The increasing population, climate fluctuations, soil erosion, limited water resources, and concerns about food security highlight the need for effective and sustainable approaches to food production. Aquaponics repre...
详细信息
Programming code is variable length. As code size grows larger than primary memory, virtual memory is a relevant concept. As the concept suggests, virtual memory allows to extend primary storage usage with storage dev...
详细信息
This paper is organized as follows: Section II provides a background on our research work based on DSA in CRNs using CR under different fading conditions. c) Performance: We also study how effective adaptive algorithm...
详细信息
Electronic health records (EHRs) provide significant challenges for medical organizations due to the digitalization of traditional medical information. When using EHRs, both doctors and patients are accustomed to spen...
详细信息
Electronic health records (EHRs) provide significant challenges for medical organizations due to the digitalization of traditional medical information. When using EHRs, both doctors and patients are accustomed to spending considerable time conducting the necessary queries;nevertheless, the acquired data is not always related to the sought one, and access may be revoked if this is the case. The exchange and maintenance of medical health records are among the most crucial tasks in the healthcare system. The integrity of health records is crucial, as is maintaining patient anonymity, and either would have devastating effects in the event of a breach. Therefore, it is one of the most important reasons to keep electronic health records safe. Modern healthcare infrastructure is notoriously difficult to use, wasteful, and fraught with problems related to data integrity, security, and privacy. Better EHR management and monitoring, however, has the potential to lessen the severity of the problems with security and complexity. The blockchain's potential, with its decentralized and trustworthy nature in the healthcare industry, makes this a reality. Problems with data management and the way information is validated and disseminated are at the heart of the healthcare delivery system's inherent difficulties. Improved access to medication tracking, hospital assets, drug systems, patient information, and so on is the primary benefit of employing blockchain technology in healthcare data management. Because of how important it is to have access to a patient's medical history when prescribing medication, blockchain technology has the potential to significantly enhance the current healthcare delivery system. Therefore, it is critical to develop a blockchain-based system for verifying and protecting medical records. The primary objective of this article is to create a permissioned blockchain-based Ciphertext Policy-Attribute-based encryption system to protect privacy and regulate acces
Human activity recognition (HAR) is crucial for real-world applications such as healthcare, surveillance, and smart homes. Among sensing technologies, millimeter wave (mmWave) sensors stand out due to their contactles...
详细信息
Deduplication is a ubiquitous compression technique for cloud storage servers. It reduces storage and bandwidth requirements by avoiding duplicate copies of data. However, developing an encryption scheme for deduplica...
详细信息
The industrial sector has entered a phase of profound change which sees digital technologies being integrated into the heart of industrial processes. This fourth industrial era gives birth to a new generation of facto...
详细信息
Evolving and adapting healthcare along with growing technology is an urgent need of an hour using machine learning is an addition to classify health data for the large aspect of identifying dermatological illness. Con...
详细信息
In recent times, blockchain technology, especially Ethereum, has gained tremendous popularity for supporting various financial transactions. Ethereum, the second most prominent cryptocurrency platform after Bitcoin, p...
详细信息
The term 'cloud cryptography' describes the application of cryptographic methods and protocols to protect communications and data in cloud computing settings. The provision of computing services, including sto...
详细信息
暂无评论