Multi-modal secure healthcare data dissemination framework using blockchain in IoMT
Blockchain technology can solve current interoperability challenges in health information systems and provide the technical standard which ensures a secure sharing of electronic health data between individuals, healthcare providers, medical care ...
Blockchain-assisted secure image transmission and diagnosis model on Internet of Medical Things Environment
- Bassam A. Y. Alqaralleh,
- Thavavel Vaiyapuri,
- Velmurugan Subbiah Parvathy,
- Deepak Gupta,
- Ashish Khanna,
- K. Shankar
In recent days, the Internet of Medical Things (IoMT) is commonly employed in different aspects of healthcare applications. Owing to the increasing necessitates of IoT, a huge amount of sensing data is collected from distinct IoT gadgets. To ...
IoT-enabled healthcare systems using block chain-dependent adaptable services
Internet of Things (IoT) deployed healthcare systems to provide ubiquitous services and assistance for the end-users/patients through their handheld devices/user equipment. The processing of sensitive medical information involves the transfer of ...
Blockchain-assisted secured data management framework for health information analysis based on Internet of Medical Things
The Internet of Medical Things (IoMT) is a kind of associated smart-medical device infrastructure with applications, health services, and systems. These medical devices and applications are linked via the Internet to healthcare systems. The ...
Correction to: Blockchain-assisted secured data management framework for health information analysis based on Internet of Medical Things
A Correction to this paper has been published: https://doi.org/10.1007/s00779-021-01626-0
Drug traceability and transparency in medical supply chain using blockchain for easing the process and creating trust between stakeholders and consumers
Without a proper mechanism to track and authenticate drugs, both stakeholder and consumer experience dilemmas. The dilemmas arise between stakeholders and consumers are related to of coordination, inventory management, human resource dependency, ...
An IOMT assisted lung nodule segmentation using enhanced receptive field-based modified UNet
Smart healthcare systems manage and deal with a large amount of data generated by the Internet of Medical Things (IOMT) devices. This big data processing requires efficient computer-aided diagnostic (CAD) systems. Recently, IOMT-based systems are ...
Computationally efficient and secure anonymous authentication scheme for cloud users
In cloud computing, the combinations of various computing units are globally separated, however, electronically connected. In recent years, the number of cloud users has adequately increased in the modern societies. In order to restrict the ...
Soft computing for anomaly detection and prediction to mitigate IoT-based real-time abuse
Cyber-surveillance and connected devices can be misused to monitor, harass, isolate, and otherwise, harm individuals. In particular, these devices gather high volumes of personal data such as account details with shared passwords, person’s ...
A survey on deep learning-based real-time crowd anomaly detection for secure distributed video surveillance
Fast and automated recognizing of abnormal behaviors in crowded scenes is significantly effective in increasing public security. The traditional procedure of recognizing abnormalities in the Web of Thing (WoT) platform comprises monitoring the ...
Malware visualization and detection using DenseNets
Rapid advancement in the sophistication of malware has posed a serious impact on the device connected over the Internet. Malware writing is driven by economic benefits; thus, an alarming increase in malware variants is witnessed. Recently, a large ...
RCBE-AS: Rabin cryptosystem–based efficient authentication scheme for wireless sensor networks
Wireless sensor networks (WSNs) are applicable in numerous fields ranging from very common to those demanding critical security concerns. It is recommended to provide external users a direct access to the data from sensors as per their need for ...
Dual secure robust watermarking scheme based on hybrid optimization algorithm for image security
Digital watermarking is a technology that allows users to add copyright notifications or other confirmation messages to digital media. Image recognition is one of the applications of digital watermarking, which is used to identify digital images. ...
Flow shop failure prediction problem based on Grey-Markov model
Mechanical equipment in the process of operation appears a variety of faults due to different reasons. These faults affect the operation of machinery, causing economic losses, moreover, it may cause accidents, or even casualties. Predicting the ...
Competitiveness of IoT industrial clusters based on G2EM-CI model
Following the rise of computers, the Internet, and mobile communications, the Internet of Things is the prelude to a new round of industrial development. With the opening of emerging industries related to the Internet of Things, concepts such as ...
A secure and efficient authentication scheme in the Internet of Vehicle communication
Significant technological advancements in the Internet of Vehicles (IoV) incentivize the rapid development of various vehicular communication technologies for wireless connectivity among vehicles, roadside devices, and pedestrians. Despite the ...
Persuasion-based recommender system ensambling matrix factorisation and active learning models
Recommendation systems are gaining popularity on Internet platforms such as Amazon, Netflix, Spotify or Booking. As more users are joining these online consumer and entertainment sectors, the profile-based data for providing accurate just-in-time ...
Autonomous search in a social and ubiquitous Web
Recent W3C recommendations for the Web of Things (WoT) and the Social Web are turning hypermedia into a homogeneous information fabric that interconnects heterogeneous resources: devices, people, information resources, abstract concepts, etc. The ...
Activity recognition through interactive machine learning in a dynamic sensor setting
The advances in Internet of things lead to an increased number of devices generating and streaming data. These devices can be useful data sources for activity recognition by using machine learning. However, the set of available sensors may vary ...
Correction to: Activity recognition through interactive machine learning in a dynamic sensor setting
Fig. 7 and Fig. 8 have incorrect legends in the images and have been updated.
A crowdsourcing-based optimal route selection for drug delivery in low- and middle-income countries
The timely delivery of life-saving products such as medicines from the pharmacy to the patient’s location requires availability of an adequate road infrastructure and reliable directions to the patient’s home. However, in many regions of low- and ...
A secure and extensible blockchain-based data provenance framework for the Internet of Things
As data collected and provided by Internet of Things (IoT) devices power an ever-growing number of applications and services, it is crucial that this data can be trusted. Data provenance solutions combined with blockchain technology are one way to ...
Automatic generation of Web of Things servients using Thing Descriptions
Similarly to the standardization effort initiated for the World Wide Web in the 1990s, the World Wide Web Consortium is currently working on the Web of Things (WoT) specification. This initiative aims to tackle current fragmentation in the so-...
Understanding the complexities of Bluetooth for representing real-life social networks: A methodology for inferring and validating Bluetooth-based social network graphs
- Bojan Simoski,
- Michel C.A. Klein,
- Eric Fernandes de Mello Araújo,
- Aart T. van Halteren,
- Thabo J. van Woudenberg,
- Kirsten E. Bevelander,
- Moniek Buijzen,
- Henri Bal
Bluetooth (BT) data has been extensively used for recognizing social patterns and inferring social networks, as BT is widely present in everyday technological devices. However, even though collecting BT data is subject to random noise and may ...
Enhanced multi-source data analysis for personalized sleep-wake pattern recognition and sleep parameter extraction
Sleep behavior is traditionally monitored with polysomnography, and sleep stage patterns are a key marker for sleep quality used to detect anomalies and diagnose diseases. With the growing demand for personalized healthcare and the prevalence of ...
Radio-frequency-based indoor-localization techniques for enhancing Internet-of-Things applications
An important capability of most smart, Internet-of-Things-enabled spaces (e.g., office, home, hospital, factory) is the ability to leverage context of use. Location is a key context element, particularly indoor location. Recent advances in radio ...
Subjects
Currently Not Available