2020
DOI: 10.14569/ijacsa.2020.0110159
|View full text |Cite
|
Sign up to set email alerts
|

A Fuzzy Multi-Objective Covering-based Security Quantification Model for Mitigating Risk of Web based Medical Image Processing System

Abstract: Medical image processing is one of the most active research areas and has big impact on the health sector. With the arrival of intelligent processes, web based medical image processing has become simple and errorless. Web based application is now used extensively for medical image processing. Large amount of medical data is generated daily with more and more data being shared over public and private networks for the diagnosis of diseases through the web based image processing systems. Medical images like that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 20 publications
(27 citation statements)
references
References 14 publications
0
27
0
Order By: Relevance
“…The reader receives the carrier signal from the tag, enters the radio frequency unit through the antenna, and converts it into a digital signal. The digital signal processing unit performs the necessary processing and composition, deforms the final returned information, and completes the identification or reading and operation of the RFID tag record [ 22 ]. The received signal is decoded and sent to the central computer for processing.…”
Section: Research and Design Methods Of Image Data Security Mechanimentioning
confidence: 99%
“…The reader receives the carrier signal from the tag, enters the radio frequency unit through the antenna, and converts it into a digital signal. The digital signal processing unit performs the necessary processing and composition, deforms the final returned information, and completes the identification or reading and operation of the RFID tag record [ 22 ]. The received signal is decoded and sent to the central computer for processing.…”
Section: Research and Design Methods Of Image Data Security Mechanimentioning
confidence: 99%
“…Fuzzy-AHP is useful in eliciting precise values/facts during making decisions [34]. A commonly applied priority evaluation tool is Fuzzy-AHP.…”
Section: Ranking/priority Analysismentioning
confidence: 99%
“…A commonly applied priority evaluation tool is Fuzzy-AHP. The researchers of this work have previously used this procedure [34] to perform the Fuzzy-AHP approach and have gathered data from 75 experts from various areas. This approach focuses on giving the prioritized data procedure in healthcare with the aid of feedback from experts.…”
Section: Ranking/priority Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Fuzzy-AHP is methodology that is pre-verified and authors has expertise in fuzzy-based various MCDM approaches through their previous experience [53][54][55][56]. Fuzzy-AHP methodology works on triangular fuzzy numbers and provides some crisp and effective outcomes [57][58][59][60][61]. Authors strongly believe that fuzzy-AHP is the most promising and effective technique for assessing the priority of malware analysis techniques and types.…”
Section: Ranking Examinationmentioning
confidence: 99%