Blockchain-enabled digital twin system for brain stroke prediction.

Brain Inform

Department of Computing, Glasgow Caledonian University, Glasgow, G4 0BA, Scotland.

Published: January 2025

A digital twin is a virtual model of a real-world system that updates in real-time. In healthcare, digital twins are gaining popularity for monitoring activities like diet, physical activity, and sleep. However, their application in predicting serious conditions such as heart attacks, brain strokes and cancers remains under investigation, with current research showing limited accuracy in such predictions. Moreover, concerns around data security and privacy continue to challenge the widespread adoption of these models. To address these challenges, we developed a secure, machine learning powered digital twin application with three main objectives enhancing prediction accuracy, strengthening security, and ensuring scalability. The application achieved an accuracy of 98.28% for brain stroke prediction on the selected dataset. The data security was enhanced by integrating consortium blockchain technology with machine learning. The results show that the application is tamper-proof and is capable of detecting and automatically correcting backend data anomalies to maintain robust data protection. The application can be extended to monitor other pathologies such as heart attacks, cancers, osteoporosis, and epilepsy with minimal configuration changes.

Download full-text PDF

Source
http://dx.doi.org/10.1186/s40708-024-00247-6DOI Listing

Publication Analysis

Top Keywords

digital twin
12
brain stroke
8
stroke prediction
8
heart attacks
8
data security
8
machine learning
8
application
5
blockchain-enabled digital
4
twin system
4
system brain
4

Similar Publications

Optimal control of agent-based models via surrogate modeling.

PLoS Comput Biol

January 2025

Laboratory for Systems Medicine, Department of Medicine, University of Florida, Gainesville, Florida, United States of America.

This paper describes and validates an algorithm to solve optimal control problems for agent-based models (ABMs). For a given ABM and a given optimal control problem, the algorithm derives a surrogate model, typically lower-dimensional, in the form of a system of ordinary differential equations (ODEs), solves the control problem for the surrogate model, and then transfers it back to the original ABM. It applies to quite general ABMs and offers several options for the ODE structure, depending on what information about the ABM is to be used.

View Article and Find Full Text PDF

A digital twin is a virtual model of a real-world system that updates in real-time. In healthcare, digital twins are gaining popularity for monitoring activities like diet, physical activity, and sleep. However, their application in predicting serious conditions such as heart attacks, brain strokes and cancers remains under investigation, with current research showing limited accuracy in such predictions.

View Article and Find Full Text PDF

Deep learning has performed well in feature extraction and pattern recognition and has been widely studied in the field of fault diagnosis. However, in practical engineering applications, the lack of sample size limits the potential of deep learning in fault diagnosis. Moreover, in engineering practice, it is usually necessary to obtain multidimensional fault information (such as fault localization and quantification), while current methods mostly only provide single-dimensional information.

View Article and Find Full Text PDF

Cybersecurity Solutions for Industrial Internet of Things-Edge Computing Integration: Challenges, Threats, and Future Directions.

Sensors (Basel)

January 2025

Department of Computer Science and Engineering, Yanbu Industrial College, Royal Commission for Jubail and Yanbu, Yanbu Industrial City 41912, Saudi Arabia.

This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT-edge computing). We systematically collected and analyzed the relevant literature from the past five years, applying a rigorous methodology to identify key sources. Our study highlights the prevalent IIoT layer attacks, common intrusion methods, and critical threats facing IIoT-edge computing environments.

View Article and Find Full Text PDF

Civil infrastructure assets' contribution to countries' economic growth is significantly increasing due to the rapid population growth and demands for public services. These civil infrastructures, including roads, bridges, railways, tunnels, dams, residential complexes, and commercial buildings, experience significant deterioration from the surrounding harsh environment. Traditional methods of visual inspection and non-destructive tests are generally undertaken to monitor and evaluate the structural health of the infrastructure.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!