Results 201 to 210 of about 13,384 (274)

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

Correlated Transient Response of Buried Cables and Lightning Channel Radiation of Return Strokes of Five Rocket‐Triggered Lightning Strikes

open access: yesHigh Voltage, EarlyView.
ABSTRACT Data from five rocket‐triggered lightning flashes are adopted to analyse the correlated transient response of buried cables and lightning channel radiations. These five flashes have the same termination point that is right above the buried cables and involve a total of 32 return strokes.
Mi Zhou   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy