Home / Journals / CSSE / Vol.42, No.3, 2022
Special lssues
  • Open AccessOpen Access

    ARTICLE

    Deep Learning Convolutional Neural Network for ECG Signal Classification Aggregated Using IoT

    S. Karthiga*, A. M. Abirami
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 851-866, 2022, DOI:10.32604/csse.2022.021935
    Abstract Much attention has been given to the Internet of Things (IoT) by citizens, industries, governments, and universities for applications like smart buildings, environmental monitoring, health care and so on. With IoT, network connectivity is facilitated between smart devices from anyplace and anytime. IoT-based health monitoring systems are gaining popularity and acceptance for continuous monitoring and detect health abnormalities from the data collected. Electrocardiographic (ECG) signals are widely used for heart diseases detection. A novel method has been proposed in this work for ECG monitoring using IoT techniques. In this work, a two-stage approach is employed. In the first stage, a… More >

  • Open AccessOpen Access

    ARTICLE

    Soft Computing Based Discriminator Model for Glaucoma Diagnosis

    Anisha Rebinth1,*, S. Mohan Kumar2
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 867-880, 2022, DOI:10.32604/csse.2022.022955
    Abstract In this study, a Discriminator Model for Glaucoma Diagnosis (DMGD) using soft computing techniques is presented. As the biomedical images such as fundus images are often acquired in high resolution, the Region of Interest (ROI) for glaucoma diagnosis must be selected at first to reduce the complexity of any system. The DMGD system uses a series of pre-processing; initial cropping by the green channel’s intensity, Spatially Weighted Fuzzy C Means (SWFCM), blood vessel detection and removal by Gaussian Derivative Filters (GDF) and inpainting algorithms. Once the ROI has been selected, the numerical features such as colour, spatial domain features from… More >

  • Open AccessOpen Access

    ARTICLE

    An Intelligent Recommendation System for Real Estate Commodity

    Tsung-Yin Ou1, Guan-Yu Lin2, Hsin-Pin Fu1, Shih-Chia Wei1, Wen-Lung Tsai3,*
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 881-897, 2022, DOI:10.32604/csse.2022.022637
    (This article belongs to the Special Issue: Soft Computing and Big Data Mining)
    Abstract Most real estate agents develop new objects by visiting unfamiliar clients, distributing leaflets, or browsing other real estate trading website platforms, whereas consumers often rely on websites to search and compare prices when purchasing real property. In addition to being time consuming, this search process renders it difficult for agents and consumers to understand the status changes of objects. In this study, Python is used to write web crawler and image recognition programs to capture object information from the web pages of real estate agents; perform data screening, arranging, and cleaning; compare the text of real estate object information; as… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Objective Modified Particle Swarm Optimization for Test Suite Reduction (MOMPSO)

    U. Geetha1,*, Sharmila Sankar2
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 899-917, 2022, DOI:10.32604/csse.2022.022621
    Abstract Software testing plays a pivotal role in entire software development lifecycle. It provides researchers with extensive opportunities to develop novel methods for the optimized and cost-effective test suite Although implementation of such a cost-effective test suite with regression testing is being under exploration still it contains lot of challenges and flaws while incorporating with any of the new regression testing algorithm due to irrelevant test cases in the test suite which are not required. These kinds of irrelevant test cases might create certain challenges such as code-coverage in the test suite, fault-tolerance, defects due to uncovered-statements and overall-performance at the… More >

  • Open AccessOpen Access

    ARTICLE

    A Compact Self-Isolated MIMO Antenna System for 5G Mobile Terminals

    Muhannad Y. Muhsin1,*, Ali J. Salim2, Jawad K. Ali2
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 919-934, 2022, DOI:10.32604/csse.2022.023102
    (This article belongs to the Special Issue: Emergent Topics in Intelligent Computing and Communication Engineering)
    Abstract A compact self-isolated Multi Input Multi Output (MIMO) antenna array is presented for 5G mobile phone devices. The proposed antenna system is operating at the 3.5 GHz band (3400–3600 MHz) and consists of eight antenna elements placed along two side edges of a mobile device, which meets the current trend requirements of full-screen smartphone devices. Each antenna element is divided into two parts, a front part and back part. The front part consists of an I-shaped feeding line and a modified Hilbert fractal monopole antenna, whereas the back part is an L-shaped element shorted to the system ground by a… More >

  • Open AccessOpen Access

    ARTICLE

    Cost Effective Optimal Task Scheduling Model in Hybrid Cloud Environment

    M. Manikandan1,*, R. Subramanian2, M. S. Kavitha3, S. Karthik3
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 935-948, 2022, DOI:10.32604/csse.2022.021816
    Abstract In today’s world, Cloud Computing (CC) enables the users to access computing resources and services over cloud without any need to own the infrastructure. Cloud Computing is a concept in which a network of devices, located in remote locations, is integrated to perform operations like data collection, processing, data profiling and data storage. In this context, resource allocation and task scheduling are important processes which must be managed based on the requirements of a user. In order to allocate the resources effectively, hybrid cloud is employed since it is a capable solution to process large-scale consumer applications in a pay-by-use… More >

  • Open AccessOpen Access

    ARTICLE

    FASTER–RCNN for Skin Burn Analysis and Tissue Regeneration

    C. Pabitha*, B. Vanathi
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 949-961, 2022, DOI:10.32604/csse.2022.021086
    Abstract Skin is the largest body organ that is prone to the environment most specifically. Therefore the skin is susceptible to many damages, including burn damage. Burns can endanger life and are linked to high morbidity and mortality rates. Effective diagnosis with the help of accurate burn zone and wound depth evaluation is important for clinical efficacy. The following characteristics are associated with the skin burn wound, such as healing, infection, painand stress and keloid formation. Tissue regeneration also takes a significant amount of time for formation while considering skin healing after a burn injury. Deep neural networks can automatically assist… More >

  • Open AccessOpen Access

    ARTICLE

    Research on Ratio of New Energy Vehicles to Charging Piles in China

    Zhiqiu Yu*, Shuo-Yan Chou
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 963-984, 2022, DOI:10.32604/csse.2022.023129
    (This article belongs to the Special Issue: Impact of Industry 4.0 on Supply Chain Management and Optimization)
    Abstract With the widespread of new energy vehicles, charging piles have also been continuously installed and constructed. In order to make the number of piles meet the needs of the development of new energy vehicles, this study aims to apply the method of system dynamics and combined with the grey prediction theory to determine the parameters as well as to simulate and analyze the ratio of vehicles to chargers. Through scenario analysis, it is predicted that by 2030, this ratio will gradually decrease from 1.79 to 1. In order to achieve this ratio as 1:1, it is necessary to speed up… More >

  • Open AccessOpen Access

    ARTICLE

    Virtual Nursing Using Deep Belief Networks for Elderly People (DBN-EP)

    S. Rajasekaran1,*, G. Kousalya2
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 985-1000, 2022, DOI:10.32604/csse.2022.022234
    Abstract The demand for better health services has resulted in the advancement of remote monitoring health, i.e., virtual nursing systems, to watch and support the elderly with innovative concepts such as being patient-centric, easier to use, and having smarter interactions and more accurate conclusions. While virtual nursing services attempt to provide consumers and medical practitioners with continuous medical and health monitoring services, access to allied healthcare experts such as nurses remains a challenge. In this research, we present Virtual Nursing Using Deep Belief Networks for Elderly People (DBN-EP), a new framework that provides a virtual nurse agent deployed on a senior… More >

  • Open AccessOpen Access

    ARTICLE

    Rice Leaves Disease Diagnose Empowered with Transfer Learning

    Nouh Sabri Elmitwally1,2, Maria Tariq3,4, Muhammad Adnan Khan5,*, Munir Ahmad3, Sagheer Abbas3, Fahad Mazaed Alotaibi6
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1001-1014, 2022, DOI:10.32604/csse.2022.022017
    Abstract In the agricultural industry, rice infections have resulted in significant productivity and economic losses. The infections must be recognized early on to regulate and mitigate the effects of the attacks. Early diagnosis of disease severity effects or incidence can preserve production from quantitative and qualitative losses, reduce pesticide use, and boost ta country’s economy. Assessing the health of a rice plant through its leaves is usually done as a manual ocular exercise. In this manuscript, three rice plant diseases: Bacterial leaf blight, Brown spot, and Leaf smut, were identified using the Alexnet Model. Our research shows that any reduction in… More >

  • Open AccessOpen Access

    ARTICLE

    A Usability Management Framework for Securing Healthcare Information System

    Hosam Alhakami1, Abdullah Baz2, Wajdi Alhakami3, Abhishek Kumar Pandey4, Alka Agrawal4, Raees Ahmad Khan4,*
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1015-1030, 2022, DOI:10.32604/csse.2022.021564
    Abstract Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses and compromising software usability as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The cyber… More >

  • Open AccessOpen Access

    ARTICLE

    Planetscope Nanosatellites Image Classification Using Machine Learning

    Mohd Anul Haq*
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1031-1046, 2022, DOI:10.32604/csse.2022.023221
    (This article belongs to the Special Issue: Innovation in Image Processing with Programmable Logic gates)
    Abstract To adopt sustainable crop practices in changing climate, understanding the climatic parameters and water requirements with vegetation is crucial on a spatiotemporal scale. The Planetscope (PS) constellation of more than 130 nanosatellites from Planet Labs revolutionize the high-resolution vegetation assessment. PS-derived Normalized Difference Vegetation Index (NDVI) maps are one of the highest resolution data that can transform agricultural practices and management on a large scale. High-resolution PS nanosatellite data was utilized in the current study to monitor agriculture’s spatiotemporal assessment for the Al-Qassim region, Kingdom of Saudi Arabia (KSA). The time series of NDVI was utilized to assess the vegetation… More >

  • Open AccessOpen Access

    ARTICLE

    Situation Awareness Data Fusion Method Based on Library Events

    Haixu Xi1,2, Wei Gao2,*, Gyun Yeol Park3
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1047-1061, 2022, DOI:10.32604/csse.2022.022051
    Abstract Microelectronic technology and communication technology are developed in deep manner; the computing mode has been transferred from traditional computer-centered to human centered pervasive. So, the concept of Internet of things (IoT) is gradually put forward, which allows people to access information about their surroundings on demand through different terminals. The library is the major public space for human to read and learn. How to provide a more comfortable library environment to better meet people’s learning requirements is a place where the Internet of things plays its role. The purpose of this paper is to solve the difference between the data… More >

  • Open AccessOpen Access

    ARTICLE

    Cross Layer QoS Aware Scheduling based on Loss-Based Proportional Fairness with Multihop CRN

    K. Saravanan1,*, G. M. Tamilselvan2, A. Rajendran3
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1063-1077, 2022, DOI:10.32604/csse.2022.020789
    Abstract As huge users are involved, there is a difficulty in spectrum allocation and scheduling in Cognitive Radio Networks (CRNs). Collision increases when there is no allocation of spectrum and these results in huge drop rate and network performance degradation. To solve these problems and allocate appropriate spectrum, a novel method is introduced termed as Quality of Service (QoS) Improvement Proper Scheduling (QIPS). The major contribution of the work is to design a new cross layer QoS Aware Scheduling based on Loss-based Proportional Fairness with Multihop (QoSAS-LBPFM). In Medium Access Control (MAC) multi-channel network environment mobile nodes practice concurrent broadcast between… More >

  • Open AccessOpen Access

    ARTICLE

    Novel Design of UWB Jeans Based Textile Antenna for Body-Centric Communications

    Mohammad Monirujjaman Khan1,*, Bright Yeboah-Akowuah2, Kaisarul Islam1, Eric Tutu Tchao2, Sumanta Bhattacharyya3, Rajesh Dey4, Mehedi Masud5, Fahad Alraddady6
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1079-1093, 2022, DOI:10.32604/csse.2022.022313
    (This article belongs to the Special Issue: Emergent Topics in Intelligent Computing and Communication Engineering)
    Abstract This research presents an ultra-wideband (UWB) textile antenna design for body-centric applications. The antenna is printed on a 1 mm thick denim substrate with a 1.7 relative permittivity. The jeans substrate is sandwiched between a partial ground plane and a radiating patch with a Q-shaped slot. The slotted radiating patch is placed above the substrate and measures 27.8 mm × 23.8 mm. In free space, the antenna covers the ultra-wideband spectrum designated by the Federal Communication Commission (FCC). Various parameters of the antenna design were changed for further performance evaluation. Depending on the operating frequency, the antenna's realized gain varied from 2.7 to 5 dB. The… More >

  • Open AccessOpen Access

    ARTICLE

    Performance Analysis of Machine Learning Algorithms for Classifying Hand Motion-Based EEG Brain Signals

    Ayman Altameem1, Jaideep Singh Sachdev2, Vijander Singh2, Ramesh Chandra Poonia3, Sandeep Kumar4, Abdul Khader Jilani Saudagar5,*
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1095-1107, 2022, DOI:10.32604/csse.2022.023256
    (This article belongs to the Special Issue: Healthcare Intelligence using Deep Learning and Computer Vision)
    Abstract Brain-computer interfaces (BCIs) records brain activity using electroencephalogram (EEG) headsets in the form of EEG signals; these signals can be recorded, processed and classified into different hand movements, which can be used to control other IoT devices. Classification of hand movements will be one step closer to applying these algorithms in real-life situations using EEG headsets. This paper uses different feature extraction techniques and sophisticated machine learning algorithms to classify hand movements from EEG brain signals to control prosthetic hands for amputated persons. To achieve good classification accuracy, denoising and feature extraction of EEG signals is a significant step. We… More >

  • Open AccessOpen Access

    ARTICLE

    Conditional Probability Approach for Fault Detection in Photovoltaic Energy Farms

    Nagy I. Elkalashy1,*, Ibrahim B. M. Taha2
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1109-1120, 2022, DOI:10.32604/csse.2022.023509
    (This article belongs to the Special Issue: Recent Trends in Software Engineering and Applications)
    Abstract Detection of electric faults in photovoltaic (PV) farms enhances a sustainable service continuity of farm energy generation. In this paper, a probabilistic function is introduced to detect the faults in the PV farms. The conditional probability functions are adopted to detect different fault conditions such as internal string faults, string-to-string faults, and string-to-negative terminal faults. As the diodes are important to make the PV farms in-service safely during the faults, the distribution currents of these faults are evaluated with different concepts of diode consideration as well as without considering any diode installation. This part of the study enhances the diode… More >

  • Open AccessOpen Access

    ARTICLE

    Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing

    D. Jerusha*, T. Jaya
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1121-1132, 2022, DOI:10.32604/csse.2022.022997
    Abstract Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in… More >

  • Open AccessOpen Access

    ARTICLE

    Fusion Recommendation System Based on Collaborative Filtering and Knowledge Graph

    Donglei Lu1, Dongjie Zhu2,*, Haiwen Du3, Yundong Sun3, Yansong Wang2, Xiaofang Li4, Rongning Qu4, Ning Cao1, Russell Higgs5
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1133-1146, 2022, DOI:10.32604/csse.2022.021525
    Abstract The recommendation algorithm based on collaborative filtering is currently the most successful recommendation method. It recommends items to the user based on the known historical interaction data of the target user. Furthermore, the combination of the recommended algorithm based on collaborative filtration and other auxiliary knowledge base is an effective way to improve the performance of the recommended system, of which the Co-Factorization Model (CoFM) is one representative research. CoFM, a fusion recommendation model combining the collaborative filtering model FM and the graph embedding model TransE, introduces the information of many entities and their relations in the knowledge graph into… More >

  • Open AccessOpen Access

    ARTICLE

    An Approximate Numerical Methods for Mathematical and Physical Studies for Covid-19 Models

    Hammad Alotaibi, Khaled A. Gepreel, Mohamed S. Mohamed, Amr M. S. Mahdy*
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1147-1163, 2022, DOI:10.32604/csse.2022.020869
    (This article belongs to the Special Issue: Advances in Computational Intelligence and its Applications)
    Abstract The advancement in numerical models of serious resistant illnesses is a key research territory in different fields including the nature and the study of disease transmission. One of the aims of these models is to comprehend the elements of conduction of these infections. For the new strain of Covid-19 (Coronavirus), there has been no immunization to protect individuals from the virus and to forestall its spread so far. All things being equal, control procedures related to medical services, for example, social distancing or separation, isolation, and travel limitations can be adjusted to control this pandemic. This article reveals some insights… More >

  • Open AccessOpen Access

    ARTICLE

    CNN and Fuzzy Rules Based Text Detection and Recognition from Natural Scenes

    T. Mithila1,*, R. Arunprakash2, A. Ramachandran3
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1165-1179, 2022, DOI:10.32604/csse.2022.023308
    Abstract In today’s real world, an important research part in image processing is scene text detection and recognition. Scene text can be in different languages, fonts, sizes, colours, orientations and structures. Moreover, the aspect ratios and layouts of a scene text may differ significantly. All these variations appear assignificant challenges for the detection and recognition algorithms that are considered for the text in natural scenes. In this paper, a new intelligent text detection and recognition method for detectingthe text from natural scenes and forrecognizing the text by applying the newly proposed Conditional Random Field-based fuzzy rules incorporated Convolutional Neural Network (CR-CNN)… More >

  • Open AccessOpen Access

    ARTICLE

    Automatic Real-Time Medical Mask Detection Using Deep Learning to Fight COVID-19

    Mohammad Khalid Imam Rahmani1, Fahmina Taranum2, Reshma Nikhat3, Md. Rashid Farooqi3, Mohammed Arshad Khan4,*
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1181-1198, 2022, DOI:10.32604/csse.2022.022014
    Abstract The COVID-19 pandemic is a virus that has disastrous effects on human lives globally; still spreading like wildfire causing huge losses to humanity and economies. There is a need to follow few constraints like social distancing norms, personal hygiene, and masking up to effectively control the virus spread. The proposal is to detect the face frame and confirm the faces are properly covered with masks. By applying the concepts of Deep learning, the results obtained for mask detection are found to be effective. The system is trained using 4500 images to accurately judge and justify its accuracy. The aim is… More >

  • Open AccessOpen Access

    ARTICLE

    Binary Multifold Encryption Technique for Complex Cloud Systems

    N. Ansgar Mary1,*, T. Latha2
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1199-1213, 2022, DOI:10.32604/csse.2022.022404
    Abstract Data security is a major cloud computing issue due to different user transactions in the system. The evolution of cryptography and cryptographic analysis are regarded domains of current research. deoxyribo nucleic acid (DNA) cryptography makes use of DNA as a sensing platform, which is then manipulated using a variety of molecular methods. Many security mechanisms including knowledge-based authentication, two-factor authentication, adaptive authentication, multifactor authentication and single password authentication have been deployed. These cryptographic techniques have been developed to ensure confidentiality, but most of them are based on complex mathematical calculations and equations. In the proposed approach, a novel and unique… More >

  • Open AccessOpen Access

    ARTICLE

    A Model for Cross-Domain Opinion Target Extraction in Sentiment Analysis

    Muhammet Yasin PAK*, Serkan GUNAL
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1215-1239, 2022, DOI:10.32604/csse.2022.023051
    Abstract Opinion target extraction is one of the core tasks in sentiment analysis on text data. In recent years, dependency parser–based approaches have been commonly studied for opinion target extraction. However, dependency parsers are limited by language and grammatical constraints. Therefore, in this work, a sequential pattern-based rule mining model, which does not have such constraints, is proposed for cross-domain opinion target extraction from product reviews in unknown domains. Thus, knowing the domain of reviews while extracting opinion targets becomes no longer a requirement. The proposed model also reveals the difference between the concepts of opinion target and aspect, which are… More >

  • Open AccessOpen Access

    ARTICLE

    Flexible Task Scheduling Based on Edge Computing and Cloud Collaboration

    Suzhen Wang1,*, Wenli Wang1, Zhiting Jia1, Chaoyi Pang2
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1241-1255, 2022, DOI:10.32604/csse.2022.024021
    Abstract With the rapid development and popularization of 5G and the Internet of Things, a number of new applications have emerged, such as driverless cars. Most of these applications are time-delay sensitive, and some deficiencies were found during data processing through the cloud centric architecture. The data generated by terminals at the edge of the network is an urgent problem to be solved at present. In 5 g environments, edge computing can better meet the needs of low delay and wide connection applications, and support the fast request of terminal users. However, edge computing only has the edge layer computing advantage, and… More >

  • Open AccessOpen Access

    ARTICLE

    Diagnosing Breast Cancer Accurately Based on Weighting of Heterogeneous Classification Sub-Models

    Majdy Mohamed Eltayeb Eltahir1,*, Tarig Mohammed Ahmed2,3
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1257-1272, 2022, DOI:10.32604/csse.2022.022942
    (This article belongs to the Special Issue: Recent Advancement in Information Technology in Healthcare and Patient Management)
    Abstract In developed and developing countries, breast cancer is one of the leading forms of cancer affecting women alike. As a consequence of growing life expectancy, increasing urbanization and embracing Western lifestyles, the high prevalence of this cancer is noted in the developed world. This paper aims to develop a novel model that diagnoses Breast Cancer by using heterogeneous datasets. The model can work as a strong decision support system to help doctors to make the right decision in diagnosing breast cancer patients. The proposed model is based on three datasets to develop three sub-models. Each sub-model works independently. The final… More >

  • Open AccessOpen Access

    ARTICLE

    Ensemble Nonlinear Support Vector Machine Approach for Predicting Chronic Kidney Diseases

    S. Prakash1,*, P. Vishnu Raja2, A. Baseera3, D. Mansoor Hussain4, V. R. Balaji5, K. Venkatachalam6
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1273-1287, 2022, DOI:10.32604/csse.2022.021784
    Abstract Urban living in large modern cities exerts considerable adverse effects on health and thus increases the risk of contracting several chronic kidney diseases (CKD). The prediction of CKDs has become a major task in urbanized countries. The primary objective of this work is to introduce and develop predictive analytics for predicting CKDs. However, prediction of huge samples is becoming increasingly difficult. Meanwhile, MapReduce provides a feasible framework for programming predictive algorithms with map and reduce functions. The relatively simple programming interface helps solve problems in the scalability and efficiency of predictive learning algorithms. In the proposed work, the iterative weighted… More >

  • Open AccessOpen Access

    ARTICLE

    Gray-Hole Attack Minimization in IoMT with 5G Based D2D Networks

    V. Balaji*, P. Selvaraj
    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1289-1303, 2022, DOI:10.32604/csse.2022.023609
    Abstract Reliable transmission is vital to the success of the next generation of communications technologies and Fifth Generation (5G) networks. Many sensitive applications, such as eHealth and medical services, can benefit from a 5G network. The Internet of Medical Things (IoMT) is a new field that fosters the maintenance of trust among various IoMT Device to Device (D2D) modern technologies. In IoMT the medical devices have to be connected through a wireless network and constantly needs to be self-configured to provide consistent and efficient data transmission. The medical devices need to be connected with sophisticated protocols and architecture to handle the… More >

Per Page:

Share Link