Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (111)
  • Open Access

    ARTICLE

    Ontological Model for Cohesive Smart Health Services Management

    Muhammad Raza Naqvi1, Muhammad Waseem Iqbal2,*, Syed Khuram Shahzad3, M. Usman Ashraf4, Khalid Alsubhi5, Hani Moaiteq Aljahdali6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3679-3695, 2023, DOI:10.32604/cmc.2023.030340 - 31 October 2022

    Abstract Health care has become an essential social-economic concern for all stakeholders (e.g., patients, doctors, hospitals etc.), health needs, private care and the elderly class of society. The massive increase in the usage of health care Internet of things (IoT) applications has great technological evolvement in human life. There are various smart health care services like remote patient monitoring, diagnostic, disease-specific remote treatments and telemedicine. These applications are available in a split fashion and provide solutions for variant diseases, medical resources and remote service management. The main objective of this research is to provide a management… More >

  • Open Access

    ARTICLE

    A Secure Multi-factor Authentication Protocol for Healthcare Services Using Cloud-based SDN

    Sugandhi Midha1, Sahil Verma1,*, Kavita1, Mohit Mittal2, Nz Jhanjhi3,4, Mehedi Masud5, Mohammed A. AlZain6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3711-3726, 2023, DOI:10.32604/cmc.2023.027992 - 31 October 2022

    Abstract Cloud-based SDN (Software Defined Network) integration offers new kinds of agility, flexibility, automation, and speed in the network. Enterprises and Cloud providers both leverage the benefits as networks can be configured and optimized based on the application requirement. The integration of cloud and SDN paradigms has played an indispensable role in improving ubiquitous health care services. It has improved the real-time monitoring of patients by medical practitioners. Patients’ data get stored at the central server on the cloud from where it is available to medical practitioners in no time. The centralisation of data on the… More >

  • Open Access

    ARTICLE

    An Integrated and Comprehensive Fuzzy Multi-Criteria Model for Electronic Wallet Selection

    Phuoc Van Nguyen*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2279-2301, 2023, DOI:10.32604/cmc.2023.030019 - 22 September 2022

    Abstract Electronic wallet (E-wallet), which combines software, hardware, and human interaction, is a modern platform for electronic payment. Financial services managers can create more effective strategies for advancing existing positions by evaluating the success of e-wallet services. The objective of this research is to create an integrated model for assessing E-wallet services using the Fuzzy Analytic Hierarchy Process (FAHP) in conjunction with a technique for extent analysis and the ARAS approach (Additive Ratio Assessment). In this study, E-wallet service providers are ranked and evaluated using the ARAS approach and the FAHP priority weights. In addition, a More >

  • Open Access

    ARTICLE

    A Process Oriented Integration Model for Smart Health Services

    Farzana Kausar Gondal1,*, Syed Khuram Shahzad2, Muhammad Arfan Jaffar3, Muhammad Waseem Iqbal4

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1369-1386, 2023, DOI:10.32604/iasc.2023.028407 - 19 July 2022

    Abstract Cities are facing challenges of high rise in population number and consequently need to be equipped with latest smart services to provide luxuries of life to its residents. Smart integrated solutions are also a need to deal with the social and environmental challenges, caused by increasing urbanization. Currently, the development of smart services’ integrated network, within a city, is facing the barriers including; less efficient collection and sharing of data, along with inadequate collaboration of software and hardware. Aiming to resolve these issues, this paper recommended a solution for a synchronous functionality in the smart… More >

  • Open Access

    ARTICLE

    WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services

    C. Edwin Singh1,*, S. Maria Celestin Vigila2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1737-1751, 2023, DOI:10.32604/iasc.2023.028022 - 19 July 2022

    Abstract Mobile ad-hoc networks (MANET) are garnering a lot of attention because of their potential to provide low-cost solutions to real-world communications. MANETs are more vulnerable to security threats. Changes in nodes, bandwidth limits, and centralized control and management are some of the characteristics. IDS (Intrusion Detection System) are the aid for detection, determination, and identification of illegal system activity such as use, copying, modification, and destruction of data. To address the identified issues, academics have begun to concentrate on building IDS-based machine learning algorithms. Deep learning is a type of machine learning that can produce… More >

  • Open Access

    ARTICLE

    Intelligent Deep Learning Enabled Human Activity Recognition for Improved Medical Services

    E. Dhiravidachelvi1, M.Suresh Kumar2, L. D. Vijay Anand3, D. Pritima4, Seifedine Kadry5, Byeong-Gwon Kang6, Yunyoung Nam7,*

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 961-977, 2023, DOI:10.32604/csse.2023.024612 - 15 June 2022

    Abstract Human Activity Recognition (HAR) has been made simple in recent years, thanks to recent advancements made in Artificial Intelligence (AI) techniques. These techniques are applied in several areas like security, surveillance, healthcare, human-robot interaction, and entertainment. Since wearable sensor-based HAR system includes in-built sensors, human activities can be categorized based on sensor values. Further, it can also be employed in other applications such as gait diagnosis, observation of children/adult’s cognitive nature, stroke-patient hospital direction, Epilepsy and Parkinson’s disease examination, etc. Recently-developed Artificial Intelligence (AI) techniques, especially Deep Learning (DL) models can be deployed to accomplish… More >

  • Open Access

    ARTICLE

    Increasing aggressive prostate cancer

    Navin Shah1, Vladimir Ioffe2, Joshua C. Chang3

    Canadian Journal of Urology, Vol.29, No.6, pp. 11384-11390, 2022

    Abstract Introduction: To compare prostate biopsy (Pbx) characteristics, before and after the 2012 United States Preventive Services Task Force (USPSTF) prostate cancer screening guidelines in our practice.
    Materials and methods: We completed a retrospective comparative analysis of 1703 sequential patients that had a Pbx in 2010 to 2012 (3 years) with 1006 patients biopsied in 2018, 2019 and 2021 (3 years). Data from a total of 2709 Pbx was collected on patient age, race, prostate-specific antigen (PSA), digital rectal examination (DRE) and Gleason sum score (GSS). The data was analyzed to determine whether the 2012 USPSTF screening recommendations… More >

  • Open Access

    ARTICLE

    Réflexion sur l’offre de services psychologiques en oncologie et soins palliatifs dans deux centres hospitaliers universitaires montréalais

    C. Defer, M.-S. Bernatchez

    Psycho-Oncologie, Vol.16, No.1, pp. 212-217, 2022, DOI:10.3166/pson-2022-0184

    Abstract Face au cancer et à la fin de vie, la détresse émotionnelle est courante et de mieux en mieux repérée, résultant en de nombreuses demandes de consultation vers nos services psychologiques spécialisés. Les auteures présentent une réflexion sur les différents facteurs qui guident leurs choix d’interventions auprès de la clientèle en oncologie et soins palliatifs rencontrée en contexte hospitalier, le défi étant d’offrir le bon soin au moment opportun à tous les patients en besoin et leurs proches. Le plan de traitement sera adapté selon la sévérité et la nature de la détresse, la nécessité More >

  • Open Access

    ARTICLE

    Intelligent Resource Allocations for Software-Defined Mission-Critical IoT Services

    Chaebeen Nam1, Sa Math1, Prohim Tam1, Seokhoon Kim1,2,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4087-4102, 2022, DOI:10.32604/cmc.2022.030575 - 16 June 2022

    Abstract Heterogeneous Internet of Things (IoT) applications generate a diversity of novelty applications and services in next-generation networks (NGN), which is essential to guarantee end-to-end (E2E) communication resources for both control plane (CP) and data plane (DP). Likewise, the heterogeneous 5th generation (5G) communication applications, including Mobile Broadband Communications (MBBC), massive Machine-Type Commutation (mMTC), and ultra-reliable low latency communications (URLLC), obligate to perform intelligent Quality-of-Service (QoS) Class Identifier (QCI), while the CP entities will be suffered from the complicated massive HIOT applications. Moreover, the existing management and orchestration (MANO) models are inappropriate for resource utilization and… More >

  • Open Access

    ARTICLE

    Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing

    Abdul Saboor1,*, Mohd Fadzil Hassan2, Rehan Akbar1, Erwin Susanto3, Syed Nasir Mehmood Shah4, Muhammad Aadil Siddiqui5, Saeed Ahmed Magsi5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2223-2239, 2022, DOI:10.32604/cmc.2022.028382 - 16 June 2022

    Abstract Cloud computing has gained significant use over the last decade due to its several benefits, including cost savings associated with setup, deployments, delivery, physical resource sharing across virtual machines, and availability of on-demand cloud services. However, in addition to usual threats in almost every computing environment, cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm. Furthermore, since there are a growing number of attacks directed at cloud environments (including dictionary attacks, replay code attacks, denial of service attacks, rootkit attacks, code injection attacks,… More >

Displaying 31-40 on page 4 of 111. Per Page