reinforcement learning, and a federated learning algorithm optimized for medical data with differential privacy. We also create an access control system based on smart contracts and a secure multi-party computing protocol for model updates. EdgeGuard outperforms existing solutions in terms of computational performance, data value, and privacy protection across a wide range of real-world medical datasets. This work enhances safe, effective, and privacy-preserving medical data management in IoMT ecosystems while maintaining outstanding standards for data security and resource efficiency, enabling large-scale collaborative learning in healthcare. Full article
(This article belongs to the Special Issue Edge Intelligence: Edge Computing for 5G and the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>EdgeGuard: a secure federated learning framework for IoMT.</p>
Full article ">Figure 2
<p>Model accuracy convergence.</p>
Full article ">Figure 3
<p>Communication efficiency.</p>
Full article ">Figure 4
<p>Security Robustness Under Different Attacks.</p>
Full article ">
25 pages, 2970 KiB  
Article
An Android-Based Internet of Medical Things Adaptive User Authentication and Authorization Model for the Elderly
by Prudence M. Mavhemwa, Marco Zennaro, Philibert Nsengiyumva and Frederic Nzanywayingoma
J. Cybersecur. Priv. 2024, 4(4), 993-1017; https://doi.org/10.3390/jcp4040046 - 2 Dec 2024
Viewed by 1360
Abstract
Globally, 77% of the elderly aged 65 and above suffer from multiple chronic ailments, according to recent research. However, several barriers within the healthcare system in the developing world hinder the adoption of home-based patient management, hence the need for the IoMT, whose [...] Read more.
Globally, 77% of the elderly aged 65 and above suffer from multiple chronic ailments, according to recent research. However, several barriers within the healthcare system in the developing world hinder the adoption of home-based patient management, hence the need for the IoMT, whose application raises security concerns, particularly in authentication. Several authentication techniques have been proposed; however, they lack a balance of security and usability. This paper proposes a Naive Bayes based adaptive user authentication app that calculates the risk associated with a login attempt on an Android device for elderly users, using their health conditions, risk score, and available authenticators. This authentication technique guided by the MAPE-KHMT framework makes use of embedded smartphone sensors. Results indicate a 100% and 98.6% accuracy in usable-security metrics, while cross-validation and normalization results also support the accuracy, efficiency, effectiveness, and usability of our model with room for scaling it up without computational costs and generalizing it beyond SSA. The post-deployment evaluation also confirms that users found the app usable and secure. A few areas need further refinement to improve the accuracy, usability, security, and acceptance but the model shows potential to improve users’ compliance with IoMT security, thereby promoting the attainment of SDG3. Full article
Show Figures

Figure 1

Figure 1
<p>Examples of factors used in MFA. Reproduced with permission from Hazratifard et al. [<a href="#B9-jcp-04-00046" class="html-bibr">9</a>].</p>
Full article ">Figure 2
<p>General Architecture.</p>
Full article ">Figure 3
<p>Login process until authorization.</p>
Full article ">Figure 4
<p>Signup and login screens.</p>
Full article ">Figure 5
<p>Overall confusion matrix and statistics.</p>
Full article ">Figure 6
<p>ROC curve for authentication and authorization.</p>
Full article ">Figure 7
<p>Confusion matrix and statistics for health impact on authentication.</p>
Full article ">Figure 8
<p>Confusion matrix and statistics for the train–test split and L1, L2 normalization.</p>
Full article ">Figure 9
<p>Confusion matrix and statistics for the cross-validation option.</p>
Full article ">Figure 10
<p>Distance analysis.</p>
Full article ">Figure 11
<p>Distance graph.</p>
Full article ">Figure 12
<p>Snippet of success ratio.</p>
Full article ">Figure 13
<p>App consideration of user medical conditions.</p>
Full article ">Figure 14
<p>Usability metrics.</p>
Full article ">Figure 15
<p>App recommendation to others.</p>
Full article ">
813 KiB  
Proceeding Paper
An Extreme Gradient Boosting Approach for Elderly Falls Classification
by Paulo Monteiro de Carvalho Monson, Vinicius Toledo Dias, Giovanni Oliveira de Sousa, Gabriel Augusto David, Fabio Romano Lofrano Dotto and Pedro de Oliveira Conceição Junior
Eng. Proc. 2024, 82(1), 91; https://doi.org/10.3390/ecsa-11-20441 - 25 Nov 2024
Viewed by 183
Abstract
Falls pose a significant threat to the elderly population, often resulting in severe health complications such as fractures and other adverse outcomes, which can drastically lower their quality of life. The early detection of fall risks is crucial in mitigating the impact of [...] Read more.
Falls pose a significant threat to the elderly population, often resulting in severe health complications such as fractures and other adverse outcomes, which can drastically lower their quality of life. The early detection of fall risks is crucial in mitigating the impact of such events. Various technologies have been developed to address this issue, including alert systems that notify users of imminent risks due to environmental factors or physiological changes. However, accurately detecting and distinguishing between normal activities, imminent fall risks, and actual falls remains a challenge. This study proposes a machine learning approach using the XGBoost algorithm to improve the fall detection accuracy among the elderly. A dataset comprising 2039 samples of data on the proximity to objects, spatial location changes, heart rate, blood oxygen saturation (SpO2), blood sugar levels, and pressure applied by the user, categorized into normal, imminent fall risk, and fall classes, was utilized to train and test the model. The model was trained on 70% of the data, with 30% allocated for testing. Hyperparameter optimization was performed using a randomized search with cross-validation. Previous studies have reported an accuracy of 0.9667 for the same dataset. In contrast, this study achieved an accuracy of 1.0, demonstrating a significant improvement in the overall performance compared to earlier work. The confusion matrix demonstrates the model’s ability to distinguish between all three classes with no false positives. Additionally, sensitivity tests were conducted by varying the training sample sizes and randomizing the data splits, confirming the model’s robustness in different conditions. These results show that the proposed method was able to correctly sort all the samples in the training and tests, outperforming previous studies in detecting fall-related events, reducing the likelihood of false alarms, and enhancing resource allocation for elderly care. Full article
Show Figures

Figure 1

Figure 1
<p>Confusion matrix for test data.</p>
Full article ">Figure 2
<p>Principal component analysis for test data.</p>
Full article ">
18 pages, 1337 KiB  
Systematic Review
The Use of Smart Rings in Health Monitoring—A Meta-Analysis
by Matteo Fiore, Alessandro Bianconi, Gaia Sicari, Alice Conni, Jacopo Lenzi, Giulia Tomaiuolo, Flavia Zito, Davide Golinelli and Francesco Sanmarchi
Appl. Sci. 2024, 14(23), 10778; https://doi.org/10.3390/app142310778 - 21 Nov 2024
Viewed by 3638
Abstract
Smart Rings (SRs) are user-friendly devices capable of measuring various health parameters, making them suitable for remote continuous monitoring in diverse clinical settings. Since the available evidence on the accuracy of SRs recording health data is highly heterogeneous, this systematic review, conducted in [...] Read more.
Smart Rings (SRs) are user-friendly devices capable of measuring various health parameters, making them suitable for remote continuous monitoring in diverse clinical settings. Since the available evidence on the accuracy of SRs recording health data is highly heterogeneous, this systematic review, conducted in accordance with PRISMA guidelines, searched for articles evaluating the efficacy of SRs for sleep, respiratory, and cardiovascular monitoring across the PubMed, SCOPUS, and ProQuest databases. Meta-analyses were conducted for health outcomes evaluated in at least three studies with a comparable study population and design, and the same comparison device. Nineteen articles were included: eleven analyses focused on sleep quality, eight on cardiovascular parameters, and one on oxygen saturation. Studies analysing cardiovascular outcomes found a good accuracy of SRs in measuring heart rate (HR) with a mean bias of −0.4 bpms (limits of agreement (LoAs): −2.7; 1.8). The meta-analyses showed variability in SRs’ efficacy in monitoring total sleep time (mean bias: −21.3 min, LoAs: −69.9, 27.4) and REM duration (mean bias: −18.2 min, LoAs: −33.3, −3.1). The results highlighted the promising potential of SRs for HR monitoring. Further research is needed to clarify the reliability of SRs in monitoring sleep quality and their use directed to a broader range of health parameters. With further development, SRs could become valuable tools for healthcare professionals. Full article
(This article belongs to the Special Issue Advanced Technologies for Health Improvement)
Show Figures

Figure 1

Figure 1
<p>(<b>A</b>) SR’s concept of function. The SR registers and collects the health data (SpO2, heart rate and others) communicating with smartphones or other devices. These data can be used to monitor patient vital signs and alert healthcare professionals to potential problems or changes in a patient’s condition. (<b>B</b>) IoMT ecosystem architecture and layers. The collection layer consists of medical sensors. Devices collect the health data and transmit them to a gateway node. The communication layer stores those data and analyses them using conventional threshold values to report any abnormality. Last is the application layer: using a web-based interface, medical professionals can check and verify the diagnostics and take corresponding measures.</p>
Full article ">Figure 2
<p>PRISMA flowchart describing the selection process of the included studies.</p>
Full article ">Figure 3
<p>(<b>A</b>) Sleep studies: control device characteristics. PSG: polysomnography. EEG: electroencephalography. (<b>B</b>) Sleep studies: smart ring characteristics. Gen: generation.</p>
Full article ">Figure 4
<p>(<b>A</b>) Cardiovascular studies: control device. PSG: polysomnography. ECG: Electrocardiogram. BP: Blood Pressure. (<b>B</b>) Cardiovascular studies: smart ring type. Gen: generation.</p>
Full article ">
22 pages, 945 KiB  
Review
Resilience in the Internet of Medical Things: A Review and Case Study
by Vikas Tomer, Sachin Sharma and Mark Davis
Future Internet 2024, 16(11), 430; https://doi.org/10.3390/fi16110430 - 20 Nov 2024
Viewed by 1233
Abstract
The Internet of Medical Things (IoMT), an extension of the Internet of Things (IoT), is still in its early stages of development. Challenges that are inherent to IoT, persist in IoMT as well. The major focus is on data transmission within the healthcare [...] Read more.
The Internet of Medical Things (IoMT), an extension of the Internet of Things (IoT), is still in its early stages of development. Challenges that are inherent to IoT, persist in IoMT as well. The major focus is on data transmission within the healthcare domain due to its profound impact on health and public well-being. Issues such as latency, bandwidth constraints, and concerns regarding security and privacy are critical in IoMT owing to the sensitive nature of patient data, including patient identity and health status. Numerous forms of cyber-attacks pose threats to IoMT networks, making the reliable and secure transmission of critical medical data a challenging task. Several other situations, such as natural disasters, war, construction works, etc., can cause IoMT networks to become unavailable and fail to transmit the data. The first step in these situations is to recover from failure as quickly as possible, resume the data transfer, and detect the cause of faults, failures, and errors. Several solutions exist in the literature to make the IoMT resilient to failure. However, no single approach proposed in the literature can simultaneously protect the IoMT networks from various attacks, failures, and faults. This paper begins with a detailed description of IoMT and its applications. It considers the underlying requirements of resilience for IoMT networks, such as monitoring, control, diagnosis, and recovery. This paper comprehensively analyzes existing research efforts to provide IoMT network resilience against diverse causes. After investigating several research proposals, we identify that the combination of software-defined networks (SDNs), machine learning (ML), and microservices architecture (MSA) has the capabilities to fulfill the requirements for achieving resilience in the IoMT networks. It mainly focuses on the analysis of technologies, such as SDN, ML, and MSA, separately, for meeting the resilience requirements in the IoMT networks. SDN can be used for monitoring and control, and ML can be used for anomaly detection and diagnosis, whereas MSA can be used for bringing distributed functionality and recovery into the IoMT networks. This paper provides a case study that describes the remote patient monitoring (RPM) of a heart patient in IoMT networks. It covers the different failure scenarios in IoMT infrastructure. Finally, we provide a proposed methodology that elaborates how distributed functionality can be achieved during these failures using machine learning, software-defined networks, and microservices technologies. Full article
(This article belongs to the Special Issue The Future Internet of Medical Things II)
Show Figures

Figure 1

Figure 1
<p>Possible issues of remote patient monitoring.</p>
Full article ">Figure 2
<p>Functional components of IoMT.</p>
Full article ">Figure 3
<p>Mapping of critical requirements into key technologies for resilient IoMT networks.</p>
Full article ">Figure 4
<p>Failure scenario in a general layerwise architecture.</p>
Full article ">Figure 5
<p>A single-point-of-failure issue in an IoMT network.</p>
Full article ">Figure 6
<p>An expected framework of IoMT networks with distributed functionality and resilience.</p>
Full article ">Figure 7
<p>Proposed architecture by using the combination of SDN, ML, and MSA.</p>
Full article ">
23 pages, 1624 KiB  
Article
An Explainable Deep Learning-Enhanced IoMT Model for Effective Monitoring and Reduction of Maternal Mortality Risks
by Sherine Nagy Saleh, Mazen Nabil Elagamy, Yasmine N. M. Saleh and Radwa Ahmed Osman
Future Internet 2024, 16(11), 411; https://doi.org/10.3390/fi16110411 - 8 Nov 2024
Cited by 1 | Viewed by 1519
Abstract
Maternal mortality (MM) is considered one of the major worldwide concerns. Despite the advances of artificial intelligence (AI) in healthcare, the lack of transparency in AI models leads to reluctance to adopt them. Employing explainable artificial intelligence (XAI) thus helps improve the transparency [...] Read more.
Maternal mortality (MM) is considered one of the major worldwide concerns. Despite the advances of artificial intelligence (AI) in healthcare, the lack of transparency in AI models leads to reluctance to adopt them. Employing explainable artificial intelligence (XAI) thus helps improve the transparency and effectiveness of AI-driven healthcare solutions. Accordingly, this article proposes a complete framework integrating an Internet of Medical Things (IoMT) architecture with an XAI-based deep learning model. The IoMT system continuously monitors pregnant women’s vital signs, while the XAI model analyzes the collected data to identify risk factors and generate actionable insights. Additionally, an efficient IoMT transmission model is developed to ensure reliable data transfer with the best-required system quality of service (QoS). Further analytics are performed on the data collected from different regions in a country to address high-risk cities. The experiments demonstrate the effectiveness of the proposed framework by achieving an accuracy of 80% for patients and 92.6% for regional risk prediction and providing interpretable explanations. The XAI-generated insights empower healthcare providers to make informed decisions and implement timely interventions. Furthermore, the IoMT transmission model ensures efficient and secure data transfer. Full article
(This article belongs to the Special Issue eHealth and mHealth)
Show Figures

Figure 1

Figure 1
<p>Proposed region monitoring scheme.</p>
Full article ">Figure 2
<p>Proposed patient monitoring scheme.</p>
Full article ">Figure 3
<p>Proposed deep learning model for risk classification.</p>
Full article ">Figure 4
<p>Proposed patient monitoring transmission scheme.</p>
Full article ">Figure 5
<p>Pearson correlation of the region-based MMR assessment using all 33 features. The naming labels denote only the odd features from the list.</p>
Full article ">Figure 6
<p>Accuracy and loss training and validation charts for the state dataset.</p>
Full article ">Figure 7
<p>Feature influence on the low-risk class (<b>a</b>) and the high-risk class (<b>b</b>) in the region dataset.</p>
Full article ">Figure 8
<p>Pearson correlation of the dataset features.</p>
Full article ">Figure 9
<p>Box plot showing the range of values for each feature and whether there are any outliers.</p>
Full article ">Figure 10
<p>SHAP summary showing feature influence for low-risk (<b>a</b>), medium-risk (<b>b</b>), and high-risk (<b>c</b>) patients.</p>
Full article ">Figure 11
<p>LIME analysis for three different patient records: one at low risk (<b>a</b>), another at a mid-level of risk (<b>b</b>), and the final at high risk (<b>c</b>).</p>
Full article ">Figure 12
<p>Required transmission power for the UP/DL communication (dBm) versus interfering devices’ transmission power (<math display="inline"><semantics> <msub> <mi>P</mi> <mi>I</mi> </msub> </semantics></math>) (dBm).</p>
Full article ">Figure 13
<p>Overall energy efficiency for the UP/DL communication (EE) (bit/J) versus interfering devices’ transmission power <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>P</mi> <mi>I</mi> </msub> <mo>)</mo> </mrow> </semantics></math> (dBm). Subfigures (<b>a</b>–<b>e</b>) correspond to distances between source S1 and destination D1 and between destinations D1 and D2 of 50 m, 100 m, 150 m, 200 m, and 250 m, respectively.</p>
Full article ">Figure 14
<p>(<b>a</b>) Required smart monitor device transmission power <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>P</mi> <mrow> <mi>S</mi> <mi>r</mi> <mi>e</mi> <mi>q</mi> </mrow> </msub> <mo>)</mo> </mrow> </semantics></math> (dBm) versus the required uplink QoS <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>Q</mi> <mrow> <mi>U</mi> <mi>L</mi> </mrow> </msub> <mo>)</mo> </mrow> </semantics></math>. (<b>b</b>) Required gateway transmission power <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>P</mi> <mrow> <mi>S</mi> <mi>r</mi> <mi>e</mi> <mi>q</mi> </mrow> </msub> <mo>)</mo> </mrow> </semantics></math> (dBm) versus the required downlink QoS <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>Q</mi> <mrow> <mi>D</mi> <mi>L</mi> </mrow> </msub> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">
Back to TopTop