Fake news misleads people and may lead to real-world miscommunication and injury. Removing misinformation encourages critical thinking, democracy, and the prevention of hatred, fear, and misunderstanding. Identifying ...
详细信息
Without proper security mechanisms, medical records stored electronically can be accessed more easily than physical files. Patient health information is scattered throughout the hospital environment, including laborat...
详细信息
Without proper security mechanisms, medical records stored electronically can be accessed more easily than physical files. Patient health information is scattered throughout the hospital environment, including laboratories, pharmacies, and daily medical status reports. The electronic format of medical reports ensures that all information is available in a single place. However, it is difficult to store and manage large amounts of data. Dedicated servers and a data center are needed to store and manage patient data. However, self-managed data centers are expensive for hospitals. Storing data in a cloud is a cheaper alternative. The advantage of storing data in a cloud is that it can be retrieved anywhere and anytime using any device connected to the Internet. Therefore, doctors can easily access the medical history of a patient and diagnose diseases according to the context. It also helps prescribe the correct medicine to a patient in an appropriate way. The systematic storage of medical records could help reduce medical errors in hospitals. The challenge is to store medical records on a third-party cloud server while addressing privacy and security concerns. These servers are often semi-trusted. Thus, sensitive medical information must be protected. Open access to records and modifications performed on the information in those records may even cause patient fatalities. Patient-centric health-record security is a major concern. End-to-end file encryption before outsourcing data to a third-party cloud server ensures security. This paper presents a method that is a combination of the advanced encryption standard and the elliptical curve Diffie-Hellman method designed to increase the efficiency of medical record security for users. Comparisons of existing and proposed techniques are presented at the end of the article, with a focus on the analyzing the security approaches between the elliptic curve and secret-sharing methods. This study aims to provide a high level of s
Deepfakes are explicit films created by swapping faces using neural networks. This type of artificial intelligence has been applied to complicated problems such as vote-based systems and national security. Deepfake ca...
详细信息
This research introduces a trimodal approach that integrates image caption, image generation and action semantic to achieve zero-shot and few-shot action recognition. The modules used to implement the modalities are I...
详细信息
Many research efforts into video conferencing technology have focused on audio-only interactions. Text chat, on the other hand, has many uses and is often used in conjunction with the audio channel in multimedia confe...
详细信息
With the integration of Internet of Things (IoT), Smart trolley technology has significantly revolutionized the retail experience by removing traditional checkout wait times. Payments for shopping baskets can be perfo...
详细信息
The Software Development Lifecycle (SDLC) is a structured process that guides the development of software projects, encompassing phases from planning to deployment. Traditionally, the SDLC has relied on manual input, ...
详细信息
The assessment of the quality of hyacinth bean provides grave problems in the agricultural production sector, where traditional methods have widely been used. These are time consuming and mainly subjective, and this a...
详细信息
Due to the rapid expansion of websites and the massive exchange of data about private information over the last few years, the internet has become an indispensable part of peoples' everyday lives. Because of its w...
详细信息
In recent years, there has been a persistent focus on developing systems that can automatically identify the hate speech content circulating on diverse social media platforms. This paper describes the team "Trans...
详细信息
暂无评论