Smart city is a collective term for technologies and concepts that are directed toward making cities efficient, technologically more advanced, greener and more socially inclusive. These concepts include technical, economic and social innovations. This term has been tossed around by various actors in politics, business, administration and urban planning since the 2000s to establish tech-based changes and innovations in urban areas. The idea of the smart city is used in conjunction with the utilization of digital technologies and at the same time represents a reaction to the economic, social and political challenges that post-industrial societies are confronted with at the start of the new millennium. The key focus is on dealing with challenges faced by urban society, such as environmental pollution, demographic change, population growth, healthcare, the financial crisis or scarcity of resources. In a broader sense, the term also includes non-technical innovations that make urban life more sustainable. So far, the idea of using IoT-based sensor networks for healthcare applications is a promising one with the potential of minimizing inefficiencies in the existing infrastructure. A machine learning approach is key to successful implementation of the IoT-powered wireless sensor networks for this purpose since there is large amount of data to be handled intelligently. Throughout this paper, it will be discussed in detail how AI-powered IoT and WSNs are applied in the healthcare sector. This research will be a baseline study for understanding the role of the IoT in smart cities, in particular in the healthcare sector, for future research works.
With the evolution of the fifth-generation (5G) wireless network, the Internet of Things (IoT) has become a revolutionary technique that enables a diverse number of features and applications. It can able a diverse amount of devices to be connected in order to create a single communication architecture. As it has significantly expanded in recent years, it is fundamental to study this trending technology in detail and take a close look at its applications in the different domains. It represents an enabler of new communication possibilities between people and things. The main asset of this concept is its significant influence through the creation of a new world dimension. The key features required for employing a large-scale IoT are low-cost sensors, high-speed and error-tolerant data communications, smart computations, and numerous applications. This research work is presented in four main sections, including a general overview of IoT technology, a summary of previous correlated surveys, a review regarding the main IoT applications, and a section on the challenges of IoT. The purpose of this study is to fully cover the applications of IoT, including healthcare, environmental, commercial, industrial, smart cities, and infrastructural applications. This work explains the concept of IoT and defines and summarizes its main technologies and uses, offering a next-generation protocol as a solution to the challenges. IoT challenges were investigated to enhance research and development in the fields. The contribution and weaknesses of each research work cited are covered, highlighting eventual possible research questions and open matters for IoT applications to ensure a full analysis coverage of the discussed papers.
Breast cancer is often a fatal disease that has a substantial impact on the female mortality rate. Rapidly spreading breast cancer is due to the abnormal growth of malignant cells in the breast. Early detection of breast cancer can increase treatment opportunities and patient survival rates. Various screening methods with computer-aided detection systems have been developed for the effective diagnosis and treatment of breast cancer. Image data plays an important role in the medical and health industry. Features are extracted from image datasets through deep learning, as deep learning techniques extract features more accurately and rapidly than other existing methods. Deep learning effectively assists existing methods, such as mammogram screening and biopsy, in examining and diagnosing breast cancer. This paper proposes an Internet of Medical Things (IoMT) cloud-based model for the intelligent prediction of breast cancer stages. The proposed model is employed to detect breast cancer and its stages. The experimental results demonstrate 98.86% and 97.81% accuracy for the training and validation phases, respectively. In addition, they demonstrate accuracies of 99.69%, 99.32%, 98.96%, and 99.32% for detecting ductal carcinoma, lobular carcinoma, mucinous carcinoma, and papillary carcinoma. The results of the proposed intelligent prediction of breast cancer stages empowered with the deep learning (IPBCS-DL) model exhibits higher accuracy than existing state-of-the-art methods, indicating its potential to lower the breast cancer mortality rate.INDEX TERMS Internet of medical things, breast cancer prediction, deep learning, convolutional neural network.
The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not risking loss of data, is the right solution for image confidentiality. Due to data size limitations, redundancy, and capacity, traditional encryption techniques cannot be applied directly to e-health data, especially when patient data are transferred over the open channels. Therefore, patients may lose the privacy of data contents since images are different from the text because of their two particular factors of loss of data and confidentiality.Researchers have identified such security threats and have proposed several image encryption techniques to mitigate the security problem. However, the study has found that the existing proposed techniques still face application-specific several security problems. Therefore, this paper presents an efficient, lightweight encryption algorithm to develop a secure image encryption technique for the healthcare industry. The proposed lightweight encryption technique employs two permutation techniques to secure medical images. The proposed technique is analyzed, evaluated, and then compared to conventionally encrypted ones in security and execution time. Numerous test images have been used to determine the performance of the proposed algorithm. Several experiments show that the proposed algorithm for image cryptosystems provides better efficiency than conventional techniques.INDEX TERMS Internet of Medical Things, medical image encryption, lightweight encryption.
Recently, interest in Internet of Vehicles’ (IoV) technologies has significantly emerged due to the substantial development in the smart automobile industries. Internet of Vehicles’ technology enables vehicles to communicate with public networks and interact with the surrounding environment. It also allows vehicles to exchange and collect information about other vehicles and roads. IoV is introduced to enhance road users’ experience by reducing road congestion, improving traffic management, and ensuring the road safety. The promised applications of smart vehicles and IoV systems face many challenges, such as big data collection in IoV and distribution to attractive vehicles and humans. Another challenge is achieving fast and efficient communication between many different vehicles and smart devices called Vehicle-to-Everything (V2X). One of the vital questions that the researchers need to address is how to effectively handle the privacy of large groups of data and vehicles in IoV systems. Artificial Intelligence technology offers many smart solutions that may help IoV networks address all these questions and issues. Machine learning (ML) is one of the highest efficient AI tools that have been extensively used to resolve all mentioned problematic issues. For example, ML can be used to avoid road accidents by analyzing the driving behavior and environment by sensing data of the surrounding environment. Machine learning mechanisms are characterized by the time change and are critical to channel modeling in-vehicle network scenarios. This paper aims to provide theoretical foundations for machine learning and the leading models and algorithms to resolve IoV applications’ challenges. This paper has conducted a critical review with analytical modeling for offloading mobile edge-computing decisions based on machine learning and Deep Reinforcement Learning (DRL) approaches for the Internet of Vehicles (IoV). The paper has assumed a Secure IoV edge-computing offloading model with various data processing and traffic flow. The proposed analytical model considers the Markov decision process (MDP) and ML in offloading the decision process of different task flows of the IoV network control cycle. In the paper, we focused on buffer and energy aware in ML-enabled Quality of Experience (QoE) optimization, where many recent related research and methods were analyzed, compared, and discussed. The IoV edge computing and fog-based identity authentication and security mechanism were presented as well. Finally, future directions and potential solutions for secure ML IoV and V2X were highlighted.
The Industrial Internet of things (IIoT) helps several applications that require power control and low cost to achieve long life. The progress of IIoT communications, mainly based on cognitive radio (CR), has been guided to the robust network connectivity. The low power communication is achieved for IIoT sensors applying the Low Power Wide Area Network (LPWAN) with the Sigfox, NBIoT, and LoRaWAN technologies. This paper aims to review the various technologies and protocols for industrial IoT applications. A depth of assessment has been achieved by comparing various technologies considering the key terms such as frequency, data rate, power, coverage, mobility, costing, and QoS. This paper provides an assessment of 64 articles published on electricity control problems of IIoT between 2007 and 2020. That prepares a qualitative technique of answering the research questions (RQ): RQ1: “How cognitive radio engage with the industrial IoT?”, RQ2: “What are the Proposed architectures that Support Cognitive Radio LPWAN based IIOT?”, and RQ3: What key success factors need to comply for reliable CIIoT support in the industry?”. With the systematic literature assessment approach, the effects displayed on the cognitive radio in LPWAN can significantly revolute the commercial IIoT. Thus, researchers are more focused in this regard. The study suggests that the essential factors of design need to be considered to conquer the critical research gaps of the existing LPWAN cognitive-enabled IIoT. A cognitive low energy architecture is brought to ensure efficient and stable communications in a heterogeneous IIoT. It will protect the network layer from offering the customers an efficient platform to rent AI, and various LPWAN technology were explored and investigated.
Load forecasting is a vital part of smart grids for predicting the required electrical power using artificial intelligence (AI). Deep learning is broadly used for load forecasting in the smart grid using the artificial neural network (ANN). Generally, computing the deep learning in the smart grid requires massive data aggregation or centralization and significant computational time. This paper presents a survey of deep learning-based load forecasting techniques from 2015 to 2020. This survey discusses the studies based on their deep learning techniques, Distributed Deep Learning (DDL) techniques, Back Propagation (BP) based works, and non-BP based works in the load forecasting process. Consequent to the survey, it was determined that data aggregation dependency would be beneficial for reducing computational time in load forecasting. Therefore, a conceptual model of DDL for smart grids has been presented, where the HSIC (Hilbert-Schmidt Independence Criterion) Bottleneck technique has been incorporated to provide higher accuracy.
E-commerce implies an electronic purchasing and marketing process online by using typical Web browsers. As e-commerce is quickly developing on the planet, particularly in recent years, many areas of life are affected, particularly the improvement in how individuals regulate themselves non-financially and financially in different transactions. In electronic payment or e-commerce payment, the gateway is a major component of the structure to assure that such exchanges occur without disputes, while maintaining the common security over such systems. Most Internet payment gateways in e-commerce provide monetary information to customers using trusted third parties directly to a payment gateway. Nonetheless, it is recognized that the cloud Web server is not considered a protected entity. This article aims to develop an efficient and secure electronic payment protocol for e-commerce where consumers can immediately connect with the merchant properly. Interestingly, the proposed system does not require the customer to input his/her identity in the merchant’s website even though the customer can hide his/her identity and make a temporary identity to perform the service. It has been found that our protocol has much improved security effectiveness in terms of confidentiality, integrity, non-repudiation, anonymity availability, authentication, and authorization.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
334 Leonard St
Brooklyn, NY 11211
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.