Artificial Intelligence Wireless Network Data Security System For Medical Records Using Cryptography Management
dc.authorscopusid | 57214158790 | |
dc.authorscopusid | 57832092700 | |
dc.authorscopusid | 57832092800 | |
dc.authorscopusid | 57486696700 | |
dc.authorscopusid | 57755393300 | |
dc.authorscopusid | 56539389500 | |
dc.contributor.author | Saxena,A. | |
dc.contributor.author | Misra,D. | |
dc.contributor.author | Ganesamoorthy,R. | |
dc.contributor.author | Arias Gonzales,J.L. | |
dc.contributor.author | Almashaqbeh,H.A. | |
dc.contributor.author | Tripathi,V. | |
dc.date.accessioned | 2024-05-25T12:18:13Z | |
dc.date.available | 2024-05-25T12:18:13Z | |
dc.date.issued | 2022 | |
dc.department | Okan University | en_US |
dc.department-temp | Saxena A., Compucom Institute of Information Technology and Management, Rajasthan, Jaipur, India; Misra D., University of Engineering & Management, Institute of Engineering & Management, Department of Computer Science and Engineering and Computer Application, Kolkata, India; Ganesamoorthy R., Panimalar Engineering College, Chennai, India; Arias Gonzales J.L., University of British Columbia, Department of Business, Canada; Almashaqbeh H.A., Okan University, Istanbul, Turkey; Tripathi V., Graphic Era Deemed to Be University, Department of Computer Science & Engineering, Uttarakhand, Dehradun, India | en_US |
dc.description.abstract | So we're going to study here. Wireless technology is amongst the most quickly expanding and active technological disciplines in the world of communication. Connectivity communication that does not need the use of wires, cables, and perhaps other physical media. Encryption algorithm has always been widely used in various these decades to secure information from potential danger and using wireless technologies can also make the information more sheltered therefore these network infrastructure which focuses on providing replaying intervention against many issues, also can analyze the information from almost anywhere through these wireless communication and it will safeguard the health information from potential danger by storing the data in multiple servers in everything using a few real cryptographies This way, only authorized personnel may access the data and no one else can, ensuring that the data is protected from threats. To monitor environmental conditions, wireless sensor networks employ a variety of sensors, which transmit data to a central destination. These wireless sensor nodes are primarily motivated by military applications, and they are now widely used in many automotive and commercial areas, as well as in promising industries such as medicine. Nowadays, remote health monitoring wireless sensor networks unquestionably increase the quality of treatment. dropping and impersonating are two common security vulnerabilities to healthcare applications. © 2022 IEEE. | en_US |
dc.identifier.citationcount | 7 | |
dc.identifier.doi | 10.1109/ICACITE53722.2022.9823615 | |
dc.identifier.endpage | 2559 | en_US |
dc.identifier.isbn | 978-166543789-9 | |
dc.identifier.scopus | 2-s2.0-85135461159 | |
dc.identifier.startpage | 2555 | en_US |
dc.identifier.uri | https://doi.org/10.1109/ICACITE53722.2022.9823615 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14517/1667 | |
dc.language.iso | en | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartof | 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2022 -- 2nd International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2022 -- 28 April 2022 through 29 April 2022 -- Greater Noida -- 181064 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.scopus.citedbyCount | 14 | |
dc.subject | Algorithm | en_US |
dc.subject | Artificial intelligence | en_US |
dc.subject | automatic assistance | en_US |
dc.subject | Classification | en_US |
dc.subject | clustering | en_US |
dc.subject | Data Acquisition | en_US |
dc.subject | Data Management | en_US |
dc.subject | Data processing | en_US |
dc.subject | data wrangling | en_US |
dc.subject | framework | en_US |
dc.subject | Imputation | en_US |
dc.subject | Interpretation | en_US |
dc.subject | Medical | en_US |
dc.subject | Probabilities | en_US |
dc.subject | regression | en_US |
dc.subject | sensors | en_US |
dc.subject | Statistics | en_US |
dc.subject | Supervised learning | en_US |
dc.subject | technology | en_US |
dc.subject | transmission | en_US |
dc.subject | Wide range data transmission | en_US |
dc.subject | Wireless communication | en_US |
dc.title | Artificial Intelligence Wireless Network Data Security System For Medical Records Using Cryptography Management | en_US |
dc.type | Conference Object | en_US |
dspace.entity.type | Publication |