Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data

    A. Jameer Basha1, N. Rajkumar2, Mohammed A. AlZain3, Mehedi Masud4, Mohamed Abouhawwash5,6,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1693-1706, 2022, DOI:10.32604/iasc.2022.024714

    Abstract In the healthcare applications, Internet of Medical Things (IoMT) comforts the communication processes between the medical devices and the humans via wireless network. Moreover, this communication helps both the physicians and the patients to contact remotely for the diagnosis of the disease’s wearable devices sensor signals. However, IoMT system violates the privacy preserving of Patient’s Health Record (PHR) as well as self-sovereign identity of patient. In this regard, security action should be taken. Previous techniques used in IoMT are in lack of data consistency, confidentiality, and inaccessible of data. To overcome these issues, the fog computing-based technology is used in… More >

  • Open Access

    ARTICLE

    Crypto Hash Based Malware Detection in IoMT Framework

    R Punithavathi1, K Venkatachalam2, Mehedi Masud3, Mohammed A. AlZain4, Mohamed Abouhawwash5,6,*

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 559-574, 2022, DOI:10.32604/iasc.2022.024715

    Abstract The challenges in providing e-health services with the help of Internet of Medical Things (IoMT) is done by connecting to the smart medical devices. Through IoMT sensor devices/smart devices, physicians share the sensitive information of the patient. However, protecting the patient health care details from malware attack is necessary in this advanced digital scenario. Therefore, it is needed to implement cryptographic algorithm to enhance security, safety, reliability, preventing details from malware attacks and privacy of medical data. Nowadays blockchain has become a prominent technology for storing medical data securely and transmit through IoMT concept. The issues in the existing research… More >

  • Open Access

    ARTICLE

    Intelligent Cloud IoMT Health Monitoring-Based System for COVID-19

    Hameed AlQaheri1,*, Manash Sarkar2, Saptarshi Gupta3, Bhavya Gaur4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 497-517, 2022, DOI:10.32604/cmc.2022.022735

    Abstract The most common alarming and dangerous disease in the world today is the coronavirus disease 2019 (COVID-19). The coronavirus is perceived as a group of coronaviruses which causes mild to severe respiratory diseases among human beings. The infection is spread by aerosols emitted from infected individuals during talking, sneezing, and coughing. Furthermore, infection can occur by touching a contaminated surface followed by transfer of the viral load to the face. Transmission may occur through aerosols that stay suspended in the air for extended periods of time in enclosed spaces. To stop the spread of the pandemic, it is crucial to… More >

  • Open Access

    ARTICLE

    Data Anonymous Authentication for BIoMT with Proxy Group Signature

    Chaoyang Li1,*, Yalan Wang2, Gang Xu3, Xiubo Chen4, Xiangjun Xin1, Jian Li4

    Journal of Cyber Security, Vol.3, No.4, pp. 207-216, 2021, DOI:10.32604/jcs.2021.026926

    Abstract Along with the increase of wearable medical device, the privacy leakage problem in the process of transmission between these edge medical devices. The blockchain-enabled Internet of Medical Things (BIoMT) has been developed to reform traditional centralized medical system in recent years. This paper first introduces a data anonymous authentication model to protect user privacy and medical data in BIoMT. Then, a proxy group signature (PGS) scheme has been proposed based on lattice assumption. This scheme can well satisfy the anonymous authentication demand for the proposed model, and provide anti-quantum attack security for BIoMT in the future general quantum computer age.… More >

  • Open Access

    ARTICLE

    Cost Efficient Scheduling Using Smart Contract Cognizant Ethereum for IoMT

    G. Ravikumar1, K. Venkatachalam2, Mehedi Masud3, Mohamed Abouhawwash4,5,*

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 865-877, 2022, DOI:10.32604/iasc.2022.024278

    Abstract Recently internet of medical things (IoMT) act as a smart doctor using sensor wearable’s device in human body. This smart doctor device senses necessary medical data from human and transfer via network immediately to physician. It is important to transfer sensitive data very securely. Blockchain becomes trending technology to provide high security to both end users in the network. Traditionally security structure is relying on cryptographic techniques which is very expensive and takes more time in securely transmitting data. To overcome this issue, this paper builds a cost effective, blockchain with IoMT using fog-cloud computing. The aim of research is… More >

  • Open Access

    ARTICLE

    Gray-Hole Attack Minimization in IoMT with 5G Based D2D Networks

    V. Balaji*, P. Selvaraj

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1289-1303, 2022, DOI:10.32604/csse.2022.023609

    Abstract Reliable transmission is vital to the success of the next generation of communications technologies and Fifth Generation (5G) networks. Many sensitive applications, such as eHealth and medical services, can benefit from a 5G network. The Internet of Medical Things (IoMT) is a new field that fosters the maintenance of trust among various IoMT Device to Device (D2D) modern technologies. In IoMT the medical devices have to be connected through a wireless network and constantly needs to be self-configured to provide consistent and efficient data transmission. The medical devices need to be connected with sophisticated protocols and architecture to handle the… More >

  • Open Access

    ARTICLE

    IoMT Enabled Melanoma Detection Using Improved Region Growing Lesion Boundary Extraction

    Tanzila Saba1, Rabia Javed2,3, Mohd Shafry Mohd Rahim2, Amjad Rehman1,*, Saeed Ali Bahaj4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6219-6237, 2022, DOI:10.32604/cmc.2022.020865

    Abstract The Internet of Medical Things (IoMT) and cloud-based healthcare applications, services are beneficial for better decision-making in recent years. Melanoma is a deadly cancer with a higher mortality rate than other skin cancer types such as basal cell, squamous cell, and Merkel cell. However, detection and treatment at an early stage can result in a higher chance of survival. The classical methods of detection are expensive and labor-intensive. Also, they rely on a trained practitioner's level, and the availability of the needed equipment is essential for the early detection of Melanoma. The current improvement in computer-aided systems is providing very… More >

  • Open Access

    ARTICLE

    Integration of Fog Computing for Health Record Management Using Blockchain Technology

    Mesfer AI Duhayyim1, Fahd N. Al-Wesabi2, Radwa Marzouk3, Abdalla Ibrahim Abdalla Musa4, Noha Negm5, Anwer Mustafa Hilal6, Manar Ahmed Hamza6,*, Mohammed Rizwanullah6

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 4135-4149, 2022, DOI:10.32604/cmc.2022.022336

    Abstract Internet of Medical Things (IoMT) is a breakthrough technology in the transfer of medical data via a communication system. Wearable sensor devices collect patient data and transfer them through mobile internet, that is, the IoMT. Recently, the shift in paradigm from manual data storage to electronic health recording on fog, edge, and cloud computing has been noted. These advanced computing technologies have facilitated medical services with minimum cost and available conditions. However, the IoMT raises a high concern on network security and patient data privacy in the health care system. The main issue is the transmission of health data with… More >

  • Open Access

    ARTICLE

    IoMT-Enabled Fusion-Based Model to Predict Posture for Smart Healthcare Systems

    Taher M. Ghazal1,2,*, Mohammad Kamrul Hasan1, Siti Norul Huda Abdullah1, Khairul Azmi Abubakkar1, Mohammed A. M. Afifi2

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2579-2597, 2022, DOI:10.32604/cmc.2022.019706

    Abstract Smart healthcare applications depend on data from wearable sensors (WSs) mounted on a patient’s body for frequent monitoring information. Healthcare systems depend on multi-level data for detecting illnesses and consequently delivering correct diagnostic measures. The collection of WS data and integration of that data for diagnostic purposes is a difficult task. This paper proposes an Errorless Data Fusion (EDF) approach to increase posture recognition accuracy. The research is based on a case study in a health organization. With the rise in smart healthcare systems, WS data fusion necessitates careful attention to provide sensitive analysis of the recognized illness. As a… More >

  • Open Access

    ARTICLE

    IoMT-Based Smart Monitoring Hierarchical Fuzzy Inference System for Diagnosis of COVID-19

    Tahir Abbas Khan1, Sagheer Abbas1, Allah Ditta2, Muhammad Adnan Khan3, *, Hani Alquhayz4, Areej Fatima3, Muhammad Farhan Khan5

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2591-2605, 2020, DOI:10.32604/cmc.2020.011892

    Abstract The prediction of human diseases, particularly COVID-19, is an extremely challenging task not only for medical experts but also for the technologists supporting them in diagnosis and treatment. To deal with the prediction and diagnosis of COVID-19, we propose an Internet of Medical Things-based Smart Monitoring Hierarchical Mamdani Fuzzy Inference System (IoMTSM-HMFIS). The proposed system determines the various factors like fever, cough, complete blood count, respiratory rate, Ct-chest, Erythrocyte sedimentation rate and C-reactive protein, family history, and antibody detection (lgG) that are directly involved in COVID-19. The expert system has two input variables in layer 1, and seven input variables… More >

Displaying 21-30 on page 3 of 31. Per Page