A novel framework on security and energy enhancement based on internet of medical things for healthcare 5.0

R Natarajan, GH Lokesh, F Flammini, A Premkumar… - Infrastructures, 2023 - mdpi.com
Background: The Internet of Medical Things, often known as IoMT, is a revolutionary method
of connecting medical equipment and the software that operates on it to the computer …

Security and privacy aspects of electronic health records: A review

D Sharma, C Prabha - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
With the growth in population, there is an increase in the amount of Electronic Health
Records (EHR) and so is the rise in concern regarding their security and privacy. At present …

A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing

P Singh, AK Pandey - International Journal of Data Informatics and …, 2022 - ijdiic.com
Cloud computing (CC) is among the most rapidly evolving computer technologies. That is
the required accessibility of network assets, mainly information storage with processing …

Prioritizing factors for the adoption of IoT-based smart irrigation in Saudi Arabia: a GRA/AHP approach

A Jabbari, TA Teli, F Masoodi, FA Reegu… - Frontiers in …, 2024 - frontiersin.org
The irrigation sector in the Kingdom of Saudi Arabia (KSA) confronts a range of obstacles,
such as scarce water resources, the elevated salinity and alkalinity of irrigation water …

[HTML][HTML] Utilizing a machine learning algorithm to choose a significant traffic identification system

R Natarajan, CP Ranjith, MSK Mohideen… - International Journal of …, 2024 - Elsevier
The tremendous advancements in computing, sensing, and cognitive-based revolution have
made way for critical infrastructure needed to improve the internet for more extensive …

Applying Access Control Enabled Blockchain (ACE-BC) Framework to Manage Data Security in the CIS System

A Alharbi - Sensors, 2023 - mdpi.com
Cybersecurity information sharing (CIS) is important in different business processes to
secure data transmission, because it comprises Internet of Things (IoT) connectivity …

[HTML][HTML] Adopting security practices in software development process: Security testing framework for sustainable smart cities

Y Mothanna, W ElMedany, M Hammad, R Ksantini… - Computers & …, 2024 - Elsevier
The dependence on smart city applications has expanded in recent years. Consequently,
the number of cyberattack attempts to exploit smart application vulnerabilities significantly …

Detection of Number Plate in Vehicles using Deep Learning based Image Labeler Model

SK Gupta, S Saxena, A Khang, B Hazela… - … on Recent Trends in …, 2023 - ieeexplore.ieee.org
Deep learning is playing a vital role in most of the applications being used in today's
technological era. There seems to be no application where the use of deep learning …

An Enhanced Genetic Algorithm for Solving Trajectory Planning of Autonomous Robots

AK Kumar, A Alemran, DA Karras… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
Different tasks inside the environments call for different types of robots with various traits and
designs. The research community appears to favour a number of robot classes in particular …

[PDF][PDF] The Role of Data Science and Analytics in Predictive Modelling and Decision-Making

B Jadhav - 2023 - irejournals.com
The phrase" big data" refers to the massive amounts of data that have been created as a
direct result of the integration of information systems with the internet, cloud computing …