[Retracted] Blockchain in Secure Healthcare Systems: State of the Art, Limitations, and Future Directions

V Sharma, A Gupta, NU Hasan… - Security and …, 2022 - Wiley Online Library
Modern healthcare is a data‐intensive domain representing an amalgamation of long‐term
electronic medical records, real‐time patient monitoring data, and more recently sensor data …

[Retracted] A Novel Hybrid Deep Learning Approach for Skin Lesion Segmentation and Classification

P Thapar, M Rakhra, G Cazzato… - Journal of Healthcare …, 2022 - Wiley Online Library
Skin cancer is one of the most common diseases that can be initially detected by visual
observation and further with the help of dermoscopic analysis and other tests. As at an initial …

Application of new technology of intelligent robot plant protection in ecological agriculture

Z An, C Wang, B Raj, S Eswaran, R Raffik… - Journal of Food …, 2022 - Wiley Online Library
Crop diseases, pest infestations, water shortages, weed infestations, and other issues affect
the agriculture sector. Due to existing agricultural techniques, these issues result in …

[Retracted] Cyclic GAN Model to Classify Breast Cancer Data for Pathological Healthcare Task

P Chopra, N Junath, SK Singh, S Khan… - BioMed Research …, 2022 - Wiley Online Library
An algorithm framework based on CycleGAN and an upgraded dual‐path network (DPN) is
suggested to address the difficulties of uneven staining in pathological pictures and difficulty …

High performance FPGA based secured hardware model for IoT devices

A Shrivastava, D Haripriya, YD Borole, A Nanoty… - International Journal of …, 2022 - Springer
Data transmission is always vulnerable to assault on the digital side. Cipher strength
analysis is a crucial component of a business or academic safety evaluation. For data …

Minimum Latency‐Secure Key Transmission for Cloud‐Based Internet of Vehicles Using Reinforcement Learning

V Akilandeswari, A Kumar… - Computational …, 2022 - Wiley Online Library
The Internet of Vehicles (IoV) communication key management level controls the
confidentiality and security of its data, which may withstand user identity‐based attacks such …

[Retracted] Homogeneous Decision Community Extraction Based on End‐User Mental Behavior on Social Media

S Gupta, S Kumar, SL Bangare… - Computational …, 2022 - Wiley Online Library
Aiming at the inadequacy of the group decision‐making method with the current attribute
value as interval language information, an interval binary semantic decision‐making method …

Proof of Optimality based on Greedy Algorithm for Offline Cache Replacement Algorithm.

S Srivastava, PK Singh - International Journal of Next …, 2022 - search.ebscohost.com
The optimal offline cache replacement algorithm is a MIN algorithm that chooses which data
item to remove when a new data item is brought from lower level of cache or main memory …

Design and implementation of intelligent monitoring system for platform security gate based on wireless communication technology using ML

C Li, H Niu, M Shabaz, K Kajal - International Journal of System Assurance …, 2022 - Springer
The platform safety gate is important safety protection equipment in urban rail transit, which
makes the rail area relatively independent from the platform waiting area, ensures the safety …

Complex circuit simulation and nonlinear characteristics analysis of GaN power switching device

J Gu, W Wang, R Yin, CV Truong… - Nonlinear Engineering, 2021 - degruyter.com
To overcome the problem of energy losses in the electrical circuits and to improve the
energy conversion efficiency, it is necessary to increase the power switch frequency and …