[HTML][HTML] Healthcare Internet of Things (H-IoT): Current trends, future prospects, applications, challenges, and security issues

M Kumar, A Kumar, S Verma, P Bhattacharya… - Electronics, 2023 - mdpi.com
Advancements in Healthcare Internet of Things (H-IoT) systems have created new
opportunities and solutions for healthcare services, including the remote treatment and …

A comprehensive review on deep learning algorithms: Security and privacy issues

M Tayyab, M Marjani, NZ Jhanjhi, IAT Hashem… - Computers & …, 2023 - Elsevier
Abstract Machine Learning (ML) algorithms are used to train the machines to perform
various complicated tasks that begin to modify and improve with experiences. It has become …

Computational intelligence and metaheuristic techniques for brain tumor detection through IoMT‐enabled MRI devices

D Kaur, S Singh, W Mansoor, Y Kumar… - Wireless …, 2022 - Wiley Online Library
The brain tumor is the 22nd most common cancer worldwide, with 1.8% of new cancers. It is
likely the most severe ailment that necessitates early discovery and treatment, and it …

[HTML][HTML] Blockchain and machine learning Inspired secure smart home communication network

S Menon, D Anand, Kavita, S Verma, M Kaur… - Sensors, 2023 - mdpi.com
With the increasing growth rate of smart home devices and their interconnectivity via the
Internet of Things (IoT), security threats to the communication network have become a …

[HTML][HTML] Challenges and limitation analysis of an IoT-Dependent system for deployment in smart healthcare using communication standards features

S Upadhyay, M Kumar, A Upadhyay, S Verma, Kavita… - Sensors, 2023 - mdpi.com
The use of IoT technology is rapidly increasing in healthcare development and smart
healthcare system for fitness programs, monitoring, data analysis, etc. To improve the …

A new spatiotemporal chaos model and its application in bit-level image encryption

X Wang, M Zhao - Multimedia Tools and Applications, 2024 - Springer
With the development of network technology, multimedia security has attracted extensive
attention. Although chaotic system is widely used in this field because of its own …

A comparative review on non-chaotic and chaotic image encryption techniques

G Ghosh, D Anand, Kavita, S Verma, NZ Jhanjhi… - … and Innovation on Data …, 2021 - Springer
In the new era, multimedia technology is used extensively. Multimedia data transfers over
the Internet are not adequately stable. Data protection is needed for digital images transfer …

Experimental study of terrain coverage of an autonomous chaotic mobile robot

E Petavratzis, C Volos, I Stouboulos - Integration, 2023 - Elsevier
In this work, the design and implementation of an autonomous mobile robot that can cover
given workspaces, is presented. The motion commands are produced by a bit sequence …

A review on chaotic scheme-based image encryption techniques

G Ghosh, D Anand, Kavita, S Verma, NZ Jhanjhi… - … and Innovation on Data …, 2021 - Springer
In the face of an adversary, cryptography is a matter of coordination. It addresses a variety of
topics such as confidentiality, authentication, and several vital distributions. Modern …

Performance and stability comparison of react and flutter: Cross-platform application development

K Kishore, S Khare, V Uniyal… - … Conference on Cyber …, 2022 - ieeexplore.ieee.org
Application development is a very important aspect when it comes to business. From small-
scale companies to Fortune Companies everyone has an application through which they are …