Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (288)
  • Open Access

    ARTICLE

    Attribute-Based Encryption for Secure Access Control in Personal Health Records

    Dakshnamoorthy Manivannan*

    Computer Systems Science and Engineering, Vol.49, pp. 533-555, 2025, DOI:10.32604/csse.2025.072267 - 08 December 2025

    Abstract Attribute-based Encryption (ABE) enhances the confidentiality of Electronic Health Records (EHR) (also known as Personal Health Records (PHR)) by binding access rights not to individual identities, but to user attribute sets such as roles, specialties, or certifications. This data-centric cryptographic paradigm enables highly fine-grained, policy-driven access control, minimizing the need for identity management and supporting scalable multi-user scenarios. This paper presents a comprehensive and critical survey of ABE schemes developed specifically for EHR/PHR systems over the past decade. It explores the evolution of these schemes, analyzing their design principles, strengths, limitations, and the level of More >

  • Open Access

    ARTICLE

    An Efficient CSP-PDW Approach for ECG Signal Compression and Reconstruction for IoT-Based Healthcare

    Hari Mohan Rai1,#, Chandra Mukherjee2,#, Joon Yoo1, Hanaa A. Abdallah3, Saurabh Agarwal4,*, Wooguil Pak4,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5723-5745, 2025, DOI:10.32604/cmc.2025.070391 - 23 October 2025

    Abstract A hybrid Compressed Sensing and Primal-Dual Wavelet (CSP-PDW) technique is proposed for the compression and reconstruction of ECG signals. The compression and reconstruction algorithms are implemented using four key concepts: Sparsifying Basis, Restricted Isometry Principle, Gaussian Random Matrix, and Convex Minimization. In addition to the conventional compression sensing reconstruction approach, wavelet-based processing is employed to enhance reconstruction efficiency. A mathematical model of the proposed algorithm is derived analytically to obtain the essential parameters of compression sensing, including the sparsifying basis, measurement matrix size, and number of iterations required for reconstructing the original signal and determining More >

  • Open Access

    ARTICLE

    Generated Preserved Adversarial Federated Learning for Enhanced Image Analysis (GPAF)

    Sanaa Lakrouni*, Slimane Bah, Marouane Sebgui

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5555-5569, 2025, DOI:10.32604/cmc.2025.067654 - 23 October 2025

    Abstract Federated Learning (FL) has recently emerged as a promising paradigm that enables medical institutions to collaboratively train robust models without centralizing sensitive patient information. Data collected from different institutions represent distinct source domains. Consequently, discrepancies in feature distributions can significantly hinder a model’s generalization to unseen domains. While domain generalization (DG) methods have been proposed to address this challenge, many may compromise data privacy in FL by requiring clients to transmit their local feature representations to the server. Furthermore, existing adversarial training methods, commonly used to align marginal feature distributions, fail to ensure the consistency… More >

  • Open Access

    ARTICLE

    LSAP-IoHT: Lightweight Secure Authentication Protocol for the Internet of Healthcare Things

    Marwa Ahmim1, Nour Ouafi1, Insaf Ullah2,*, Ahmed Ahmim3, Djalel Chefrour3, Reham Almukhlifi4

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5093-5116, 2025, DOI:10.32604/cmc.2025.067641 - 23 October 2025

    Abstract The Internet of Healthcare Things (IoHT) marks a significant breakthrough in modern medicine by enabling a new era of healthcare services. IoHT supports real-time, continuous, and personalized monitoring of patients’ health conditions. However, the security of sensitive data exchanged within IoHT remains a major concern, as the widespread connectivity and wireless nature of these systems expose them to various vulnerabilities. Potential threats include unauthorized access, device compromise, data breaches, and data alteration, all of which may compromise the confidentiality and integrity of patient information. In this paper, we provide an in-depth security analysis of LAP-IoHT,… More >

  • Open Access

    ARTICLE

    Experiences of COVID-19 Intensive Care Unit Physicians and Hospital Administrators: Qualitative Findings from Focus Groups

    Traci N. Adams1,#,*, Haley Belt1,#, E. Whitney Pollio2, Leah Cohen1, Roma M. Mehta1, Hetal J. Patel1, Rosechelle M. Ruggiero1, Carol S. North3

    International Journal of Mental Health Promotion, Vol.27, No.9, pp. 1369-1382, 2025, DOI:10.32604/ijmhp.2025.066495 - 30 September 2025

    Abstract Background: While quantitative research has determined that emotional distress and psychiatric illness among frontline healthcare workers increased with the COVID-19 pandemic, detailed qualitative data describing their personal experiences are needed in order to make appropriate plans to address provider mental health in future pandemics. This study aims to further explore the psychological effects of the pandemic on COVID-19 ICU clinicians and administrators through focus groups. Methods: Two separate 2-h focus groups of physicians were conducted, one with frontline faculty clinicians and another with administrators. Qualitative data analysis was conducted. Results: In September and November 2023, volunteer… More >

  • Open Access

    ARTICLE

    Secure Malicious Node Detection in Decentralized Healthcare Networks Using Cloud and Edge Computing with Blockchain-Enabled Federated Learning

    Raj Sonani1, Reham Alhejaili2,*, Pushpalika Chatterjee3, Khalid Hamad Alnafisah4, Jehad Ali5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 3169-3189, 2025, DOI:10.32604/cmes.2025.070225 - 30 September 2025

    Abstract Healthcare networks are transitioning from manual records to electronic health records, but this shift introduces vulnerabilities such as secure communication issues, privacy concerns, and the presence of malicious nodes. Existing machine and deep learning-based anomalies detection methods often rely on centralized training, leading to reduced accuracy and potential privacy breaches. Therefore, this study proposes a Blockchain-based-Federated Learning architecture for Malicious Node Detection (BFL-MND) model. It trains models locally within healthcare clusters, sharing only model updates instead of patient data, preserving privacy and improving accuracy. Cloud and edge computing enhance the model’s scalability, while blockchain ensures More >

  • Open Access

    ARTICLE

    Noninvasive Hemoglobin Estimation with Adaptive Lightweight Convolutional Neural Network Using Wearable PPG

    Florentin Smarandache1, Saleh I. Alzahrani2, Sulaiman Al Amro3, Ijaz Ahmad4, Mubashir Ali5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 3715-3735, 2025, DOI:10.32604/cmes.2025.068736 - 30 September 2025

    Abstract Hemoglobin is a vital protein in red blood cells responsible for transporting oxygen throughout the body. Its accurate measurement is crucial for diagnosing and managing conditions such as anemia and diabetes, where abnormal hemoglobin levels can indicate significant health issues. Traditional methods for hemoglobin measurement are invasive, causing pain, risk of infection, and are less convenient for frequent monitoring. PPG is a transformative technology in wearable healthcare for noninvasive monitoring and widely explored for blood pressure, sleep, blood glucose, and stress analysis. In this work, we propose a hemoglobin estimation method using an adaptive lightweight… More >

  • Open Access

    ARTICLE

    Division in Unity: Towards Efficient and Privacy-Preserving Learning of Healthcare Data

    Panyu Liu1, Tongqing Zhou1,*, Guofeng Lu2, Huaizhe Zhou3, Zhiping Cai1

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 2913-2934, 2025, DOI:10.32604/cmc.2025.069175 - 23 September 2025

    Abstract The isolation of healthcare data among worldwide hospitals and institutes forms barriers for fully realizing the data-hungry artificial intelligence (AI) models promises in renewing medical services. To overcome this, privacy-preserving distributed learning frameworks, represented by swarm learning and federated learning, have been investigated recently with the sensitive healthcare data retaining in its local premises. However, existing frameworks use a one-size-fits-all mode that tunes one model for all healthcare situations, which could hardly fit the usually diverse disease prediction in practice. This work introduces the idea of ensemble learning into privacy-preserving distributed learning and presents the More >

  • Open Access

    ARTICLE

    An Auto Encoder-Enhanced Stacked Ensemble for Intrusion Detection in Healthcare Networks

    Fatma S. Alrayes1, Mohammed Zakariah2,*, Mohammed K. Alzaylaee3, Syed Umar Amin4, Zafar Iqbal Khan4

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3457-3484, 2025, DOI:10.32604/cmc.2025.068599 - 23 September 2025

    Abstract Healthcare networks prove to be an urgent issue in terms of intrusion detection due to the critical consequences of cyber threats and the extreme sensitivity of medical information. The proposed Auto-Stack ID in the study is a stacked ensemble of encoder-enhanced auctions that can be used to improve intrusion detection in healthcare networks. The WUSTL-EHMS 2020 dataset trains and evaluates the model, constituting an imbalanced class distribution (87.46% normal traffic and 12.53% intrusion attacks). To address this imbalance, the study balances the effect of training Bias through Stratified K-fold cross-validation (K = 5), so that… More >

  • Open Access

    ARTICLE

    TRANSHEALTH: A Transformer-BDI Hybrid Framework for Real-Time Psychological Distress Detection in Ambient Healthcare

    Parul Dubey1,*, Pushkar Dubey2, Mohammed Zakariah3,4,*, Abdulaziz S. Almazyad4, Deema Mohammed Alsekait5

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3897-3919, 2025, DOI:10.32604/cmc.2025.066882 - 23 September 2025

    Abstract Psychological distress detection plays a critical role in modern healthcare, especially in ambient environments where continuous monitoring is essential for timely intervention. Advances in sensor technology and artificial intelligence (AI) have enabled the development of systems capable of mental health monitoring using multi-modal data. However, existing models often struggle with contextual adaptation and real-time decision-making in dynamic settings. This paper addresses these challenges by proposing TRANS-HEALTH, a hybrid framework that integrates transformer-based inference with Belief-Desire-Intention (BDI) reasoning for real-time psychological distress detection. The framework utilizes a multimodal dataset containing EEG, GSR, heart rate, and activity… More >

Displaying 11-20 on page 2 of 288. Per Page