Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (199)
  • Open Access

    ARTICLE

    An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN

    Shadi Nashwan*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 607-642, 2021, DOI:10.32604/cmc.2021.015597

    Abstract The healthcare internet of things (IoT) system has dramatically reshaped this important industry sector. This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable connection of patients and healthcare providers. The goal is the remote monitoring of a patient’s physiological data by physicians. Moreover, this system can reduce the number and expenses of healthcare centers, make up for the shortage of healthcare centers in remote areas, enable consultation with expert physicians around the world, and increase the health awareness of communities. The major challenges that affect the rapid deployment and widespread acceptance of… More >

  • Open Access

    ARTICLE

    Blockchain-as-a-Utility for Next-Generation Healthcare Internet of Things

    Alaa Omran Almagrabi1, Rashid Ali2, Daniyal Alghazzawi1, Abdullah AlBarakati1, Tahir Khurshaid3,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 359-376, 2021, DOI:10.32604/cmc.2021.014753

    Abstract The scope of the Internet of Things (IoT) applications varies from strategic applications, such as smart grids, smart transportation, smart security, and smart healthcare, to industrial applications such as smart manufacturing, smart logistics, smart banking, and smart insurance. In the advancement of the IoT, connected devices become smart and intelligent with the help of sensors and actuators. However, issues and challenges need to be addressed regarding the data reliability and protection for significant next-generation IoT applications like smart healthcare. For these next-generation applications, there is a requirement for far-reaching privacy and security in the IoT. Recently, blockchain systems have emerged… More >

  • Open Access

    ARTICLE

    Managing Software Security Risks through an Integrated Computational Method

    Abdullah Alharbi1, Wael Alosaimi1, Hashem Alyami2, Mohd Nadeem3, Mohd Faizan3, Alka Agrawal3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 179-194, 2021, DOI:10.32604/iasc.2021.016646

    Abstract Security risk evaluation of web-based healthcare applications is important from a design perspective. The developers as well as the users need to make sure that the applications must be secure. Citing the disastrous effects of unsecured web applications, Accuntix Online states that the IT industry has lost millions of dollars due to security theft and malware attacks. Protecting the integrity of patients’ health data is of utmost importance. Thus, assessing the security risk of web-based healthcare applications should be accorded the highest priority while developing the web applications. To fulfill the security requirements, the developers must meticulously follow the Multi-Criteria… More >

  • Open Access

    ARTICLE

    A Technology Enabled Learning Model in Healthcare during COVID-19

    Habib Ur Rahman1,*, Nazir Ahmed Sangi2, Moiz Uddin Ahmed1

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 261-275, 2021, DOI:10.32604/iasc.2021.016107

    Abstract The World Health Organization has warned about the spread of communicable and non-communicable diseases especially in the developing countries. The COVID–19 has also emerged as one of the most challengeable pandemics of the whole world. In current medical emergency, the virtual health education is much vital for handling alerts and outbreaks of diseases for a community of users. The Information and Communication Technology provide an opportunity to deal with the challenges related to handling alerts and outbreaks of diseases. The technology infrastructure in the developing countries is surging rise and can be used to develop Technology Enabled Learning Solutions for… More >

  • Open Access

    REVIEW

    Review of Internet of Things in Different Sectors: Recent Advances, Technologies, and Challenges

    Samreen Mahmood*

    Journal on Internet of Things, Vol.3, No.1, pp. 19-26, 2021, DOI:10.32604/jiot.2021.013071

    Abstract Human beings and their activities are now connected through Internet of Things (IoT) with the evolution of wireless communication technologies. IoT is becoming popular and its usage is immensely increasing among various sectors. In this research paper, a comprehensive review has been conducted by considering recent and important literature review on IoT applications being operated in three major sectors. The three sectors studied are health, sports and transportation and logistics. Paper explored that with the help of IoT techniques, different miniature sized devices are invented which can record various parameters of human body, wearables devices have been invented which are… More >

  • Open Access

    ARTICLE

    Unified Computational Modelling for Healthcare Device Security Assessment

    Shakeel Ahmed*, Abdulaziz Alhumam

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 1-18, 2021, DOI:10.32604/csse.2021.015775

    Abstract This article evaluates the security techniques that are used to maintain the healthcare devices, and proposes a mathematical model to list these in the order of priority and preference. To accomplish the stated objective, the article uses the Fuzzy Analytic Network Process (ANP) integrated with Technical for Order Preference by Similarities to Ideal Solution (TOPSIS) to find the suitable alternatives of the security techniques for securing the healthcare devices from trespassing. The methodology is enlisted to rank the alternatives/ techniques based on their weights’ satisfaction degree. Thereafter, the ranks of the alternatives determine the order of priority for the techniques… More >

  • Open Access

    ARTICLE

    Fuzzy Logic-Based Health Monitoring System for COVID’19 Patients

    M. Jayalakshmi1, Lalit Garg2,*, K. Maharajan3, K. Jayakumar4, Kathiravan Srinivasan5, Ali Kashif Bashir6, K. Ramesh7

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2431-2447, 2021, DOI:10.32604/cmc.2021.015352

    Abstract In several countries, the ageing population contour focuses on high healthcare costs and overloaded health care environments. Pervasive health care monitoring system can be a potential alternative, especially in the COVID-19 pandemic situation to help mitigate such problems by encouraging healthcare to transition from hospital-centred services to self-care, mobile care and home care. In this aspect, we propose a pervasive system to monitor the COVID’19 patient’s conditions within the hospital and outside by monitoring their medical and psychological situation. It facilitates better healthcare assistance, especially for COVID’19 patients and quarantined people. It identifies the patient’s medical and psychological condition based… More >

  • Open Access

    REVIEW

    A Comprehensive Review on Medical Diagnosis Using Machine Learning

    Kaustubh Arun Bhavsar1, Ahed Abugabah2, Jimmy Singla1,*, Ahmad Ali AlZubi3, Ali Kashif Bashir4, Nikita5

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1997-2014, 2021, DOI:10.32604/cmc.2021.014943

    Abstract The unavailability of sufficient information for proper diagnosis, incomplete or miscommunication between patient and the clinician, or among the healthcare professionals, delay or incorrect diagnosis, the fatigue of clinician, or even the high diagnostic complexity in limited time can lead to diagnostic errors. Diagnostic errors have adverse effects on the treatment of a patient. Unnecessary treatments increase the medical bills and deteriorate the health of a patient. Such diagnostic errors that harm the patient in various ways could be minimized using machine learning. Machine learning algorithms could be used to diagnose various diseases with high accuracy. The use of machine… More >

  • Open Access

    ARTICLE

    Optimized Predictive Framework for Healthcare Through Deep Learning

    Yasir Shahzad1,*, Huma Javed1, Haleem Farman2, Jamil Ahmad2, Bilal Jan3, Abdelmohsen A. Nassani4

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2463-2480, 2021, DOI:10.32604/cmc.2021.014904

    Abstract Smart healthcare integrates an advanced wave of information technology using smart devices to collect health-related medical science data. Such data usually exist in unstructured, noisy, incomplete, and heterogeneous forms. Annotating these limitations remains an open challenge in deep learning to classify health conditions. In this paper, a long short-term memory (LSTM) based health condition prediction framework is proposed to rectify imbalanced and noisy data and transform it into a useful form to predict accurate health conditions. The imbalanced and scarce data is normalized through coding to gain consistency for accurate results using synthetic minority oversampling technique. The proposed model is… More >

  • Open Access

    ARTICLE

    A Machine Learning Approach for Expression Detection in Healthcare Monitoring Systems

    Muhammad Kashif1, Ayyaz Hussain2, Asim Munir1, Abdul Basit Siddiqui3, Aaqif Afzaal Abbasi4, Muhammad Aakif5, Arif Jamal Malik4, Fayez Eid Alazemi6, Oh-Young Song7,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2123-2139, 2021, DOI:10.32604/cmc.2021.014782

    Abstract Expression detection plays a vital role to determine the patient’s condition in healthcare systems. It helps the monitoring teams to respond swiftly in case of emergency. Due to the lack of suitable methods, results are often compromised in an unconstrained environment because of pose, scale, occlusion and illumination variations in the image of the face of the patient. A novel patch-based multiple local binary patterns (LBP) feature extraction technique is proposed for analyzing human behavior using facial expression recognition. It consists of three-patch [TPLBP] and four-patch LBPs [FPLBP] based feature engineering respectively. Image representation is encoded from local patch statistics… More >

Displaying 161-170 on page 17 of 199. Per Page