Metaverse for healthcare: a survey on potential applications, challenges and future directions

R Chengoden, N Victor, T Huynh-The, G Yenduri… - IEEE …, 2023 - ieeexplore.ieee.org
The rapid progress in digitalization and automation have led to an accelerated growth in
healthcare, generating novel models that are creating new channels for rendering treatment …

Security of blockchain and AI-empowered smart healthcare: application-based analysis

A Alabdulatif, I Khalil, M Saidur Rahman - Applied Sciences, 2022 - mdpi.com
A smart device carries a great amount of sensitive patient data as it offers innovative and
enhanced functionalities in the smart healthcare system. Moreover, the components of …

Early detection of red palm weevil infestations using deep learning classification of acoustic signals

W Boulila, A Alzahem, A Koubaa, B Benjdira… - … and Electronics in …, 2023 - Elsevier
Abstract The Red Palm Weevil (RPW), also known as the palm weevil, is considered among
the world's most damaging insect pests of palms. Current detection techniques include the …

A multi-stage deep-learning-based vehicle and license plate recognition system with real-time edge inference

A Ammar, A Koubaa, W Boulila, B Benjdira… - Sensors, 2023 - mdpi.com
Video streaming-based real-time vehicle identification and license plate recognition systems
are challenging to design and deploy in terms of real-time processing on edge, dealing with …

Efficient S-box construction based on quantum-inspired quantum walks with PSO algorithm and its application to image cryptosystem

B Abd-El-Atty - Complex & Intelligent Systems, 2023 - Springer
Amidst the growth of the internet and communication technologies, the requirements for the
security of data transmitted via these technologies are increasing. Visual data, like images …

Preserving privacy of classified authentic satellite lane imagery using proxy re-encryption and UAV technologies

Y Nagasree, C Rupa, P Akshitha, G Srivastava… - Drones, 2023 - mdpi.com
Privacy preservation of image data has been a top priority for many applications. The rapid
growth of technology has increased the possibility of creating fake images using social …

Novel secure data protection scheme using Martino homomorphic encryption

C Rupa, Greeshmanth, MA Shah - Journal of Cloud Computing, 2023 - Springer
Globally, data maintenance and its security are vital tasks due to the rapid development of
advanced technologies. Users now utilise Cloud computing technique and security …

Privacy-enhanced pneumonia diagnosis: IoT-enabled federated multi-party computation in industry 5.0

AA Siddique, W Boulila, MS Alshehri… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Pneumonia is a significant global health concern that can lead to severe and sometimes
fatal consequences. Timely identification and classification of pneumonia can substantially …

Efficient multiclass classification using feature selection in high-dimensional datasets

A Kumar, A Kaur, P Singh, M Driss, W Boulila - Electronics, 2023 - mdpi.com
Feature selection has become essential in classification problems with numerous features.
This process involves removing redundant, noisy, and negatively impacting features from …

[HTML][HTML] Efficient and secure image encryption using key substitution process with discrete wavelet transform

MU Rehman, A Shafique, KH Khan… - Journal of King Saud …, 2023 - Elsevier
Over the past few years, there has been a rise in the utilization of chaotic encryption
algorithms for securing images. The majority of chaos-based encryption algorithms adhere …