Project managers often use Effort Estimating strategies to manage the human resources of current or upcoming software projects. Prior to project implementation, cost, time, and personnel estimation are basically neces...
详细信息
Pattern mining is a core objective within data mining, involving the detection of frequent itemsets (collections of values) within databases. This process serves to extract valuable insights from the data, facilitatin...
详细信息
The term 'cloud cryptography' describes the application of cryptographic methods and protocols to protect communications and data in cloud computing settings. The provision of computing services, including sto...
详细信息
This paper presents the design and implementation of a low-complexity timing synchronization circuit for the IEEE 802.15.4a/z IR-UWB wireless communication standard. The circuit structure of a low-complexity correlato...
详细信息
The JARVIS AI Support System represents a remarkable fusion of modern technology, blending a sophisticated GUI design, seamless voice control, and inventive features like the captivating 'Air Canvas' facilitat...
详细信息
In today's world, Artificial Intelligence and Machine Learning are transforming many industries, but they rely on huge amounts of data leading to privacy issues. A better alternative is Federated learning. Federat...
详细信息
The investigation in this study entails integrating blockchain technology with maximal ratio combining in a triple branch configuration for secure communications under multipath fading conditions. The proposed combine...
详细信息
Human activity recognition (HAR) is crucial for real-world applications such as healthcare, surveillance, and smart homes. Among sensing technologies, millimeter wave (mmWave) sensors stand out due to their contactles...
详细信息
Programming code is variable length. As code size grows larger than primary memory, virtual memory is a relevant concept. As the concept suggests, virtual memory allows to extend primary storage usage with storage dev...
详细信息
Electronic health records (EHRs) provide significant challenges for medical organizations due to the digitalization of traditional medical information. When using EHRs, both doctors and patients are accustomed to spen...
详细信息
Electronic health records (EHRs) provide significant challenges for medical organizations due to the digitalization of traditional medical information. When using EHRs, both doctors and patients are accustomed to spending considerable time conducting the necessary queries;nevertheless, the acquired data is not always related to the sought one, and access may be revoked if this is the case. The exchange and maintenance of medical health records are among the most crucial tasks in the healthcare system. The integrity of health records is crucial, as is maintaining patient anonymity, and either would have devastating effects in the event of a breach. Therefore, it is one of the most important reasons to keep electronic health records safe. Modern healthcare infrastructure is notoriously difficult to use, wasteful, and fraught with problems related to data integrity, security, and privacy. Better EHR management and monitoring, however, has the potential to lessen the severity of the problems with security and complexity. The blockchain's potential, with its decentralized and trustworthy nature in the healthcare industry, makes this a reality. Problems with data management and the way information is validated and disseminated are at the heart of the healthcare delivery system's inherent difficulties. Improved access to medication tracking, hospital assets, drug systems, patient information, and so on is the primary benefit of employing blockchain technology in healthcare data management. Because of how important it is to have access to a patient's medical history when prescribing medication, blockchain technology has the potential to significantly enhance the current healthcare delivery system. Therefore, it is critical to develop a blockchain-based system for verifying and protecting medical records. The primary objective of this article is to create a permissioned blockchain-based Ciphertext Policy-Attribute-based encryption system to protect privacy and regulate acces
暂无评论