Blockchain technology provides a data structure with inherent security properties that include cryptography, decentralization, and consensus, which ensure trust in transactions. It covers widely applicable usages, such as in intelligent manufacturing, finance, the Internet of things (IoT), medicine and health, and many different areas, especially in medical health data security and privacy protection areas. Its natural attributes, such as contracts and consensus mechanisms, have leading-edge advantages in protecting data confidentiality, integrity, and availability. The security issues are gradually revealed with in-depth research and vigorous development. Unlike traditional paper storage methods, modern medical records are stored electronically. Blockchain technology provided a decentralized solution to the trust-less issues between distrusting parties without third-party guarantees, but the “trust-less” security through technology was easily misunderstood and hindered the security differences between public and private blockchains appropriately. The mentioned advantages and disadvantages motivated us to provide an advancement and comprehensive study regarding the applicability of blockchain technology. This paper focuses on the healthcare security issues in blockchain and sorts out the security risks in six layers of blockchain technology by comparing and analyzing existing security measures. It also explores and defines the different security attacks and challenges when applying blockchain technology, which promotes theoretical research and robust security protocol development in the current and future distributed work environment.
Mobile Ad-hoc Network (MANETs) is a wireless network topology with mobile network nodes and movable communication routes. In addition, the network nodes in MANETs are free to either join or leave the network. Typically, routing in MANETs is multi-hop because of the limited communication range of nodes. Then, routing protocols have been developed for MANETs. Among them, energy-aware location-aided routing (EALAR) is an efficient reactive MANET routing protocol that has been recently obtained by integrating particle swarm optimization (PSO) with mutation operation into the conventional LAR protocol. However, the mutation operation (nonuniform) used in EALAR has some drawbacks, which make EALAR provide insufficient exploration, exploitation, and diversity of solutions. Therefore, this study aims to propose to apply the Optimized PSO (OPSO) via adopting a mutation operation (uniform) instead of nonuniform. The OPSO is integrated into the LAR protocol to enhance all critical performance metrics, including packet delivery ratio, energy consumption, overhead, and end-to-end delay.
Internet of Things (IoT) is proliferating in our real world, and it is a promising technology that serves a very comfortable service to the users. IoT's underlying technology is to connect to central Cloud Computing (CC), which is a huge data center collecting the generated data by IoT devices, and it is located in different areas on demand. However, cloud computing lacks data transmission because of the infrastructure and limitations of networks which enormously decrease its performance. Therefore, a new paradigm has been founded to act as a middleware between the Cloud and IoT, termed Fog Computing (FC) Technology. Considering Fog as a cloud extension that provides computing service at the edge of the network, Fog Computing placement enables this technology to deal with numerous data locally. In this study, we surveyed Fog computing with in-depth analysis and covered the latest studies to address and overcome the existing challenges in FC. We reviewed fog computing technology conceptually and defined it based on the existing studies in the literature, together with its architecture, applications, advantages, and open issues with optimization methods being performed to obtain the optimal services. INDEX TERMS Fog Computing Applications, Fog Computing Concept, Fog Computing Open Issues, Cloud computing, Internet of Things (IoT).
This paper presents an optimisation of extreme learning machine by league championship algorithm based on food images. Extreme Learning Machine (ELM) is an effective classifier because of the performance which is higher than other classifiers’ aspects. However, some important drawbacks still work as a hindrance like failure of optimal selection weights for the weights of the input-hidden layer and the output of the threshold. In spite of the wide number of problem-solving attempts, there was no solution to be considered effective. This paper presents the approach of hybrid learning and the League Championship Algorithm is used by for the purpose of selecting the input weights and the thresholds outputs. The experimental outcomes showed that the performance of proposed technique is superior as compared according to different scenarios of the measures to benchmark. The proposed method has achieved an overall accuracy of 95% for UEC food 100 dataset and 94% for UEC food 256 dataset comparing with 94% and 80% for baseline approaches.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.