The advancements in sensing technologies,information processing,and communication schemes have revolutionized the healthcare *** Healthcare Records(EHR)facilitate the patients,doctors,hospitals,and other stakeholders ...
详细信息
The advancements in sensing technologies,information processing,and communication schemes have revolutionized the healthcare *** Healthcare Records(EHR)facilitate the patients,doctors,hospitals,and other stakeholders to maintain valuable data and medical *** traditional EHRs are based on cloud-based architectures and are susceptible to multiple cyberattacks.A single attempt of a successful Denial of Service(DoS)attack can compromise the complete healthcare *** article introduces a secure and immutable blockchain-based framework for the Internet of Medical Things(IoMT)to address the stated *** proposed architecture is on the idea of a lightweight private blockchain-based network that facilitates the users and hospitals to perform multiple healthcare-related operations in a secure and trustworthy *** efficacy of the proposed framework is evaluated in the context of service execution time and *** experimental outcomes indicate that the proposed design attained lower service execution time and higher throughput under different control parameters.
This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc...
详细信息
This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc On-Demand Distance Vector(AODV),Dynamic Source Routing(DSR),and Zone Routing Protocol(ZRP).In this paper,the evaluation will be carried out using complete sets of statistical tests such as Kruskal-Wallis,Mann-Whitney,and *** articulates a systematic evaluation of how the performance of the previous protocols varies with the number of nodes and the mobility *** study is premised upon the Quality of Service(QoS)metrics of throughput,packet delivery ratio,and end-to-end delay to gain an adequate understanding of the operational efficiency of each protocol under different network *** findings explained significant differences in the performance of different routing protocols;as a result,decisions for the selection and optimization of routing protocols can be taken effectively according to different network *** paper is a step forward in the general understanding of the routing dynamics of MANETs and contributes significantly to the strategic deployment of robust and efficient network infrastructures.
In today's digital age, network security is paramount. This paper introduces a robust web application designed to swiftly identify network attacks and real-time anomalies, enabling users to protect their networks ...
详细信息
Underwater Wireless Sensor Networks(UWSNs)are gaining popularity because of their potential uses in oceanography,seismic activity monitoring,environmental preservation,and underwater ***,these networks are faced with ...
详细信息
Underwater Wireless Sensor Networks(UWSNs)are gaining popularity because of their potential uses in oceanography,seismic activity monitoring,environmental preservation,and underwater ***,these networks are faced with challenges such as self-interference,long propagation delays,limited bandwidth,and changing network *** challenges are coped with by designing advanced routing *** this work,we present Under Water Fuzzy-Routing Protocol for Low power and Lossy networks(UWF-RPL),an enhanced fuzzy-based protocol that improves decision-making during path selection and traffic distribution over different network *** method extends RPL with the aid of fuzzy logic to optimize depth,energy,Received Signal Strength Indicator(RSSI)to Expected Transmission Count(ETX)ratio,and *** protocol outperforms other techniques in that it offersmore energy efficiency,better packet delivery,lowdelay,and no queue *** also exhibits better scalability and reliability in dynamic underwater networks,which is of very high importance in maintaining the network operations efficiency and the lifetime of UWSNs *** to other recent methods,it offers improved network convergence time(10%–23%),energy efficiency(15%),packet delivery(17%),and delay(24%).
Artificial Intelligence usually comprises a system that is composed of hardware and software. Machine learning is a subset of artificial intelligence (AI). The study discovered that the environment and contemporary te...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the priv...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the privacy of patients. As medical information becomes more widely available, security measures must be established to protect confidentiality, integrity, and availability. Image steganography was recently proposed as an extra data protection mechanism for medical records. This paper describes a data-hiding approach for DICOM medical pictures. To ensure secrecy, we use Adversarial Neural Cryptography with SHA-256 (ANC-SHA-256) to encrypt and conceal the RGB patient picture within the medical image's Region of Non-Interest (RONI). To ensure anonymity, we use ANC-SHA-256 to encrypt the RGB patient image before embedding. We employ a secure hash method with 256bit (SHA-256) to produce a digital signature from the information linked to the DICOM file to validate the authenticity and integrity of medical pictures. Many tests were conducted to assess visual quality using diverse medical datasets, including MRI, CT, X-ray, and ultrasound cover pictures. The LFW dataset was chosen as a patient hidden picture. The proposed method performs well in visual quality measures including the PSNR average of 67.55, the NCC average of 0.9959, the SSIM average of 0.9887, the UQI average of 0.9859, and the APE average of 3.83. It outperforms the most current techniques in these visual quality measures (PSNR, MSE, and SSIM) across six medical assessment categories. Furthermore, the proposed method offers great visual quality while being resilient to physical adjustments, histogram analysis, and other geometrical threats such as cropping, rotation, and scaling. Finally, it is particularly efficient in telemedicine applications with high achieving security with a ratio of 99% during remote transmission of Electronic Patient Records (EPR) over the Internet, which safeguards the patien
The implementation of Countermeasure Techniques(CTs)in the context of Network-On-Chip(NoC)based Multiprocessor System-On-Chip(MPSoC)routers against the Flooding Denial-of-Service Attack(F-DoSA)falls under Multi-Criter...
详细信息
The implementation of Countermeasure Techniques(CTs)in the context of Network-On-Chip(NoC)based Multiprocessor System-On-Chip(MPSoC)routers against the Flooding Denial-of-Service Attack(F-DoSA)falls under Multi-Criteria Decision-Making(MCDM)due to the three main concerns,called:traffic variations,multiple evaluation criteria-based traffic features,and prioritization NoC routers as an *** this study,we propose a comprehensive evaluation of various NoC traffic features to identify the most efficient routers under the F-DoSA ***,an MCDM approach is essential to address these emerging *** the recent MCDM approach has some issues,such as uncertainty,this study utilizes Fuzzy-Weighted Zero-Inconsistency(FWZIC)to estimate the criteria weight values and Fuzzy Decision by Opinion Score Method(FDOSM)for ranking the routers with fuzzy Single-valued Neutrosophic under names(SvN-FWZIC and SvN-FDOSM)to overcome the *** results obtained by using the SvN-FWZIC method indicate that the Max packet count has the highest importance among the evaluated criteria,with a weighted score of *** contrast,the Hop count is identified as the least significant criterion,with a weighted score of *** remaining criteria fall within a range of intermediate importance,with enqueue time scoring 0.1845,packet count decremented and traversal index scoring 0.1262,packet count incremented scoring 0.1124,and packet count index scoring *** terms of ranking,SvN-FDOSM has two approaches:individual and *** the individual and group ranking processes show that(Router 4)is the most effective router,while(Router 3)is the lowest router under *** sensitivity analysis provides a high stability in ranking among all 10 *** approach offers essential feedback in making proper decisions in the design of countermeasure techniques in the domain of NoC-based MPSoC.
One of the most important aspects of environmental sustainability is water quality monitoring. The ecology is impacted by poor water quality in addition to aquatic life. With the volume of data being collected from sa...
详细信息
Maize is a vital global crop, essential for food security but highly susceptible to diseases that threaten yield and quality. Traditional methods for detecting these diseases are computationally intensive and rely on ...
详细信息
PAGER EXPLOSION:THE *** 2024 Lebanon pager explosions represent one of the most unexpected and devastating technological incidents in recent *** September 17 and 18,2024,thousands of pagers and walkie-talkies exploded...
详细信息
PAGER EXPLOSION:THE *** 2024 Lebanon pager explosions represent one of the most unexpected and devastating technological incidents in recent *** September 17 and 18,2024,thousands of pagers and walkie-talkies exploded simultaneously across Lebanon and parts of Syria,resulting in 42 deaths and more than 3500 *** handheld communication devices,previously regarded as secure and low-profile,were rigged with concealed explosives and remotely triggered by attackers.
暂无评论