Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (400)
  • Open Access

    ARTICLE

    Hyperledger Fabric Blockchain: Secure and Efficient Solution for Electronic Health Records

    Mueen Uddin1,*, M. S. Memon2, Irfana Memon2, Imtiaz Ali2, Jamshed Memon3, Maha Abdelhaq4, Raed Alsaqour5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2377-2397, 2021, DOI:10.32604/cmc.2021.015354 - 13 April 2021

    Abstract Background: Electronic Health Record (EHR) systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare industry to achieve better diagnosis and treatment of patients globally. However, the existing EHR systems mostly lack in providing appropriate security, entrusted access control and handling privacy and secrecy issues and challenges in current hospital infrastructures. Objective: To solve this delicate problem, we propose a Blockchain-enabled Hyperledger Fabric Architecture for different EHR systems. Methodology: In our EHR blockchain system, Peer nodes from various organizations (stakeholders)… More >

  • Open Access

    ARTICLE

    Machine Learning Techniques Applied to Electronic Healthcare Records to Predict Cancer Patient Survivability

    Ornela Bardhi1,2,*, Begonya Garcia Zapirain1

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1595-1613, 2021, DOI:10.32604/cmc.2021.015326 - 13 April 2021

    Abstract Breast cancer (BCa) and prostate cancer (PCa) are the two most common types of cancer. Various factors play a role in these cancers, and discovering the most important ones might help patients live longer, better lives. This study aims to determine the variables that most affect patient survivability, and how the use of different machine learning algorithms can assist in such predictions. The AURIA database was used, which contains electronic healthcare records (EHRs) of 20,006 individual patients diagnosed with either breast or prostate cancer in a particular region in Finland. In total, there were 178… More >

  • Open Access

    ARTICLE

    An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN

    Shadi Nashwan*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 607-642, 2021, DOI:10.32604/cmc.2021.015597 - 22 March 2021

    Abstract The healthcare internet of things (IoT) system has dramatically reshaped this important industry sector. This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable connection of patients and healthcare providers. The goal is the remote monitoring of a patient’s physiological data by physicians. Moreover, this system can reduce the number and expenses of healthcare centers, make up for the shortage of healthcare centers in remote areas, enable consultation with expert physicians around the world, and increase the health awareness of communities. The major challenges that affect the rapid… More >

  • Open Access

    ARTICLE

    Blockchain-as-a-Utility for Next-Generation Healthcare Internet of Things

    Alaa Omran Almagrabi1, Rashid Ali2, Daniyal Alghazzawi1, Abdullah AlBarakati1, Tahir Khurshaid3,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 359-376, 2021, DOI:10.32604/cmc.2021.014753 - 22 March 2021

    Abstract The scope of the Internet of Things (IoT) applications varies from strategic applications, such as smart grids, smart transportation, smart security, and smart healthcare, to industrial applications such as smart manufacturing, smart logistics, smart banking, and smart insurance. In the advancement of the IoT, connected devices become smart and intelligent with the help of sensors and actuators. However, issues and challenges need to be addressed regarding the data reliability and protection for significant next-generation IoT applications like smart healthcare. For these next-generation applications, there is a requirement for far-reaching privacy and security in the IoT.… More >

  • Open Access

    ARTICLE

    Managing Software Security Risks through an Integrated Computational Method

    Abdullah Alharbi1, Wael Alosaimi1, Hashem Alyami2, Mohd Nadeem3, Mohd Faizan3, Alka Agrawal3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 179-194, 2021, DOI:10.32604/iasc.2021.016646 - 17 March 2021

    Abstract Security risk evaluation of web-based healthcare applications is important from a design perspective. The developers as well as the users need to make sure that the applications must be secure. Citing the disastrous effects of unsecured web applications, Accuntix Online states that the IT industry has lost millions of dollars due to security theft and malware attacks. Protecting the integrity of patients’ health data is of utmost importance. Thus, assessing the security risk of web-based healthcare applications should be accorded the highest priority while developing the web applications. To fulfill the security requirements, the developers must… More >

  • Open Access

    ARTICLE

    A Technology Enabled Learning Model in Healthcare during COVID-19

    Habib Ur Rahman1,*, Nazir Ahmed Sangi2, Moiz Uddin Ahmed1

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 261-275, 2021, DOI:10.32604/iasc.2021.016107 - 17 March 2021

    Abstract The World Health Organization has warned about the spread of communicable and non-communicable diseases especially in the developing countries. The COVID–19 has also emerged as one of the most challengeable pandemics of the whole world. In current medical emergency, the virtual health education is much vital for handling alerts and outbreaks of diseases for a community of users. The Information and Communication Technology provide an opportunity to deal with the challenges related to handling alerts and outbreaks of diseases. The technology infrastructure in the developing countries is surging rise and can be used to develop… More >

  • Open Access

    REVIEW

    Review of Internet of Things in Different Sectors: Recent Advances, Technologies, and Challenges

    Samreen Mahmood*

    Journal on Internet of Things, Vol.3, No.1, pp. 19-26, 2021, DOI:10.32604/jiot.2021.013071 - 16 March 2021

    Abstract Human beings and their activities are now connected through Internet of Things (IoT) with the evolution of wireless communication technologies. IoT is becoming popular and its usage is immensely increasing among various sectors. In this research paper, a comprehensive review has been conducted by considering recent and important literature review on IoT applications being operated in three major sectors. The three sectors studied are health, sports and transportation and logistics. Paper explored that with the help of IoT techniques, different miniature sized devices are invented which can record various parameters of human body, wearables devices More >

  • Open Access

    ARTICLE

    Optimal and Memristor-Based Control of A Nonlinear Fractional Tumor-Immune Model

    Amr M. S. Mahdy1,2,*, Mahmoud Higazy1,3, Mohamed S. Mohamed1,4

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3463-3486, 2021, DOI:10.32604/cmc.2021.015161 - 01 March 2021

    Abstract In this article, the reduced differential transform method is introduced to solve the nonlinear fractional model of Tumor-Immune. The fractional derivatives are described in the Caputo sense. The solutions derived using this method are easy and very accurate. The model is given by its signal flow diagram. Moreover, a simulation of the system by the Simulink of MATLAB is given. The disease-free equilibrium and stability of the equilibrium point are calculated. Formulation of a fractional optimal control for the cancer model is calculated. In addition, to control the system, we propose a novel modification of… More >

  • Open Access

    ARTICLE

    ExpressionHash: Securing Telecare Medical Information Systems Using BioHashing

    Ayesha Riaz1, Naveed Riaz1, Awais Mahmood2,*, Sajid Ali Khan3, Imran Mahmood1, Omar Almutiry2, Habib Dhahri2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2747-2764, 2021, DOI:10.32604/cmc.2021.014418 - 01 March 2021

    Abstract The COVID-19 outbreak and its medical distancing phenomenon have effectively turned the global healthcare challenge into an opportunity for Telecare Medical Information Systems. Such systems employ the latest mobile and digital technologies and provide several advantages like minimal physical contact between patient and healthcare provider, easy mobility, easy access, consistent patient engagement, and cost-effectiveness. Any leakage or unauthorized access to users’ medical data can have serious consequences for any medical information system. The majority of such systems thus rely on biometrics for authenticated access but biometric systems are also prone to a variety of attacks… More >

  • Open Access

    ARTICLE

    Unified Computational Modelling for Healthcare Device Security Assessment

    Shakeel Ahmed*, Abdulaziz Alhumam

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 1-18, 2021, DOI:10.32604/csse.2021.015775 - 05 February 2021

    Abstract This article evaluates the security techniques that are used to maintain the healthcare devices, and proposes a mathematical model to list these in the order of priority and preference. To accomplish the stated objective, the article uses the Fuzzy Analytic Network Process (ANP) integrated with Technical for Order Preference by Similarities to Ideal Solution (TOPSIS) to find the suitable alternatives of the security techniques for securing the healthcare devices from trespassing. The methodology is enlisted to rank the alternatives/ techniques based on their weights’ satisfaction degree. Thereafter, the ranks of the alternatives determine the order More >

Displaying 281-290 on page 29 of 400. Per Page