2022
DOI: 10.3390/app12125859
|View full text |Cite
|
Sign up to set email alerts
|

Exploitation of Emerging Technologies and Advanced Networks for a Smart Healthcare System

Abstract: Current medical methods still confront numerous limitations and barriers to detect and fight against illnesses and disorders. The introduction of emerging technologies in the healthcare industry is anticipated to enable novel medical techniques for an efficient and effective smart healthcare system. Internet of Things (IoT), Wireless Sensor Networks (WSN), Big Data Analytics (BDA), and Cloud Computing (CC) can play a vital role in the instant detection of illnesses, diseases, viruses, or disorders. Complicated… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 58 publications
0
11
0
1
Order By: Relevance
“…On account of that the attacker needs to crack not just one image but a data set of images, he needs more computing power and more time to crack. Even if he uses the correct approach and kernel size, the probability that he recovers the entire image data set is 1 N * C! .…”
Section: Security Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…On account of that the attacker needs to crack not just one image but a data set of images, he needs more computing power and more time to crack. Even if he uses the correct approach and kernel size, the probability that he recovers the entire image data set is 1 N * C! .…”
Section: Security Analysismentioning
confidence: 99%
“…When the user obtains the ciphertext feature maps and decrypts them, he can use the decrypted feature maps and the classical CNN to train a model or classify images in a local or a trusted server. In this stage, if the attacker has intercepted the ciphertext images and ciphertext feature maps (or plaintext feature maps), the probability that he recovers the entire image data set is 1 N * C! .…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The classification is a type of supervised learning method [70][71][72][73]. Recently, there are many applications of machine learning classification algorithms detailed in [69][70][71][72][73][74][75]. It is a categorization method that distinguishes, predicts, and understands objects and ideas.…”
Section: 7classificationmentioning
confidence: 99%
“…The IoT has the ability to collect information from embedded devices in the environment and to process these data to achieve desired goals. Such internet and cloud-connected devices hold great promise for improved smart health care solutions [ 20 ]. Here, we propose a novel, specially designed IoT sensor that can be plugged into the user’s monitor and communicates with a server to determine, in real time, user changes in posture, e.g., sitting or standing events, and their presence at their desk.…”
Section: Introductionmentioning
confidence: 99%