A Secure Data Storage Architecture for Internet of Medical Things (IoMT) Using an Adaptive Gaussian Mutation Based Sine Cosine Optimization Algorithm and Fuzzy-Based Secure Clustering

2021 ◽  
Vol 11 (12) ◽  
pp. 2883-2890
Author(s):  
D. J. Joel Devadass Daniel ◽  
S. Ebenezer Juliet

The fast-growing Internet of Things (IoT) paradigm can be referred to be the interconnection of physical things or human beings along with the digital electronics devices, Softwares to exchange data with centralized systems through the defined communication infrastructures. Moreover, it provides better opportunities for the direct connection between the physical world and computer-based systems. Nevertheless, the security of data transmission through IoMT (Internet of Medical Things) is the biggest challenge. Hence to provide better security we proposed a novel method known as, Fuzzy based Adaptive Gaussian Mutation based Sine Cosine Optimization approach to ensure security and Quality of Service (QoS) by exploiting the Mutual authentication mechanism. Moreover, an adaptive Gaussian mutation-based SCO algorithm is exploited for cluster formulation of IoMT nodes. The Intuitionistic fuzzy based weight estimation is made for the selection of CH and effective routing. Our proposed work is compared to several recent works. From the performance analysis and evaluation, we conclude that the proposed work outperforms all the existing works and provides better QoS and security.

Author(s):  
Krittika Singh

The Internet of things is the internetworking of physical devices, vehicles, buildings, and other items—embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data. The IoT allows objects to be sensed and/or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit in addition to reduced human intervention. In this research an expert system based upon the IOT is developed in which the next event in the flight schedules due to any kind of medical emergencies is to be predicted. For this the medical data of all the patients are to be collected through WBAN.


2020 ◽  
Vol 4 (3) ◽  
pp. 591-600
Author(s):  
Mochammad Rizky Royani ◽  
Arief Wibowo

The development of e-commerce in Indonesia in the last five years has significantly increased the growth for logistics service companies. The Indonesian Logistics and Forwarders Association (ALFI) has predicted the growth potential of the logistics business in Indonesia to reach more than 30% by 2020. One of the efforts of logistics business companies to improve services in the logistics services business competition is to implement web service technology on mobile platforms, to easy access to services for customers. This research aims to build a web service with a RESTful approach. The REST architecture has limitations in the form of no authentication mechanism, so users can access and modify data. To improve its services, JSON Web Token (JWT) technology is needed in the authentication process and security of access rights. In terms of data storage and transmission security, a cryptographic algorithm is also needed to encrypt and maintain confidentiality in the database. RC4 algorithm is a cryptographic algorithm that is famous for its speed in the encoding process. RC4 encryption results are processed with the Base64 Algorithm so that encrypted messages can be stored in a database. The combination of the RC4 method with the Base64 method has strengthened aspects of database security. This research resulted in a prototype application that was built with a combination of web service methods, JWT and cryptographic techniques. The test results show that the web service application at the logistics service company that was created can run well with relatively fast access time, which is an average of 176 ms. With this access time, the process of managing data and information becomes more efficient because before making this application the process of handling a transaction takes up to 20 minutes.


Author(s):  
Kanika Gupta ◽  
Aatif Jamshed

: Some unknown cases of pneumonia were communicated to World Health Organization (WHO) on 31 December,2019 in China’s Wuhan state. The higher authorities of China informed novel coronavirus as the root cause and labelled as “nCov-2019”. This virus is lying into the virus’s family which propagates the diseases like cold flu, lungs infection and more serious diseases. It is not detected earlier in human beings as it is considered to be a new patch on life. Many countries have increased their surveillance forces around the globe to detect any new novel coronavirus cases. An efficient and safe network for secure data storage i.e. Block chain is used in several applications such as food market, healthcare applications, finance, operations management, Internet of Things (IoT). In this paper, with the use of this emerging technology, are able to track useful information and accelerate the treatment process of patients. It also preserves the person’s identity. Correct implementation of block chain model has the chances to restrict the coronavirus transmissions and its related mortality rate where there are inadequate facilities of testing. Other infectious diseases will also be curbed by this model. The advantages of this model can reach to various stakeholders who are involved in the healthcare field which helps us to restrict the transmission of various diseases.


Author(s):  
Jiangfeng Sun ◽  
Fazlullah Khan ◽  
Junxia Li ◽  
Mohammad Dahman Alshehri ◽  
Ryan Alturki ◽  
...  

1981 ◽  
Vol 10 (2) ◽  
pp. 109-124 ◽  
Author(s):  
Richard Braby ◽  
J. Peter Kincaid

Using computers to author and edit text is now feasible and economical. This article describes two elements of a computer based publishing system which aid authors by automatically generating certain kinds of training materials, and in writing easily understood text Authoring routines automatically format and compose text and merge stored graphics with the text. Highly redundant training materials require only a small data base to produce a sizeable workbook. Editing routines aid authors in writing readable text by: 1) flagging uncommon words and long sentences; 2) suggesting substitutes for awkward or difficult words and phrases; and 3) indicating the readability grade level. These routines are operating as elements of a prototype publishing system in the U.S. Navy's Training Analysis and Evaluation Group minicomputer. They are being developed for use in the U.S. Navy's computer based publishing system.


Author(s):  
Haixuan Zhu ◽  
◽  
Xiaoyu Jia ◽  
Pengluo Que ◽  
Xiaoyu Hou ◽  
...  

In the era of big data, with the development of computer technology, especially the comprehensive popularization of mobile terminal device and the gradual construction of the Internet of Things, the urban physical environment and social environment have been comprehensively digitized and quantified. Computational thinking mode has gradually become a new thinking mode for human beings to recognize and govern urban complex system. Meanwhile computational urban science has become the main discipline development aspect of modern urban planning. Computational thinking is the thinking of computer science using algorithms based on time complexity and space complexity, which provides a new paradigm for the construction of index system, data collection, data storage, data analysis, pattern recognition, dynamic governance in the process of scientific planning and urban management. Based on this, this paper takes the computational thinking mode of urban planning discipline in big data era as the research object, takes the scientific construction of computational urban planning as the research purpose, and adopts literature research methods and interdisciplinary research methods, comprehensively studies the connotation of the computing thinking mode of computer science. Meanwhile, this paper systematically discusses the system construction of urban computing, model generation, the theory and method of digital twinning, as well as the popularization of the computational thinking mode of urban and rural planning discipline and the scientific research of computational urban planning, which responds to the needs of the era of the development of urban and rural planning disciplines in the era of big data.


Author(s):  
Alexey Sitnikov

The article deals with the social phenomenology of Alfred Schütz. Proceeding from the concept of multiple realities, the author describes religious reality, analyses its relationship with everyday, theoretical, and mythological realities, and identifies the areas where they overlap and their specifics. According to Schütz’s concept, reality is understood as something that has a meaning for a human being, and is also consistent and certain for those who are ‘inside’ of it. Realities are structurally similar to one another as they are similar to the reality that is most obvious for all human beings, i.e., the world of everyday life. Religious reality has one of the main signs of genuine reality, that of internal consistency. Religious reality has its own epoché (special ascetic practices) which has similarities with the epoché of the theoretical sphere since neither serve practical objectives, and imply freedom from the transitory issues of everyday life. Just as the theoretical sphere exists independently of the life of a scientist in the physical world and is needed to transfer results to other people, so the religious reality depends on ritual actions and material objects in its striving for the transcendent. Individual, and especially collective, religious practices are performed physically and are inextricably linked with the bodily ritual. The article notes that although Schütz’s phenomenological concept of multiple realities has repeatedly served as a starting point for the development of various social theories, its heuristic potential has not been exhausted. This allows for the further analyzing and development of topical issues such as national identity and its ties with religious tradition in the modern era, when religious reality loses credibility and has many competitors, one of which is the modern myth of the nation. Intersubjective ideas of the nation that are socially confirmed as the self-evident reality of everyday life cause complex emotions and fill human lives, thus displacing religious reality or forcing the latter to come into complex interactions with the national narrative.


2018 ◽  
Vol 19 (1) ◽  
pp. 137-146 ◽  
Author(s):  
Xuemin Xia ◽  
Simin Jiang ◽  
Nianqing Zhou ◽  
Xianwen Li ◽  
Lichun Wang

Abstract Groundwater pollution has been a major concern for human beings, since it is inherently related to people's health and fitness and the ecological environment. To improve the identification of groundwater pollution, many optimization approaches have been developed. Among them, the genetic algorithm (GA) is widely used with its performance depending on the hyper-parameters. In this study, a simulation–optimization approach, i.e., a transport simulation model with a genetic optimization algorithm, was utilized to determine the pollutant source fluxes. We proposed a robust method for tuning the hyper-parameters based on Taguchi experimental design to optimize the performance of the GA. The effectiveness of the method was tested on an irregular geometry and heterogeneous porous media considering steady-state flow and transient transport conditions. Compared with traditional GA with default hyper-parameters, our proposed hyper-parameter tuning method is able to provide appropriate parameters for running the GA, and can more efficiently identify groundwater pollution.


2009 ◽  
pp. 338-361
Author(s):  
Z. M. Ma

Information systems have become the nerve center of current computer-based engineering applications, which hereby put the requirements on engineering information modeling. Databases are designed to support data storage, processing, and retrieval activities related to data management, and database systems are the key to implementing engineering information modeling. It should be noted that, however, the current mainstream databases are mainly used for business applications. Some new engineering requirements challenge today’s database technologies and promote their evolvement. Database modeling can be classified into two levels: conceptual data modeling and logical database modeling. In this chapter, we try to identify the requirements for engineering information modeling and then investigate the satisfactions of current database models to these requirements at two levels: conceptual data models and logical database models. In addition, the relationships among the conceptual data models and the logical database models for engineering information modeling are presented in the chapter viewed from database conceptual design.


Author(s):  
Witold Kinsner

Numerous attempts are being made to develop machines that could act not only autonomously, but also in an increasingly intelligent and cognitive manner. Such cognitive machines ought to be aware of their environments which include not only other machines, but also human beings. Such machines ought to understand the meaning of information in more human-like ways by grounding knowledge in the physical world and in the machines’ own goals. The motivation for developing such machines ranges from self-evidenced practical reasons, such as the expense of computer maintenance, to wearable computing in health care, and gaining a better understanding of the cognitive capabilities of the human brain. To achieve such an ambitious goal requires solutions to many problems, ranging from human perception, attention, concept creation, cognition, consciousness, executive processes guided by emotions and value, and symbiotic conversational human-machine interactions. An important component of this cognitive machine research includes multiscale measures and analysis. This chapter presents definitions of cognitive machines, representations of processes, as well as their measurements, measures and analysis. It provides examples from current research, including cognitive radio, cognitive radar, and cognitive monitors.


Sign in / Sign up

Export Citation Format

Share Document