Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 24 Sep 2024Bibliometrics
Skip Table Of Content Section
research-article
Multi-modal secure healthcare data dissemination framework using blockchain in IoMT
Abstract

Blockchain technology can solve current interoperability challenges in health information systems and provide the technical standard which ensures a secure sharing of electronic health data between individuals, healthcare providers, medical care ...

research-article
Blockchain-assisted secure image transmission and diagnosis model on Internet of Medical Things Environment
Abstract

In recent days, the Internet of Medical Things (IoMT) is commonly employed in different aspects of healthcare applications. Owing to the increasing necessitates of IoT, a huge amount of sensing data is collected from distinct IoT gadgets. To ...

research-article
IoT-enabled healthcare systems using block chain-dependent adaptable services
Abstract

Internet of Things (IoT) deployed healthcare systems to provide ubiquitous services and assistance for the end-users/patients through their handheld devices/user equipment. The processing of sensitive medical information involves the transfer of ...

research-article
Blockchain-assisted secured data management framework for health information analysis based on Internet of Medical Things
Abstract

The Internet of Medical Things (IoMT) is a kind of associated smart-medical device infrastructure with applications, health services, and systems. These medical devices and applications are linked via the Internet to healthcare systems. The ...

research-article
Drug traceability and transparency in medical supply chain using blockchain for easing the process and creating trust between stakeholders and consumers
Abstract

Without a proper mechanism to track and authenticate drugs, both stakeholder and consumer experience dilemmas. The dilemmas arise between stakeholders and consumers are related to of coordination, inventory management, human resource dependency, ...

research-article
An IOMT assisted lung nodule segmentation using enhanced receptive field-based modified UNet
Abstract

Smart healthcare systems manage and deal with a large amount of data generated by the Internet of Medical Things (IOMT) devices. This big data processing requires efficient computer-aided diagnostic (CAD) systems. Recently, IOMT-based systems are ...

research-article
Computationally efficient and secure anonymous authentication scheme for cloud users
Abstract

In cloud computing, the combinations of various computing units are globally separated, however, electronically connected. In recent years, the number of cloud users has adequately increased in the modern societies. In order to restrict the ...

research-article
Soft computing for anomaly detection and prediction to mitigate IoT-based real-time abuse
Abstract

Cyber-surveillance and connected devices can be misused to monitor, harass, isolate, and otherwise, harm individuals. In particular, these devices gather high volumes of personal data such as account details with shared passwords, person’s ...

research-article
A survey on deep learning-based real-time crowd anomaly detection for secure distributed video surveillance
Abstract

Fast and automated recognizing of abnormal behaviors in crowded scenes is significantly effective in increasing public security. The traditional procedure of recognizing abnormalities in the Web of Thing (WoT) platform comprises monitoring the ...

research-article
Malware visualization and detection using DenseNets
Abstract

Rapid advancement in the sophistication of malware has posed a serious impact on the device connected over the Internet. Malware writing is driven by economic benefits; thus, an alarming increase in malware variants is witnessed. Recently, a large ...

research-article
RCBE-AS: Rabin cryptosystem–based efficient authentication scheme for wireless sensor networks
Abstract

Wireless sensor networks (WSNs) are applicable in numerous fields ranging from very common to those demanding critical security concerns. It is recommended to provide external users a direct access to the data from sensors as per their need for ...

research-article
Dual secure robust watermarking scheme based on hybrid optimization algorithm for image security
Abstract

Digital watermarking is a technology that allows users to add copyright notifications or other confirmation messages to digital media. Image recognition is one of the applications of digital watermarking, which is used to identify digital images. ...

research-article
Flow shop failure prediction problem based on Grey-Markov model
Abstract

Mechanical equipment in the process of operation appears a variety of faults due to different reasons. These faults affect the operation of machinery, causing economic losses, moreover, it may cause accidents, or even casualties. Predicting the ...

research-article
Competitiveness of IoT industrial clusters based on G2EM-CI model
Abstract

Following the rise of computers, the Internet, and mobile communications, the Internet of Things is the prelude to a new round of industrial development. With the opening of emerging industries related to the Internet of Things, concepts such as ...

research-article
A secure and efficient authentication scheme in the Internet of Vehicle communication
Abstract

Significant technological advancements in the Internet of Vehicles (IoV) incentivize the rapid development of various vehicular communication technologies for wireless connectivity among vehicles, roadside devices, and pedestrians. Despite the ...

research-article
Persuasion-based recommender system ensambling matrix factorisation and active learning models
Abstract

Recommendation systems are gaining popularity on Internet platforms such as Amazon, Netflix, Spotify or Booking. As more users are joining these online consumer and entertainment sectors, the profile-based data for providing accurate just-in-time ...

research-article
Autonomous search in a social and ubiquitous Web
Abstract

Recent W3C recommendations for the Web of Things (WoT) and the Social Web are turning hypermedia into a homogeneous information fabric that interconnects heterogeneous resources: devices, people, information resources, abstract concepts, etc. The ...

research-article
Activity recognition through interactive machine learning in a dynamic sensor setting
Abstract

The advances in Internet of things lead to an increased number of devices generating and streaming data. These devices can be useful data sources for activity recognition by using machine learning. However, the set of available sensors may vary ...

correction
research-article
A crowdsourcing-based optimal route selection for drug delivery in low- and middle-income countries
Abstract

The timely delivery of life-saving products such as medicines from the pharmacy to the patient’s location requires availability of an adequate road infrastructure and reliable directions to the patient’s home. However, in many regions of low- and ...

research-article
A secure and extensible blockchain-based data provenance framework for the Internet of Things
Abstract

As data collected and provided by Internet of Things (IoT) devices power an ever-growing number of applications and services, it is crucial that this data can be trusted. Data provenance solutions combined with blockchain technology are one way to ...

research-article
Automatic generation of Web of Things servients using Thing Descriptions
Abstract

Similarly to the standardization effort initiated for the World Wide Web in the 1990s, the World Wide Web Consortium is currently working on the Web of Things (WoT) specification. This initiative aims to tackle current fragmentation in the so-...

research-article
Understanding the complexities of Bluetooth for representing real-life social networks: A methodology for inferring and validating Bluetooth-based social network graphs
Abstract

Bluetooth (BT) data has been extensively used for recognizing social patterns and inferring social networks, as BT is widely present in everyday technological devices. However, even though collecting BT data is subject to random noise and may ...

research-article
Enhanced multi-source data analysis for personalized sleep-wake pattern recognition and sleep parameter extraction
Abstract

Sleep behavior is traditionally monitored with polysomnography, and sleep stage patterns are a key marker for sleep quality used to detect anomalies and diagnose diseases. With the growing demand for personalized healthcare and the prevalence of ...

research-article
Radio-frequency-based indoor-localization techniques for enhancing Internet-of-Things applications
Abstract

An important capability of most smart, Internet-of-Things-enabled spaces (e.g., office, home, hospital, factory) is the ability to leverage context of use. Location is a key context element, particularly indoor location. Recent advances in radio ...

Subjects

Currently Not Available

Comments

Please enable JavaScript to view thecomments powered by Disqus.