2021
DOI: 10.3991/ijoe.v17i11.25347
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Methodology for Providing Security in Electronic Health Record Using Fuzzy Based Multi Agent System

Abstract: <p class="0abstract">Privacy and security are crucial when it comes to the implementation of Electronic Healthcare Records (HER). Whenever a patient visits a doctor, their health records are updated since it consists of vital information on the patient's health and well-being. It also comprises of description about the previous and current treatment quality.Multi-Agent Systems can support E-Healthcare applications for improving quality of life. The availability and use of extensive systems for EHR has in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 14 publications
0
1
0
Order By: Relevance
“…Similarly, the authors of [70] proposed MAS that combines both multi-agent concepts and fuzzy logic to monitor and protect data from unauthorized access and enable conversation between patients and professionals. The system consists of the following phases: Domain/ Information phase, Action/Computational agent, Customer phase, Operative phase, and Communication phase.…”
Section: ) Mas and Cloud Computingmentioning
confidence: 99%
“…Similarly, the authors of [70] proposed MAS that combines both multi-agent concepts and fuzzy logic to monitor and protect data from unauthorized access and enable conversation between patients and professionals. The system consists of the following phases: Domain/ Information phase, Action/Computational agent, Customer phase, Operative phase, and Communication phase.…”
Section: ) Mas and Cloud Computingmentioning
confidence: 99%
“…For both individuals and businesses, digital images can be a valuable asset. However, the high monetary value of images on the internet poses a serious threat to their safety [15][16][17]. This paper's Fibonacci chaos image encryption algorithm and wavelet transformbased Orthogonal Frequency Division Multiplexing can be used to secure the transmission and reception of protected images (WOFDM).…”
Section: Introductionmentioning
confidence: 99%