Опубликована: Янв. 1, 2024
Язык: Английский
Опубликована: Янв. 1, 2024
Язык: Английский
International Journal of Cognitive Computing in Engineering, Год журнала: 2023, Номер 4, С. 363 - 372
Опубликована: Июнь 1, 2023
A wireless sensor network (WSN) encompasses a huge set of nodes employed to collect data and transmit it base station (BS). Due its compact, inexpensive, scalable nature sensors, WSN finds applicability in diverse real-time applications. The battery-operated necessitate the design multi-hop routing protocol for effective utilization available energy network. Routing can be considered an optimization problem solved by bioinspired algorithms. This study introduces improved deer hunting optimization-enabled multihop (IDHO-MHR) WSN. major intention IDHO-MHR approach is optimally find routes destination IDHO algorithm initially derived incorporation Nelder Mead (NM) concept into traditional DHO algorithm. In addition, technique primarily derives fitness function with inclusion two variables, namely residual (RE) distance. higher RE minimum distance have probability becoming optimal from networks. performance validation performed, outcomes are inspected various aspects. experimental reported supremacy over other recent approaches.
Язык: Английский
Процитировано
6Cluster Computing, Год журнала: 2024, Номер 27(10), С. 14387 - 14415
Опубликована: Июль 20, 2024
Язык: Английский
Процитировано
2Deleted Journal, Год журнала: 2024, Номер 20(1), С. 326 - 349
Опубликована: Янв. 25, 2024
As the size of medical data grows exponentially, safeguarding Electronic Health Records (EHR) via cloud blockchain transactions becomes increasingly critical. This paper presents Multi-User Groupwise Integrity Ciphertext-Policy Attribute-Based Encryption (GI-CPABE), an efficient framework designed to ensure robust security. By implementing Improved (ICP-ABE), GI-CPABE is be compatible with both homogeneous and heterogeneous environments, providing secure access that role-specific reliable. A distinctive feature this its role-based control mechanism, which efficiently assigns user rights roles based on multi-user group attributes, considered as integrity measures. An experimental setup was established a real-time server, simulating EHR system. Test data, mimicking real-world EHRs, generated subjected encryption decryption processes, evaluating time efficiency these operations. The proposed demonstrated optimized storage utilization by calculating overhead encrypted ensuring through defined attribute-based policies, enabling secure, controlled data. Furthermore, comparative analysis conducted ascertain effectiveness against existing models. implementation mechanisms exhibited enforcement controls tailored different such healthcare providers, patients, administrators.
Язык: Английский
Процитировано
1Advances in computational intelligence and robotics book series, Год журнала: 2023, Номер unknown, С. 200 - 225
Опубликована: Дек. 29, 2023
The rapid advancements in artificial intelligence (AI) and blockchain technologies have brought about significant transformations various sectors, including healthcare. This proposal outlines a research paper that aims to investigate the different approaches applications of AI medical domain. By exploring integration these technologies, authors seek analyze their potential benefits, challenges, ethical implications revolutionizing healthcare practices. study will involve comprehensive review relevant literature, case studies, interviews with experts field. findings contribute deeper understanding synergistic effects healthcare, paving way for enhanced decision-making, data security, interoperability, patient-centric care.
Язык: Английский
Процитировано
2Radioelectronics and Communications Systems, Год журнала: 2023, Номер 66(5), С. 241 - 250
Опубликована: Май 1, 2023
Язык: Английский
Процитировано
2BIO Web of Conferences, Год журнала: 2024, Номер 86, С. 01092 - 01092
Опубликована: Янв. 1, 2024
Empirical insights into the significant effects of IoT-Enhanced Healthcare on patient care and health outcomes are provided by this study. The transformational potential IoT technology is shown data generated from a varied group, which includes continuous monitoring blood pressure, body temperature, heart rate, glucose levels via devices. usage devices directly correlated with greater cardiovascular stability, as consistently normal vital signs, according to statistical assessments. Additionally, highlights how patients using have better control over their levels, seen fewer cases increased levels. Evaluations quality show improved satisfaction, efficacy therapy, communication, highlighting benefits Healthcare. evaluation Test confirms precision dependability in medical diagnosis, significance transforming care. Together, these results provide strong evidence IoT's ability improve outcomes, treatment quality, health.
Язык: Английский
Процитировано
0SN Computer Science, Год журнала: 2024, Номер 5(3)
Опубликована: Март 9, 2024
Язык: Английский
Процитировано
0Опубликована: Янв. 18, 2024
The utilization of online diagnosis as a prevalent data service in contemporary healthcare systems involves the real-time collection physical through Internet Things (IoT) devices, such body sensors and software. This informs instantaneous decision-making diagnostic process. However, sensitive nature collected user results poses significant risk privacy breaches or hacking incidents, potentially leading to misinformation even fatal outcomes. involvement third-party cloud services exacerbates concerns about protection. Compounding these issues, resource-constrained IoT devices often lack standard security measures. It is imperative consider parameters accuracy, adaptability, low computation time, implementation appropriate anonymity procedures. Addressing challenges requires development robust algorithm that prioritizes secure access health records, with particular emphasis on blockchain technology. To mitigate shortcomings ensure storage patient data, this study advocates for creation resilient three-tier architecture leveraging approach aims enhance measures, maintain facilitate efficient records while safeguarding confidentiality.
Язык: Английский
Процитировано
0International Journal of Advanced Computer Science and Applications, Год журнала: 2024, Номер 15(6)
Опубликована: Янв. 1, 2024
Data provenance, in an end-to-end supply chain context, refers to the tracking of origin and history every raw material, process, packaging distribution involved a manufacturing network. The traditional client-server architecture utilised centralised systems, stores data single location, making it vulnerable points failure, tampering, unau-thorised access. As result, lack provenance standardisation for products chain. This leads traceability transparency. Therefore, this article presents hypothesis that these challenges can be overcome by incorporating into blockchain-based smart contracts is structured such firstly discusses prove-nance with focus on cloud-based storage sys-tem domains across chains. Secondly, sheds more light design experimental setup block-chain-based using case study water bottling plant. Final-ly, showcases results experiments purpose.
Язык: Английский
Процитировано
0Elsevier eBooks, Год журнала: 2024, Номер unknown, С. 103 - 133
Опубликована: Янв. 1, 2024
Язык: Английский
Процитировано
0