Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Internet of Things for in Home Health Based Monitoring System: Modern Advances, Challenges and Future Directions

    Omer Iqbal*, Tayyeba Iftakhar, Saleem Zubair Ahmad

    Journal on Internet of Things, Vol.4, No.1, pp. 35-55, 2022, DOI:10.32604/jiot.2022.022256 - 17 May 2022

    Abstract IOT has carried out important function in converting the traditional fitness care corporation. With developing call for in population, traditional healthcare structures have reached their outmost functionality in presenting sufficient and as plenty as mark offerings. The worldwide is handling devastating developing antique population disaster and the right want for assisted-dwelling environments is turning into inevitable for senior citizens. There furthermore a determination by means of the use of way of countrywide healthcare organizations to increase crucial manual for individualized, right blanketed care to prevent and manipulate excessive coronial situations. Many tech orientated packages related… More >

  • Open Access

    ARTICLE

    Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health

    A. S. Anakath1,*, S. Ambika2, S. Rajakumar3, R. Kannadasan4, K. S. Sendhil Kumar5

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 833-847, 2022, DOI:10.32604/csse.2022.022329 - 20 April 2022

    Abstract Cloud computing becomes an important application development platform for processing user data with high security. Service providers are accustomed to providing storage centers outside the trusted location preferred by the data owner. Thus, ensuring the security and confidentiality of the data while processing in the centralized network is very difficult. The secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud network. Intruders are very active over the network like real authenticated user to hack the personal sensitive… More >

  • Open Access

    ARTICLE

    Dm-Health App: Diabetes Diagnosis Using Machine Learning with Smartphone

    Elias Hossain1, Mohammed Alshehri2, Sultan Almakdi2,*, Hanan Halawani2, Md. Mizanur Rahman3, Wahidur Rahman4, Sabila Al Jannat5, Nadim Kaysar6, Shishir Mia4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1713-1746, 2022, DOI:10.32604/cmc.2022.024822 - 24 February 2022

    Abstract Diabetes Mellitus is one of the most severe diseases, and many studies have been conducted to anticipate diabetes. This research aimed to develop an intelligent mobile application based on machine learning to determine the diabetic, pre-diabetic, or non-diabetic without the assistance of any physician or medical tests. This study's methodology was classified into two the Diabetes Prediction Approach and the Proposed System Architecture Design. The Diabetes Prediction Approach uses a novel approach, Light Gradient Boosting Machine (LightGBM), to ensure a faster diagnosis. The Proposed System Architecture Design has been combined into seven modules; the Answering… More >

  • Open Access

    ARTICLE

    Improved Key Agreement Based Kerberos Protocol for M-Health Security

    P. Thirumoorthy1,*, K. S. Bhuvaneshwari2, C. Kamalanathan3, P. Sunita3, E. Prabhu4, S. Maheswaran5

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 577-587, 2022, DOI:10.32604/csse.2022.021717 - 04 January 2022

    Abstract The development of wireless sensor network with Internet of Things (IoT) predicts various applications in the field of healthcare and cloud computing. This can give promising results on mobile health care (M-health) and Telecare medicine information systems. M-health system on cloud Internet of Things (IoT) through wireless sensor network (WSN) becomes the rising research for the need of modern society. Sensor devices attached to the patients’ body which is connected to the mobile device can ease the medical services. Security is the key connect for optimal performance of the m-health system that share the data More >

  • Open Access

    ARTICLE

    Validating the Correct Wearing of Protection Mask by Taking a Selfie: Design of a Mobile Application “CheckYourMask” to Limit the Spread of COVID-19

    Karim Hammoudi1,2,*, Adnane Cabani3, Halim Benhabiles4, Mahmoud Melkemi1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 1049-1059, 2020, DOI:10.32604/cmes.2020.011663 - 21 August 2020

    Abstract In a context of a virus that is transmissive by sputtering, wearing masks appear necessary to protect the wearer and to limit the propagation of the disease. Currently, we are facing the 2019–2020 coronavirus pandemic. Coronavirus disease 2019 (COVID-19) is an infectious disease with first symptoms similar to the flu. The symptom of COVID-19 was reported first in China and very quickly spreads to the rest of the world. The COVID-19 contagiousness is known to be high by comparison with the flu. In this paper, we propose a design of a mobile application for permitting… More >

Displaying 1-10 on page 1 of 5. Per Page