Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (15)

Search Parameters:
Keywords = person-to-person transmission inference

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 443 KiB  
Article
Revocable Attribute-Based Encryption with Efficient and Secure Verification in Smart Health Systems
by Zhou Chen, Lidong Han and Baokun Hu
Mathematics 2025, 13(9), 1541; https://doi.org/10.3390/math13091541 - 7 May 2025
Viewed by 535
Abstract
By leveraging Internet of Things (IoT) technology, patients can utilize medical devices to upload their collected personal health records (PHRs) to the cloud for analytical processing or transmission to doctors, which embodies smart health systems and greatly enhances the efficiency and accessibility of [...] Read more.
By leveraging Internet of Things (IoT) technology, patients can utilize medical devices to upload their collected personal health records (PHRs) to the cloud for analytical processing or transmission to doctors, which embodies smart health systems and greatly enhances the efficiency and accessibility of healthcare management. However, the highly sensitive nature of PHRs necessitates efficient and secure transmission mechanisms. Revocable and verifiable attribute-based encryption (ABE) enables dynamic fine-grained access control and can verify the integrity of outsourced computation results via a verification tag. However, most existing schemes have two vital issues. First, in order to achieve the verifiable function, they need to execute the secret sharing operation twice during the encryption process, which significantly increases the computational overhead. Second, during the revocation operation, the verification tag is not updated simultaneously, so revoked users can infer plaintext through the unchanged tag. To address these challenges, we propose a revocable ABE scheme with efficient and secure verification, which not only reduces local computational load by optimizing the encryption algorithm and outsourcing complex operations to the cloud server, but also updates the tag when revocation operation occurs. We present a rigorous security analysis of our proposed scheme, and show that the verification tag retains its verifiability even after being dynamically updated. Experimental results demonstrate that local encryption and decryption costs are stable and low, which fully meets the real-time and security requirements of smart health systems. Full article
Show Figures

Figure 1

21 pages, 6991 KiB  
Article
A Process Decision-Making Method for Planar Machining of Box-Type Components
by Zhongkun Shi, Meifa Huang, Zhemin Tang, Zecheng Hu and Weihao Hu
Appl. Sci. 2025, 15(7), 4029; https://doi.org/10.3390/app15074029 - 6 Apr 2025
Viewed by 401
Abstract
The process of decision-making for machining box-type components plays a crucial role in the technological design of mechanical components. Currently, the selection of process parameters for box-type parts often relies on designers consulting manuals or on personal experience. Moreover, different designers utilize independent [...] Read more.
The process of decision-making for machining box-type components plays a crucial role in the technological design of mechanical components. Currently, the selection of process parameters for box-type parts often relies on designers consulting manuals or on personal experience. Moreover, different designers utilize independent and heterogeneous Computer-Aided Process Planning (CAPP) systems, leading to uncertainties in process design and difficulties in sharing and transmitting process knowledge. This paper proposes an ontology-based process decision-making method for the planar machining of box-type parts to infer the appropriate machining process parameters. First, a hierarchical information representation model for process decision-making in planar machining is constructed to describe the decision-making process. Second, an ontology model for process decision-making in planar machining is developed based on relevant concepts and relationships involved in the decision-making process. Third, reasoning rules for planar machining process decisions are established using Semantic Web Rule Language (SWRL), incorporating part feature information and process knowledge to infer reasonable process methods and operation dimensions. Finally, a case study of gear transmission housing is presented to illustrate the working process of the proposed method and verify its effectiveness. Full article
Show Figures

Figure 1

24 pages, 5495 KiB  
Article
Generative Image Steganography via Encoding Pose Keypoints
by Yi Cao, Wentao Ge, Chengsheng Yuan and Quan Wang
Appl. Sci. 2025, 15(1), 58; https://doi.org/10.3390/app15010058 - 25 Dec 2024
Cited by 1 | Viewed by 1421
Abstract
Existing generative image steganography methods typically encode secret information into latent vectors, which are transformed into the entangled features of generated images. This approach faces two main challenges: (1) Transmission can degrade the quality of stego-images, causing bit errors in information extraction. (2) [...] Read more.
Existing generative image steganography methods typically encode secret information into latent vectors, which are transformed into the entangled features of generated images. This approach faces two main challenges: (1) Transmission can degrade the quality of stego-images, causing bit errors in information extraction. (2) High embedding capacity often reduces the accuracy of information extraction. To overcome these limitations, this paper presents a novel generative image steganography via encoding pose keypoints. This method employs an LSTM-based sequence generation model to embed secret information into the generation process of pose keypoint sequences. Each generated sequence is drawn as a keypoint connectivity graph, which serves as input with an original image to a trained pose-guided person image generation model (DPTN-TA) to generate an image with the target pose. The sender uploads the generated images to a public channel to transmit the secret information. On the receiver’s side, an improved YOLOv8 pose estimation model extracts the pose keypoints from the stego-images and decodes the embedded secret information using the sequence generation model. Extensive experiments on the DeepFashion dataset show that the proposed method significantly outperforms state-of-the-art methods in information extraction accuracy, achieving 99.94%. It also achieves an average hiding capacity of 178.4 bits per image. This method is robust against common image attacks, such as salt and pepper noise, median filtering, compression, and screenshots, with an average bit error rate of less than 0.87%. Additionally, the method is optimized for fast inference and lightweight deployment, enhancing its real-world applicability. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

12 pages, 3569 KiB  
Article
Advance Monitoring of COVID-19 Incidence Based on Taxi Mobility: The Infection Ratio Measure
by Jesus S. Aguilar-Ruiz, Roberto Ruiz and Raúl Giráldez
Healthcare 2024, 12(5), 517; https://doi.org/10.3390/healthcare12050517 - 21 Feb 2024
Viewed by 1719
Abstract
The COVID-19 pandemic has had a profound impact on various aspects of our lives, affecting personal, occupational, economic, and social spheres. Much has been learned since the early 2020s, which will be very useful when the next pandemic emerges. In general, mobility and [...] Read more.
The COVID-19 pandemic has had a profound impact on various aspects of our lives, affecting personal, occupational, economic, and social spheres. Much has been learned since the early 2020s, which will be very useful when the next pandemic emerges. In general, mobility and virus spread are strongly related. However, most studies analyze the impact of COVID-19 on mobility, but not much research has focused on analyzing the impact of mobility on virus transmission, especially from the point of view of monitoring virus incidence, which is extremely important for making sound decisions to control any epidemiological threat to public health. As a result of a thorough analysis of COVID-19 and mobility data, this work introduces a novel measure, the Infection Ratio (IR), which is not sensitive to underestimation of positive cases and is very effective in monitoring the pandemic’s upward or downward evolution when it appears to be more stable, thus anticipating possible risk situations. For a bounded spatial context, we can infer that there is a significant threshold in the restriction of mobility that determines a change of trend in the number of infections that, if maintained for a minimum period, would notably increase the chances of keeping the spread of disease under control. Results show that IR is a reliable indicator of the intensity of infection, and an effective measure for early monitoring and decision making in smart cities. Full article
(This article belongs to the Special Issue Human Health Before, During, and After COVID-19)
Show Figures

Figure 1

12 pages, 303 KiB  
Article
An Investigation of Risk Factors Associated with Tuberculosis Transmission in South Africa Using Logistic Regression Model
by Tshepo Frans Maja and Daniel Maposa
Infect. Dis. Rep. 2022, 14(4), 609-620; https://doi.org/10.3390/idr14040066 - 18 Aug 2022
Cited by 7 | Viewed by 3233
Abstract
Background: South Africa has a high burden of tuberculosis (TB) disease and is currently not meeting the national and international reduction outcome targets. The TB prevalence rate of South Africa in 2015 was estimated at approximately 690 per 100,000 population per year, with [...] Read more.
Background: South Africa has a high burden of tuberculosis (TB) disease and is currently not meeting the national and international reduction outcome targets. The TB prevalence rate of South Africa in 2015 was estimated at approximately 690 per 100,000 population per year, with an incidence rate of about 834 per 100,000 population. This study examines risk factors associated with development of TB in South Africa. Materials and Methods: This study utilised readily available open access secondary data of 2019 South African Health and Demographic Survey from Statistics South Africa (StatsSA) website, which was collected from self-reported information relating to TB in the household questionnaire. The factors analysed were of demographic, socio-economic and health nature. Bivariate and binary logistics analyses were carried out from which appropriate inferences were drawn on the association of TB with demographic, socio-economic and health factors. Results: In multivariate analysis the study revealed that age, personal weight, smoke, alcohol, asthma, province of residence, race and usually coughing were significantly associated with an increased risk of having TB. Conclusions and Recommendations: The results strongly suggest that young and older people coming from black and coloured ethic groups, who are asthmatic and cough frequently, and/or smoking and consuming alcohol are at high risk of developing TB. In addition, those who are overweight appear to have an increased risk of TB transmission, with the Western Cape, Eastern Cape, Northern Cape, Free State, North West and Gauteng being the hardest hit provinces. Hence, the study recommends that these factors must be taken into account in the planning and development of TB policies in order to work successfully towards the achievement of sustainable development goal of reducing TB by 80% before 2030. Full article
15 pages, 2842 KiB  
Article
Automatic Face Mask Detection System in Public Transportation in Smart Cities Using IoT and Deep Learning
by Tamilarasan Ananth Kumar, Rajendrane Rajmohan, Muthu Pavithra, Sunday Adeola Ajagbe, Rania Hodhod and Tarek Gaber
Electronics 2022, 11(6), 904; https://doi.org/10.3390/electronics11060904 - 15 Mar 2022
Cited by 62 | Viewed by 8067
Abstract
The World Health Organization (WHO) has stated that the spread of the coronavirus (COVID-19) is on a global scale and that wearing a face mask at work is the only effective way to avoid becoming infected with the virus. The pandemic made governments [...] Read more.
The World Health Organization (WHO) has stated that the spread of the coronavirus (COVID-19) is on a global scale and that wearing a face mask at work is the only effective way to avoid becoming infected with the virus. The pandemic made governments worldwide stay under lock-downs to prevent virus transmissions. Reports show that wearing face masks would reduce the risk of transmission. With the rise in population in cities, there is a greater need for efficient city management in today’s world for reducing the impact of COVID-19 disease. For smart cities to prosper, significant improvements to occur in public transportation, roads, businesses, houses, city streets, and other facets of city life will have to be developed. The current public bus transportation system, such as it is, should be expanded with artificial intelligence. The autonomous mask detection and alert system are needed to find whether the person is wearing a face mask or not. This article presents a novel IoT-based face mask detection system in public transportation, especially buses. This system would collect real-time data via facial recognition. The main objective of the paper is to detect the presence of face masks in real-time video stream by utilizing deep learning, machine learning, and image processing techniques. To achieve this objective, a hybrid deep and machine learning model was designed and implemented. The model was evaluated using a new dataset in addition to public datasets. The results showed that the transformation of Convolution Neural Network (CNN) classifier has better performance over the Deep Neural Network (DNN) classifier; it has almost complete face-identification capabilities with respect to people’s presence in the case where they are wearing masks, with an error rate of only 1.1%. Overall, compared with the standard models, AlexNet, Mobinet, and You Only Look Once (YOLO), the proposed model showed a better performance. Moreover, the experiments showed that the proposed model can detect faces and masks accurately with low inference time and memory, thus meeting the IoT limited resources. Full article
(This article belongs to the Special Issue Face Recognition Using Machine Learning)
Show Figures

Figure 1

18 pages, 5159 KiB  
Article
Bayesian Inference of State-Level COVID-19 Basic Reproduction Numbers across the United States
by Abhishek Mallela, Jacob Neumann, Ely F. Miller, Ye Chen, Richard G. Posner, Yen Ting Lin and William S. Hlavacek
Viruses 2022, 14(1), 157; https://doi.org/10.3390/v14010157 - 15 Jan 2022
Cited by 12 | Viewed by 3789
Abstract
Although many persons in the United States have acquired immunity to COVID-19, either through vaccination or infection with SARS-CoV-2, COVID-19 will pose an ongoing threat to non-immune persons so long as disease transmission continues. We can estimate when sustained disease transmission will end [...] Read more.
Although many persons in the United States have acquired immunity to COVID-19, either through vaccination or infection with SARS-CoV-2, COVID-19 will pose an ongoing threat to non-immune persons so long as disease transmission continues. We can estimate when sustained disease transmission will end in a population by calculating the population-specific basic reproduction number 0, the expected number of secondary cases generated by an infected person in the absence of any interventions. The value of 0 relates to a herd immunity threshold (HIT), which is given by 11/0. When the immune fraction of a population exceeds this threshold, sustained disease transmission becomes exponentially unlikely (barring mutations allowing SARS-CoV-2 to escape immunity). Here, we report state-level 0 estimates obtained using Bayesian inference. Maximum a posteriori estimates range from 7.1 for New Jersey to 2.3 for Wyoming, indicating that disease transmission varies considerably across states and that reaching herd immunity will be more difficult in some states than others. 0 estimates were obtained from compartmental models via the next-generation matrix approach after each model was parameterized using regional daily confirmed case reports of COVID-19 from 21 January 2020 to 21 June 2020. Our 0 estimates characterize the infectiousness of ancestral strains, but they can be used to determine HITs for a distinct, currently dominant circulating strain, such as SARS-CoV-2 variant Delta (lineage B.1.617.2), if the relative infectiousness of the strain can be ascertained. On the basis of Delta-adjusted HITs, vaccination data, and seroprevalence survey data, we found that no state had achieved herd immunity as of 20 September 2021. Full article
(This article belongs to the Special Issue Transmission Dynamics of Coronavirus Disease)
Show Figures

Figure 1

14 pages, 890 KiB  
Article
Evaluating the Dynamics of Bluetooth Low Energy Based COVID-19 Risk Estimation for Educational Institutes
by Abdulah Jeza Aljohani, Junaid Shuja, Waleed Alasmary and Abdulaziz Alashaikh
Sensors 2021, 21(19), 6667; https://doi.org/10.3390/s21196667 - 7 Oct 2021
Cited by 13 | Viewed by 3283
Abstract
COVID-19 tracing applications have been launched in several countries to track and control the spread of viruses. Such applications utilize Bluetooth Low Energy (BLE) transmissions, which are short range and can be used to determine infected and susceptible persons near an infected person. [...] Read more.
COVID-19 tracing applications have been launched in several countries to track and control the spread of viruses. Such applications utilize Bluetooth Low Energy (BLE) transmissions, which are short range and can be used to determine infected and susceptible persons near an infected person. The COVID-19 risk estimation depends on an epidemic model for the virus behavior and Machine Learning (ML) model to classify the risk based on time series distance of the nodes that may be infected. The BLE technology enabled smartphones continuously transmit beacons and the distance is inferred from the received signal strength indicators (RSSI). The educational activities have shifted to online teaching modes due to the contagious nature of COVID-19. The government policy makers decide on education mode (online, hybrid, or physical) with little technological insight on actual risk estimates. In this study, we analyze BLE technology to debate the COVID-19 risks in university block and indoor class environments. We utilize a sigmoid based epidemic model with varying thresholds of distance to label contact data with high risk or low risk based on features such as contact duration. Further, we train multiple ML classifiers to classify a person into high risk or low risk based on labeled data of RSSI and distance. We analyze the accuracy of the ML classifiers in terms of F-score, receiver operating characteristic (ROC) curve, and confusion matrix. Lastly, we debate future research directions and limitations of this study. We complement the study with open source code so that it can be validated and further investigated. Full article
Show Figures

Figure 1

11 pages, 59668 KiB  
Article
COVID Face Masks: Policy Shift Results in Increased Littering
by Dirk H. R. Spennemann
Sustainability 2021, 13(17), 9875; https://doi.org/10.3390/su13179875 - 2 Sep 2021
Cited by 22 | Viewed by 4554
Abstract
The introduction of the mandatory use of fitted face masks in indoor spaces to limit the transmission of COVID-19 resulted in increased municipal waste of discarded single-use surgical face masks and other personal protective equipment (PPE) such as latex gloves. In parallel, the [...] Read more.
The introduction of the mandatory use of fitted face masks in indoor spaces to limit the transmission of COVID-19 resulted in increased municipal waste of discarded single-use surgical face masks and other personal protective equipment (PPE) such as latex gloves. In parallel, the occurrence of intentionally or accidentally discarded masks has created a major environmental problem. This paper presents the data of a longitudinal study of the occurrence of discarded face masks in an urban environment of a community in regional Australia. It demonstrates that the shift from voluntary to mandatory use of fitted face masks resulted in an immediate increase of publicly discarded masks and other items of PPE. The overserved spatial and temporal patterns allow us to draw inferences on human behavior. Full article
(This article belongs to the Section Social Ecology and Sustainability)
Show Figures

Figure 1

11 pages, 2320 KiB  
Article
Multiple Early Introductions of SARS-CoV-2 to Cape Town, South Africa
by Susan Engelbrecht, Kayla Delaney, Bronwyn Kleinhans, Eduan Wilkinson, Houriiyah Tegally, Tania Stander, Gert van Zyl, Wolfgang Preiser and Tulio de Oliveira
Viruses 2021, 13(3), 526; https://doi.org/10.3390/v13030526 - 22 Mar 2021
Cited by 18 | Viewed by 7602
Abstract
Cape Town was the first city in South Africa to experience the full impact of the coronavirus disease 2019 (COVID-19) pandemic. We acquired samples from all suspected cases and their contacts during the first month of the pandemic from Tygerberg Hospital. Nanopore sequencing [...] Read more.
Cape Town was the first city in South Africa to experience the full impact of the coronavirus disease 2019 (COVID-19) pandemic. We acquired samples from all suspected cases and their contacts during the first month of the pandemic from Tygerberg Hospital. Nanopore sequencing generated SARS-CoV-2 whole genomes. Phylogenetic inference with maximum likelihood and Bayesian methods were used to determine lineages that seeded the local epidemic. Three patients were known to have travelled internationally and an outbreak was detected in a nearby supermarket. Sequencing of 50 samples produced 46 high-quality genomes. The sequences were classified as lineages: B, B.1, B.1.1.1, B.1.1.161, B.1.1.29, B.1.8, B.39, and B.40. All the sequences from persons under investigation (PUIs) in the supermarket outbreak (lineage B.1.8) fall within a clade from the Netherlands with good support (p > 0.9). In addition, a new mutation, 5209A>G, emerged within the Cape Town cluster. The molecular clock analysis suggests that this occurred around 13 March 2020 (95% confidence interval: 9–17 March). The phylogenetic reconstruction suggests at least nine early introductions of SARS-CoV-2 into Cape Town and an early localized transmission in a shopping environment. Genomic surveillance was successfully used to investigate and track the spread of early introductions of SARS-CoV-2 in Cape Town. Full article
(This article belongs to the Special Issue Viral Infections in Developing Countries)
Show Figures

Graphical abstract

18 pages, 864 KiB  
Article
Nationwide Lockdown, Population Density, and Financial Distress Brings Inadequacy to Manage COVID-19: Leading the Services Sector into the Trajectory of Global Depression
by Donglei Yu, Muhammad Khalid Anser, Michael Yao-Ping Peng, Abdelmohsen A. Nassani, Sameh E. Askar, Khalid Zaman, Abdul Rashid Abdul Aziz, Muhammad Moinuddin Qazi Abro, Sasmoko and Mohd Khata Jabor
Healthcare 2021, 9(2), 220; https://doi.org/10.3390/healthcare9020220 - 17 Feb 2021
Cited by 10 | Viewed by 5010
Abstract
The service industry provides distributive services, producer services, personal services, and social services. These services largely breakdowns due to restrictions on border movements, confined travel and transportation services, a decline in international tourists’ visitation, nationwide lockdowns, and maintaining social distancing in the population. [...] Read more.
The service industry provides distributive services, producer services, personal services, and social services. These services largely breakdowns due to restrictions on border movements, confined travel and transportation services, a decline in international tourists’ visitation, nationwide lockdowns, and maintaining social distancing in the population. Although these measures are highly needed to contain coronavirus, it decreases economic and financial activities in a country, which requires smart solutions to globally subsidize the services sector. The study used different COVID-19 measures, and its resulting impact on the services industry by using world aggregated data from 1975 through 2020. The study benefited from the Keynesian theory of aggregate demand that remains provided a solution to minimize economic shocks through stringent or liberalizing economic policies. The COVID-19 pandemic is more severe than the financial shocks of 2018 that affected almost all sectors of the globalized world, particularly the services sector, which has been severally affected by COVID-19; it is a high time to revisit economic policies to control pandemic recession. The study used quantiles regression and innovation accounting matrix to obtain ex-ante and ex-post analysis. The quantile regression estimates show that causes of death by communicable diseases, including COVID-19, mainly decline the share of services value added to the global GDP at different quantiles distribution. In contrast, word-of-mouth helps to prevent it from the transmission channel of coronavirus plague through information sharing among the general masses. The control of food prices and managing physical distancing reduces suspected coronavirus cases; however, it negatively affects the services sector’s value share. The smart lockdown and sound economic activities do not decrease coronavirus cases, while they support increasing the percentage of the services sector to the global GDP. The innovation accounting matrix suggested that smart lockdown, managing physical distancing, effective price control, and sound financial activities will help to reduce coronavirus cases that will further translate into increased services value-added for the next ten years. The social distancing will exert a more considerable variance error shock to the services industry, which indicates the viability of these measures to contained novel coronavirus over a time horizon. The study used the number of proxies to the COVID-19 measures on the service sector that can be continued with real-time variables to obtain more inferences. Full article
(This article belongs to the Special Issue Socio-Economic Burden of Disease: The COVID-19 Case)
Show Figures

Figure 1

17 pages, 2562 KiB  
Article
An Energy-Efficient and Secure Data Inference Framework for Internet of Health Things: A Pilot Study
by James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, Paul Haskell-Dowland and Xi Zheng
Sensors 2021, 21(1), 312; https://doi.org/10.3390/s21010312 - 5 Jan 2021
Cited by 14 | Viewed by 5007
Abstract
Privacy protection in electronic healthcare applications is an important consideration, due to the sensitive nature of personal health data. Internet of Health Things (IoHT) networks that are used within a healthcare setting have unique challenges and security requirements (integrity, authentication, privacy, and availability) [...] Read more.
Privacy protection in electronic healthcare applications is an important consideration, due to the sensitive nature of personal health data. Internet of Health Things (IoHT) networks that are used within a healthcare setting have unique challenges and security requirements (integrity, authentication, privacy, and availability) that must also be balanced with the need to maintain efficiency in order to conserve battery power, which can be a significant limitation in IoHT devices and networks. Data are usually transferred without undergoing filtering or optimization, and this traffic can overload sensors and cause rapid battery consumption when interacting with IoHT networks. This poses certain restrictions on the practical implementation of these devices. In order to address these issues, this paper proposes a privacy-preserving two-tier data inference framework solution that conserves battery consumption by inferring the sensed data and reducing data size for transmission, while also protecting sensitive data from leakage to adversaries. The results from experimental evaluations on efficiency and privacy show the validity of the proposed scheme, as well as significant data savings without compromising data transmission accuracy, which contributes to energy efficiency of IoHT sensor devices. Full article
Show Figures

Figure 1

17 pages, 1825 KiB  
Article
Evaluation of A Phylogenetic Pipeline to Examine Transmission Networks in A Canadian HIV Cohort
by Lauren Mak, Deshan Perera, Raynell Lang, Pathum Kossinna, Jingni He, M. John Gill, Quan Long and Guido van Marle
Microorganisms 2020, 8(2), 196; https://doi.org/10.3390/microorganisms8020196 - 31 Jan 2020
Cited by 8 | Viewed by 4148
Abstract
Modern computational methods using patient Human Immunodeficiency Virus type 1 (HIV-1) genetic sequences can model population-wide viral transmission dynamics. Accurate transmission inferences can play a critical role in the characterization of high-risk transmission clusters important for enhanced epidemiological control. We evaluated a phylogenetics-based [...] Read more.
Modern computational methods using patient Human Immunodeficiency Virus type 1 (HIV-1) genetic sequences can model population-wide viral transmission dynamics. Accurate transmission inferences can play a critical role in the characterization of high-risk transmission clusters important for enhanced epidemiological control. We evaluated a phylogenetics-based analysis pipeline to infer person-to-person (P2P) infection dates and transmission relationships using 139 patient HIV-1 polymerase Sanger sequences curated by the Southern Alberta HIV Clinic. Parameter combinations tailored to HIV-1 transmissions were tuned with respect to inference accuracy. Inference accuracy was assessed using clinically confirmed P2P transmission patient data. The most accurate parameter settings correctly inferred 48.56% of the P2P relationships (95% confidence interval 63.89–33.33%), slightly lower than next-generation-sequencing methods. The infection date was correctly inferred 43.02% (95% confidence interval 49.89–35.63%). Several novel unsuspected transmission clusters of up to twelve patients were identified. An accuracy trade-off between inferring transmission relationships and infection dates was observed. Using clinically confirmed P2P transmission data as benchmark, our phylogenetic methods identified sufficient P2P transmission relationships using readily available low-resolution Sanger sequences. These approaches may give valuable information about HIV infection dynamics within a population and may be easily deployed to guide public health interventions, without a need for next generation sequencing technology. Full article
(This article belongs to the Special Issue Present and Future Challenges of HIV Infection)
Show Figures

Figure 1

13 pages, 5835 KiB  
Article
Phylodynamic Analysis Complements Partner Services by Identifying Acute and Unreported HIV Transmission
by Ellsworth M. Campbell, Anne Patala, Anupama Shankar, Jin-Fen Li, Jeffrey A. Johnson, Emily Westheimer, Cynthia L. Gay, Stephanie E. Cohen, William M. Switzer and Philip J. Peters
Viruses 2020, 12(2), 145; https://doi.org/10.3390/v12020145 - 27 Jan 2020
Cited by 16 | Viewed by 3559
Abstract
Tailoring public health responses to growing HIV transmission clusters depends on accurately mapping the risk network through which it spreads and identifying acute infections that represent the leading edge of cluster growth. HIV transmission links, especially those involving persons with acute HIV infection [...] Read more.
Tailoring public health responses to growing HIV transmission clusters depends on accurately mapping the risk network through which it spreads and identifying acute infections that represent the leading edge of cluster growth. HIV transmission links, especially those involving persons with acute HIV infection (AHI), can be difficult to uncover, or confirm during partner services investigations. We integrated molecular, epidemiologic, serologic and behavioral data to infer and evaluate transmission linkages between participants of a prospective study of AHI conducted in North Carolina, New York City and San Francisco from 2011–2013. Among the 547 participants with newly diagnosed HIV with polymerase sequences, 465 sex partners were reported, of whom only 35 (7.5%) had HIV sequences. Among these 35 contacts, 23 (65.7%) links were genetically supported and 12 (34.3%) were not. Only five links were reported between participants with AHI but none were genetically supported. In contrast, phylodynamic inference identified 102 unreported transmission links, including 12 between persons with AHI. Importantly, all putative transmission links between persons with AHI were found among large clusters with more than five members. Taken together, the presence of putative links between acute participants who did not name each other as contacts that are found only among large clusters underscores the potential for unobserved or undiagnosed intermediaries. Phylodynamics identified many more links than partner services alone and, if routinely and rapidly integrated, can illuminate transmission patterns not readily captured by partner services investigations. Full article
(This article belongs to the Special Issue HIV Molecular Epidemiology for Prevention)
Show Figures

Graphical abstract

14 pages, 6693 KiB  
Perspective
Privacy-Preserving Aggregation and Authentication of Multi-Source Smart Meters in a Smart Grid System
by Dongyoung Koo, Youngjoo Shin and Junbeom Hur
Appl. Sci. 2017, 7(10), 1007; https://doi.org/10.3390/app7101007 - 29 Sep 2017
Cited by 14 | Viewed by 6167
Abstract
The smart grid is a promising electrical grid paradigm for enhancing flexibility and reliability in power transmission through two-way communications among grid entities. In the smart grid system, the privacy of usage information measured by individual smart meters has gained significant attention, owing [...] Read more.
The smart grid is a promising electrical grid paradigm for enhancing flexibility and reliability in power transmission through two-way communications among grid entities. In the smart grid system, the privacy of usage information measured by individual smart meters has gained significant attention, owing to the possibility of personal information inference. Moreover, efficient and reliable power provisioning can be seriously impeded through illicit manipulations of aggregated data under the influence of malicious adversaries. Due to such potential risks, it becomes an important requirement for the smart grid to preserve privacy of metering data by secure aggregation and to authenticate the aggregated result in an efficient manner within large scale environments. From this perspective, this paper investigates the current status of security and privacy in smart grid systems and representative state-of-the-art studies in secure aggregation and authentication of metering data for future directions of a smart grid. Full article
Show Figures

Figure 1

Back to TopTop