Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (518)
  • Open Access

    ARTICLE

    M-IDM: A Multi-Classification Based Intrusion Detection Model in Healthcare IoT

    Jae Dong Lee1,2, Hyo Soung Cha1, Shailendra Rathore2, Jong Hyuk Park2,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1537-1553, 2021, DOI:10.32604/cmc.2021.014774

    Abstract In recent years, the application of a smart city in the healthcare sector via loT systems has continued to grow exponentially and various advanced network intrusions have emerged since these loT devices are being connected. Previous studies focused on security threat detection and blocking technologies that rely on testbed data obtained from a single medical IoT device or simulation using a well-known dataset, such as the NSL-KDD dataset. However, such approaches do not reflect the features that exist in real medical scenarios, leading to failure in potential threat detection. To address this problem, we proposed a novel intrusion classification architecture… More >

  • Open Access

    ARTICLE

    Recognition and Detection of Diabetic Retinopathy Using Densenet-65 Based Faster-RCNN

    Saleh Albahli1, Tahira Nazir2,*, Aun Irtaza2, Ali Javed3

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1333-1351, 2021, DOI:10.32604/cmc.2021.014691

    Abstract Diabetes is a metabolic disorder that results in a retinal complication called diabetic retinopathy (DR) which is one of the four main reasons for sightlessness all over the globe. DR usually has no clear symptoms before the onset, thus making disease identification a challenging task. The healthcare industry may face unfavorable consequences if the gap in identifying DR is not filled with effective automation. Thus, our objective is to develop an automatic and cost-effective method for classifying DR samples. In this work, we present a custom Faster-RCNN technique for the recognition and classification of DR lesions from retinal images. After… More >

  • Open Access

    ARTICLE

    Statistical Histogram Decision Based Contrast Categorization of Skin Lesion Datasets Dermoscopic Images

    Rabia Javed1,2, Mohd Shafry Mohd Rahim1, Tanzila Saba3, Suliman Mohamed Fati3, Amjad Rehman3,*, Usman Tariq4

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2337-2352, 2021, DOI:10.32604/cmc.2021.014677

    Abstract Most of the melanoma cases of skin cancer are the life-threatening form of cancer. It is prevalent among the Caucasian group of people due to their light skin tone. Melanoma is the second most common cancer that hits the age group of 15–29 years. The high number of cases has increased the importance of automated systems for diagnosing. The diagnosis should be fast and accurate for the early treatment of melanoma. It should remove the need for biopsies and provide stable diagnostic results. Automation requires large quantities of images. Skin lesion datasets contain various kinds of dermoscopic images for the… More >

  • Open Access

    ARTICLE

    Coronavirus: A “Mild” Virus Turned Deadly Infection

    Rizwan Ali Naqvi1, Muhammad Faheem Mushtaq2, Natash Ali Mian3, Muhammad Adnan Khan4,*, Atta-ur-Rahman5, Muhammad Ali Yousaf6, Muhammad Umair6, Rizwan Majeed7

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2631-2646, 2021, DOI:10.32604/cmc.2021.012167

    Abstract Coronaviruses are a family of viruses that can be transmitted from one person to another. Earlier strains have only been mild viruses, but the current form, known as coronavirus disease 2019 (COVID-19), has become a deadly infection. The outbreak originated in Wuhan, China, and has since spread worldwide. The symptoms of COVID-19 include a dry cough, sore throat, fever, and nasal congestion. Antimicrobial drugs, pathogen–host interaction, and 2 weeks of isolation have been recommended for the treatment of the infection. Safe operating procedures, such as the use of face masks, hand sanitizer, handwashing with soap, and social distancing, are also… More >

  • Open Access

    ARTICLE

    Experimental Study of Effect of Temperature Variations on the Impedance Signature of PZT Sensors for Fatigue Crack Detection

    Saqlain Abbas1,2,*, Fucai Li1, Zulkarnain Abbas3,4, Taufeeq Ur Rehman Abbasi5, Xiaotong Tu6, Riffat Asim Pasha7

    Sound & Vibration, Vol.55, No.1, pp. 1-18, 2021, DOI:10.32604/sv.2021.013754

    Abstract Structural health monitoring (SHM) is recognized as an efficient tool to interpret the reliability of a wide variety of infrastructures. To identify the structural abnormality by utilizing the electromechanical coupling property of piezoelectric transducers, the electromechanical impedance (EMI) approach is preferred. However, in real-time SHM applications, the monitored structure is exposed to several varying environmental and operating conditions (EOCs). The previous study has recognized the temperature variations as one of the serious EOCs that affect the optimal performance of the damage inspection process. In this framework, an experimental setup is developed in current research to identify the presence of fatigue… More >

  • Open Access

    ARTICLE

    Healthcare Device Security: Insights and Implications

    Wajdi Alhakami1, Abdullah Baz2, Hosam Alhakami3, Masood Ahmad4, Raees Ahmad Khan4,*

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 409-424, 2021, DOI:10.32604/iasc.2021.015351

    Abstract Healthcare devices play an essential role in tracking and managing patient’s safety. However, the complexities of healthcare devices often remain ambiguous due to hardware, software, or the interoperable healthcare system problems. There are essentially two critical factors for targeting healthcare: First, healthcare data is the most valuable entity on the dark web; and the second, it is the easiest to hack. Data pilferage has become a major hazard for healthcare organizations as the hackers now demand ransom and threaten to disclose the sensitive data if not paid within the stipulated timeline. The present study enlists a thorough research on the… More >

  • Open Access

    ARTICLE

    Device Security Assessment of Internet of Healthcare Things

    Abdulaziz Attaallah1, Masood Ahmad2, Md Tarique Jamal Ansari2, Abhishek Kumar Pandey2, Rajeev Kumar2,3,*, Raees Ahmad Khan2

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 593-603, 2021, DOI:10.32604/iasc.2021.015092

    Abstract Security of the Internet of Healthcare Things (IoHT) devices plays a vital role in e-healthcare today and there has been a rapid increase in the use of networked devices of IoHT in the present healthcare services. However, these networked devices are also highly vulnerable to attackers who constantly target the security of devices and their components to gain access to the patients’ data. Infringement of patients’ data is not only a violation of privacy but can also jeopardize patients’ health if the health records are tampered with. Once the device has been intruded upon, attackers can not only change the… More >

  • Open Access

    ARTICLE

    Suitability of VVC and HEVC for Video Telehealth Systems

    Muhammad Arslan Usman1,4,*, Muhammad Rehan Usman2, Rizwan Ali Naqvi3, Bernie Mcphilips4, Christopher Romeika4, Daniel Cunliffe4, Christos Politis1, Nada Philip1

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 529-547, 2021, DOI:10.32604/cmc.2021.014614

    Abstract Video compression in medical video streaming is one of the key technologies associated with mobile healthcare. Seamless delivery of medical video streams over a resource constrained network emphasizes the need of a video codec that requires minimum bitrates and maintains high perceptual quality. This paper presents a comparative study between High Efficiency Video Coding (HEVC) and its potential successor Versatile Video Coding (VVC) in the context of healthcare. A large-scale subjective experiment comprising of twenty-four non-expert participants is presented for eight different test conditions in Full High Definition (FHD) videos. The presented analysis highlights the impact of compression artefacts on… More >

  • Open Access

    ARTICLE

    A Secure NDN Framework for Internet of Things Enabled Healthcare

    Syed Sajid Ullah1, Saddam Hussain1,*, Abdu Gumaei2,3, Hussain AlSalman2,4

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 223-240, 2021, DOI:10.32604/cmc.2021.014413

    Abstract Healthcare is a binding domain for the Internet of Things (IoT) to automate healthcare services for sharing and accumulation patient records at anytime from anywhere through the Internet. The current IP-based Internet architecture suffers from latency, mobility, location dependency, and security. The Named Data Networking (NDN) has been projected as a future internet architecture to cope with the limitations of IP-based Internet. However, the NDN infrastructure does not have a secure framework for IoT healthcare information. In this paper, we proposed a secure NDN framework for IoT-enabled Healthcare (IoTEH). In the proposed work, we adopt the services of Identity-Based Signcryption… More >

  • Open Access

    ARTICLE

    On Computing the Suitability of Non-Human Resources for Business Process Analysis

    Abid Sohail1,*, Khurram Shahzad2, P. D. D. Dominic3, Muhammad Arif Butt2, Muhammad Arif4, Muhammad Imran Tariq5

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 303-319, 2021, DOI:10.32604/cmc.2021.014201

    Abstract Business process improvement is a systematic approach used by several organizations to continuously improve their quality of service. Integral to that is analyzing the current performance of each task of the process and assigning the most appropriate resources to each task. In continuation of our previous work, we categorize resources into human and non-human resources. For instance, in the healthcare domain, human resources include doctors, nurses, and other associated staff responsible for the execution of healthcare activities; whereas the non-human resources include surgical and other equipment needed for execution. In this study, we contend that the two types of resources… More >

Displaying 391-400 on page 40 of 518. Per Page