Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (16)
  • Open Access

    ARTICLE

    Enhancing Early Detection of Lung Cancer through Advanced Image Processing Techniques and Deep Learning Architectures for CT Scans

    Nahed Tawfik1,*, Heba M. Emara2, Walid El-Shafai3, Naglaa F. Soliman4, Abeer D. Algarni4, Fathi E. Abd El-Samie4

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 271-307, 2024, DOI:10.32604/cmc.2024.052404 - 15 October 2024

    Abstract Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins, including hereditary factors and various clinical changes. It stands as the deadliest type of cancer and a significant cause of cancer-related deaths globally. Early diagnosis enables healthcare providers to administer appropriate treatment measures promptly and accurately, leading to improved prognosis and higher survival rates. The significant increase in both the incidence and mortality rates of lung cancer, particularly its ranking as the second most prevalent cancer among women worldwide, underscores the need for comprehensive research into efficient… More >

  • Open Access

    ARTICLE

    A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications

    Walid El-Shafai1,2,*, Fatma Khallaf2,3, El-Sayed M. El-Rabaie2, Fathi E. Abd El-Samie2, Iman Almomani1,4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3599-3618, 2023, DOI:10.32604/csse.2023.037655 - 03 April 2023

    Abstract This paper presents a robust multi-stage security solution based on fusion, encryption, and watermarking processes to transmit color healthcare images, efficiently. The presented solution depends on the features of discrete cosine transform (DCT), lifting wavelet transform (LWT), and singular value decomposition (SVD). The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks. During watermark embedding, the host color medical image is transformed into four sub-bands by employing three stages of LWT. The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed… More >

  • Open Access

    ARTICLE

    Heap Based Optimization with Deep Quantum Neural Network Based Decision Making on Smart Healthcare Applications

    Iyad Katib1, Mahmoud Ragab2,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3749-3765, 2023, DOI:10.32604/csse.2023.036796 - 03 April 2023

    Abstract The concept of smart healthcare has seen a gradual increase with the expansion of information technology. Smart healthcare will use a new generation of information technologies, like artificial intelligence, the Internet of Things (IoT), cloud computing, and big data, to transform the conventional medical system in an all-around way, making healthcare highly effective, more personalized, and more convenient. This work designs a new Heap Based Optimization with Deep Quantum Neural Network (HBO-DQNN) model for decision-making in smart healthcare applications. The presented HBO-DQNN model majorly focuses on identifying and classifying healthcare data. In the presented HBO-DQNN… More >

  • Open Access

    ARTICLE

    An Immutable Framework for Smart Healthcare Using Blockchain Technology

    Faneela1, Muazzam A. Khan1, Suliman A. Alsuhibany2,*, Walid El-Shafai3,4, Mujeeb Ur Rehman5, Jawad Ahmad6

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 165-179, 2023, DOI:10.32604/csse.2023.035066 - 20 January 2023

    Abstract The advancements in sensing technologies, information processing, and communication schemes have revolutionized the healthcare sector. Electronic Healthcare Records (EHR) facilitate the patients, doctors, hospitals, and other stakeholders to maintain valuable data and medical records. The traditional EHRs are based on cloud-based architectures and are susceptible to multiple cyberattacks. A single attempt of a successful Denial of Service (DoS) attack can compromise the complete healthcare system. This article introduces a secure and immutable blockchain-based framework for the Internet of Medical Things (IoMT) to address the stated challenges. The proposed architecture is on the idea of a More >

  • Open Access

    ARTICLE

    Privacy Preserving Image Encryption with Deep Learning Based IoT Healthcare Applications

    Mohammad Alamgeer1, Saud S. Alotaibi2, Shaha Al-Otaibi3, Nazik Alturki3, Anwer Mustafa Hilal4,*, Abdelwahed Motwakel4, Ishfaq Yaseen4, Mohamed I. Eldesouki5

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1159-1175, 2022, DOI:10.32604/cmc.2022.028275 - 18 May 2022

    Abstract Latest developments in computing and communication technologies are enabled the design of connected healthcare system which are mainly based on IoT and Edge technologies. Blockchain, data encryption, and deep learning (DL) models can be utilized to design efficient security solutions for IoT healthcare applications. In this aspect, this article introduces a Blockchain with privacy preserving image encryption and optimal deep learning (BPPIE-ODL) technique for IoT healthcare applications. The proposed BPPIE-ODL technique intends to securely transmit the encrypted medical images captured by IoT devices and performs classification process at the cloud server. The proposed BPPIE-ODL technique… More >

  • Open Access

    ARTICLE

    Optimal Resource Allocation in Fog Computing for Healthcare Applications

    Salman Khan1,*, Ibrar Ali Shah1, Nasser Tairan2, Habib Shah2, Muhammad Faisal Nadeem3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6147-6163, 2022, DOI:10.32604/cmc.2022.023234 - 14 January 2022

    Abstract In recent years, the significant growth in the Internet of Things (IoT) technology has brought a lot of attention to information and communication industry. Various IoT paradigms like the Internet of Vehicle Things (IoVT) and the Internet of Health Things (IoHT) create massive volumes of data every day which consume a lot of bandwidth and storage. However, to process such large volumes of data, the existing cloud computing platforms offer limited resources due to their distance from IoT devices. Consequently, cloud-computing systems produce intolerable latency problems for latency-sensitive real-time applications. Therefore, a new paradigm called… More >

  • Open Access

    ARTICLE

    Hybrid Whale Optimization Algorithm for Resource Optimization in Cloud E-Healthcare Applications

    Punit Gupta1, Sanjit Bhagat2, Dinesh Kumar Saini1,*, Ashish Kumar2, Mohammad Alahmadi3, Prakash Chandra Sharma1

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5659-5676, 2022, DOI:10.32604/cmc.2022.023056 - 14 January 2022

    Abstract In the next generation of computing environment e-health care services depend on cloud services. The Cloud computing environment provides a real-time computing environment for e-health care applications. But these services generate a huge number of computational tasks, real-time computing and comes with a deadline, so conventional cloud optimization models cannot fulfil the task in the least time and within the deadline. To overcome this issue many resource optimization meta-heuristic models are been proposed but these models cannot find a global best solution to complete the task in the least time and manage utilization with the… More >

  • Open Access

    ARTICLE

    Traffic Priority-Aware Medical Data Dissemination Scheme for IoT Based WBASN Healthcare Applications

    Muhammad Anwar1, Farhan Masud2, Rizwan Aslam Butt3, Sevia Mahdaliza Idrus4,*, Mohammad Nazir Ahmad5, Mohd Yazid Bajuri6

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4443-4456, 2022, DOI:10.32604/cmc.2022.022826 - 14 January 2022

    Abstract Wireless Body Area Sensor Network (WBASN) is an automated system for remote health monitoring of patients. WBASN under umbrella of Internet of Things (IoT) is comprised of small Biomedical Sensor Nodes (BSNs) that can communicate with each other without human involvement. These BSNs can be placed on human body or inside the skin of the patients to regularly monitor their vital signs. The BSNs generate critical data as it is related to patient's health. The data traffic can be classified as Sensitive Data (SD) and Non-sensitive Data (ND) packets based on the value of vital… More >

  • Open Access

    ARTICLE

    Classification Framework for COVID-19 Diagnosis Based on Deep CNN Models

    Walid El-Shafai1, Abeer D. Algarni2,*, Ghada M. El Banby3, Fathi E. Abd El-Samie1,2, Naglaa F. Soliman2,4

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1561-1575, 2022, DOI:10.32604/iasc.2022.020386 - 09 October 2021

    Abstract Automated diagnosis based on medical images is a very promising trend in modern healthcare services. For the task of automated diagnosis, there should be flexibility to deal with an enormous amount of data represented in the form of medical images. In addition, efficient algorithms that could be adapted according to the nature of images should be used. The importance of automated medical diagnosis has been maximized with the evolution of COVID-19 pandemic. COVID-19 first appeared in China, Wuhan, and then it has exploded in the whole world with a very bad impact on our daily… More >

  • Open Access

    ARTICLE

    Privacy-Enhanced Data Deduplication Computational Intelligence Technique for Secure Healthcare Applications

    Jinsu Kim1, Sungwook Ryu2, Namje Park1,3,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 4169-4184, 2022, DOI:10.32604/cmc.2022.019277 - 27 September 2021

    Abstract A significant number of cloud storage environments are already implementing deduplication technology. Due to the nature of the cloud environment, a storage server capable of accommodating large-capacity storage is required. As storage capacity increases, additional storage solutions are required. By leveraging deduplication, you can fundamentally solve the cost problem. However, deduplication poses privacy concerns due to the structure itself. In this paper, we point out the privacy infringement problem and propose a new deduplication technique to solve it. In the proposed technique, since the user’s map structure and files are not stored on the server, More >

Displaying 1-10 on page 1 of 16. Per Page