[HTML][HTML] A survey of multimodal information fusion for smart healthcare: Mapping the journey from data to wisdom

T Shaik, X Tao, L Li, H Xie, JD Velásquez - Information Fusion, 2023 - Elsevier
Multimodal medical data fusion has emerged as a transformative approach in smart
healthcare, enabling a comprehensive understanding of patient health and personalized …

[HTML][HTML] Exploring the risks, benefits, advances, and challenges in internet integration in medicine with the advent of 5g technology: a comprehensive review

V Agrawal, S Agrawal, A Bomanwar, T Dubey… - Cureus, 2023 - ncbi.nlm.nih.gov
The integration of 5G technology in the healthcare sector is poised to bring about
transformative changes, offering numerous advantages such as enhanced telemedicine …

A lightweight security framework for electronic healthcare system

RRK Chaudhary, K Chatterjee - International Journal of Information …, 2022 - Springer
Electronic healthcare systems (EHS) are the most emerging field of today's digital world
which is used for remote health monitoring, evidence-based treatment, disease prediction …

Deep learning technology of computer network security detection based on artificial intelligence

Q Liu, T Zhang - Computers and Electrical Engineering, 2023 - Elsevier
With the continuous progress of the information age and science and technology, how to
combine complex and changeable data with self-protection ability has become an urgent …

A blockchain-based multi-factor authentication model for a cloud-enabled internet of vehicles

VR Kebande, FM Awaysheh, RA Ikuesan, SA Alawadi… - Sensors, 2021 - mdpi.com
Continuous and emerging advances in Information and Communication Technology (ICT)
have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines …

Evaluation of local security event management system vs. standard antivirus software

A Pérez-Sánchez, R Palacios - Applied Sciences, 2022 - mdpi.com
Featured Application This work can be applied to develop new anti-malware strategies
based on event analysis. Abstract The detection and classification of threats in computer …

Coal flow volume detection method for conveyor belt based on TOF vision

C Hou, T Qiao, H Dong, H Wu - Measurement, 2024 - Elsevier
Coal flow volume is the essential basic data support for intelligent speed regulation and
energy-saving control of coal mine transportation systems. To accurately measure the coal …

Detection of non-periodic low-rate denial of service attacks in software defined networks using machine learning

D Yousef, B Maala, M Skvortsova… - International Journal of …, 2024 - Springer
In this paper, we propose a novel approach to detect non-periodic Low-rate Denial of
Service attacks in Software Defined Networks using Machine Learning algorithms. Low-rate …

A meta-analysis of role of network intrusion detection systems in confronting network attacks

J Verma, A Bhandari, G Singh - 2021 8th international …, 2021 - ieeexplore.ieee.org
Traffic on the network is increasing immensely. Unprecedented development and close
integration of devices for the Internet of Things (IoT) have contributed to an enormous …

Retroactive data structure for protein–protein interaction in lung cancer using Dijkstra algorithm

PK Rangarajan, BM Gurusamy, E Rajasekar… - International Journal of …, 2024 - Springer
Protein–Protein interactions (PPI) networks are protein complexes arranged in networks that
are created by biochemical processes or electrostatic forces to carry out biological functions …