Analysis of Symmetric Searchable Encryption and Data Retrieval in Cloud Computing
Vasudha Arora, S. S. Tyagi
openalex +1 more source
Distributed AutoML framework for multi‐objective optimization of concrete crack segmentation models
Abstract Monitoring cracks in concrete surfaces is essential for structural safety. While machine vision techniques have received significant interest in this domain, selecting optimal models and tuning hyperparameters remain challenging. This paper proposes a Distributed Automated Machine Learning (AutoML) framework for efficiently designing and ...
Armin Dadras Eslamlou +3 more
wiley +1 more source
Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products. [PDF]
Wang S +5 more
europepmc +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source
E2EE enhanced patient-centric blockchain-based system for EHR management. [PDF]
Haddad A +5 more
europepmc +1 more source
Abstract In a multi‐row facility layout problem (MRFLP), facilities are arranged in more than one row under the limited layout area. Considering different layout factors, various extensions of MRFLP have been modelled. However, the orientation of input/output (I/O) point in a facility, as a key factor that plays a direct impact on flow cost, is seldom ...
Yinan Guo +5 more
wiley +1 more source
Promoting trustworthy file sharing: A community-governed dApp approach. [PDF]
Koa CG, Heng SH, Chin JJ.
europepmc +1 more source
Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs
Rolf Haynberg +3 more
openalex +1 more source
Privacy protection of communication networks using fully homomorphic encryption based on network slicing and attributes. [PDF]
Wang W, Liu R, Cheng S.
europepmc +1 more source

