The main objective of the method is to provide the interesting part of the medical image on which different treatements are to be implemented. In medical image when some portion of image is to be selected, then ROI is selected with the help of Discrete Cosine Transform. It is used with the ROI technique to compress the medical image to remove the blocking effect. The different filters will be applied to the images. The aim of this method is to analyze the results using MATLAB software and calculate various parameters such as CR, entropy, bits per pixel, PSNR, MSE, to compress the ROI part of the color images without losing any contents of the images and to maintain the storage memory space. Imaging helps a lot to represent the internal problem of body in visual manner. Various medical diagnosing techniques are using digital images of human body as the deciding factors for next medical treatment. The new techniques are enhanced to compress the medical image so that the problems encountered in the previous study can be solved.
Mobile ad-hoc network is an infrastructure less wireless adhoc network in which mobile nodes communicate with each other through wireless links without the need of any centralized administration. Overhead goes high due to neighbor discovery messages in the MANET routing protocols, such as in AODV, DYMO. This paper implements both the protocols adaptive and then for optimization PSO is applied. Simulation results show that the proposed scheme reduces energy consumption and suppressing unnecessary hello messaging.
Abstract-ue to numerous uses of wireless sensor networks in various fields, they have attracted much interest in research community. For the monitoring and surveillance purposes wireless sensor networks are mostly used. In healthcare, WSNs are being popular due to its ease of use because patients can be monitored easily even at their homes by the doctors. A Break-The-Glass Access Control (BTG-AC) model was proposed with more flexible access to medical data in a reasonable time to provide data availability to the users. In the BTG-AC, security of the data never considered. For the security of the data an innovative security approach is desirable that also fit into I. INTRODUCTIONWSNs are being popular in healthcare for monitoring the patients at their homes. Patients have worn sensors that detect their physical conditions such as temperature, heart rate etc. In emergency, patients have to be treated carefully in a reasonable time to avoid the uncertain situation to be happen. In a medical scenario, data should be available every time to the doctors when they need to examine their patients' health condition. Security and availability both are most important issues in such monitoring systems. WSNs suffer from limited resources, less power, and poor computational capabilities that makes innovative techniques to be followed that can be fit into WSNs and consider their constraints. In healthcare industry, emergency or uncertain situations can be happened at any time. Therefore, data availability should be there to treat patients in reasonable time. For the purpose, an access control model that provides flexible access with required degree of data privacy is required. Data availability should be taken at the most in these kinds of situations but data privacy and data confidentiality should not be neglected. Data security is very much important in such scenario where the users have flexibility to access data in emergency conditions. The access control model should detect the violations from the unauthorized users as well as from the authorized users and an innovative and lightweight access control model is required to avoid the access through the dishonest or malicious users because the security breaches can happen at any time. Aim of the paper is to implement a lightweight Secure Medical Record Access Control Model same as BTG-AC model but the main difference is to address the security issue, Parallelizing ciphertext policy attribute-based-encryption scheme is implemented in the SMRAC model to provide authentication service to the users and to address the security issue. Parallelizing ciphertext policy attribute-based-encryption is an accelerated ciphertext policy attribute-based-encryption technique in which a user will be able decrypt the data only if that users' attributes pass through the ciphertexts' access structure [8]. Remaining paper structure follows: Section II describes the Literature Review, Section III represents the SMRAC model, Section IV determines results and discussion, and at the end Section V conc...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.