2023
DOI: 10.1016/j.aej.2023.08.010
|View full text |Cite
|
Sign up to set email alerts
|

TasLA: An innovative Tasmanian and Lichtenberg optimized attention deep convolution based data fusion model for IoMT smart healthcare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…A broader range of sensors is essential to cover such features. Moving forward, it will be important to increase the number of sensor types and leverage sensor-fusion methodologies ( Khadidos et al, 2023 ).…”
Section: Discussionmentioning
confidence: 99%
“…A broader range of sensors is essential to cover such features. Moving forward, it will be important to increase the number of sensor types and leverage sensor-fusion methodologies ( Khadidos et al, 2023 ).…”
Section: Discussionmentioning
confidence: 99%
“…Although there are many evaluation models intended for the security of IoT devices in different fields, the central emphasis in the proposed study is to investigate the existing literature only for the evaluation frameworks, models, and methods employed for the IoT-based systems in the healthcare area. These models often use MCDM-driven methods 8 – 12 and Artificial intelligent approaches 13 , 14 for the assessment purpose. However, the literature study is restricted to highlighting only those research works that are targeted to perform security assessments in healthcare environments using multi-criteria decision-making (MCDM) techniques.…”
Section: Related Workmentioning
confidence: 99%
“…One way to ensure high security for IoT applications is by utilizing networks to create a series of computational tasks. Moreover, the transfer of computational tasks is accomplished by employing a transaction procedure for offloading, which involves a limited number of computational nodes (22) (23) , as explained in Equation (1).…”
Section: Mathematical Approachmentioning
confidence: 99%