A novel framework on security and energy enhancement based on internet of medical things for healthcare 5.0
R Natarajan, GH Lokesh, F Flammini, A Premkumar… - Infrastructures, 2023 - mdpi.com
Background: The Internet of Medical Things, often known as IoMT, is a revolutionary method
of connecting medical equipment and the software that operates on it to the computer …
of connecting medical equipment and the software that operates on it to the computer …
Security and privacy aspects of electronic health records: A review
With the growth in population, there is an increase in the amount of Electronic Health
Records (EHR) and so is the rise in concern regarding their security and privacy. At present …
Records (EHR) and so is the rise in concern regarding their security and privacy. At present …
A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing
Cloud computing (CC) is among the most rapidly evolving computer technologies. That is
the required accessibility of network assets, mainly information storage with processing …
the required accessibility of network assets, mainly information storage with processing …
Prioritizing factors for the adoption of IoT-based smart irrigation in Saudi Arabia: a GRA/AHP approach
The irrigation sector in the Kingdom of Saudi Arabia (KSA) confronts a range of obstacles,
such as scarce water resources, the elevated salinity and alkalinity of irrigation water …
such as scarce water resources, the elevated salinity and alkalinity of irrigation water …
[HTML][HTML] Utilizing a machine learning algorithm to choose a significant traffic identification system
R Natarajan, CP Ranjith, MSK Mohideen… - International Journal of …, 2024 - Elsevier
The tremendous advancements in computing, sensing, and cognitive-based revolution have
made way for critical infrastructure needed to improve the internet for more extensive …
made way for critical infrastructure needed to improve the internet for more extensive …
Applying Access Control Enabled Blockchain (ACE-BC) Framework to Manage Data Security in the CIS System
A Alharbi - Sensors, 2023 - mdpi.com
Cybersecurity information sharing (CIS) is important in different business processes to
secure data transmission, because it comprises Internet of Things (IoT) connectivity …
secure data transmission, because it comprises Internet of Things (IoT) connectivity …
[HTML][HTML] Adopting security practices in software development process: Security testing framework for sustainable smart cities
The dependence on smart city applications has expanded in recent years. Consequently,
the number of cyberattack attempts to exploit smart application vulnerabilities significantly …
the number of cyberattack attempts to exploit smart application vulnerabilities significantly …
Detection of Number Plate in Vehicles using Deep Learning based Image Labeler Model
Deep learning is playing a vital role in most of the applications being used in today's
technological era. There seems to be no application where the use of deep learning …
technological era. There seems to be no application where the use of deep learning …
An Enhanced Genetic Algorithm for Solving Trajectory Planning of Autonomous Robots
Different tasks inside the environments call for different types of robots with various traits and
designs. The research community appears to favour a number of robot classes in particular …
designs. The research community appears to favour a number of robot classes in particular …
[PDF][PDF] The Role of Data Science and Analytics in Predictive Modelling and Decision-Making
B Jadhav - 2023 - irejournals.com
The phrase" big data" refers to the massive amounts of data that have been created as a
direct result of the integration of information systems with the internet, cloud computing …
direct result of the integration of information systems with the internet, cloud computing …