期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Efficient Joint Key Authentication Model in E-Healthcare
1
作者 Muhammad Sajjad Tauqeer Safdar Malik +5 位作者 Shahzada Khurram Akber Abid Gardezi Fawaz Alassery Habib Hamam Omar Cheikhrouhou Muhammad Shafiq 《Computers, Materials & Continua》 SCIE EI 2022年第5期2739-2753,共15页
Many patients have begun to use mobile applications to handle different health needs because they can better access high-speed Internet and smartphones.These devices and mobile applications are now increasingly used a... Many patients have begun to use mobile applications to handle different health needs because they can better access high-speed Internet and smartphones.These devices and mobile applications are now increasingly used and integrated through the medical Internet of Things(mIoT).mIoT is an important part of the digital transformation of healthcare,because it can introduce new business models and allow efficiency improvements,cost control and improve patient experience.In the mIoT system,when migrating from traditional medical services to electronic medical services,patient protection and privacy are the priorities of each stakeholder.Therefore,it is recommended to use different user authentication and authorization methods to improve security and privacy.In this paper,our prosed model involves a shared identity verification process with different situations in the e-health system.We aim to reduce the strict and formal specification of the joint key authentication model.We use the AVISPA tool to verify through the wellknown HLPSL specification language to develop user authentication and smart card use cases in a user-friendly environment.Our model has economic and strategic advantages for healthcare organizations and healthcare workers.The medical staff can increase their knowledge and ability to analyze medical data more easily.Our model can continuously track health indicators to automatically manage treatments and monitor health data in real time.Further,it can help customers prevent chronic diseases with the enhanced cognitive functions support.The necessity for efficient identity verification in e-health care is even more crucial for cognitive mitigation because we increasingly rely on mIoT systems. 展开更多
关键词 E-health systems joint key authentication mutual authentication
下载PDF
Key Points of the Initial Actions for the Implementation of the Joint Statement
2
《Beijing Review》 2007年第9期14-15,共2页
I. The parties held serious and productive discussions onthe actions each party will take in the initial phase for theimplementation of the Joint Statement of September 19,2005. The parties reaffirmed their common goa... I. The parties held serious and productive discussions onthe actions each party will take in the initial phase for theimplementation of the Joint Statement of September 19,2005. The parties reaffirmed their common goal and will 展开更多
关键词 In key Points of the Initial Actions for the Implementation of the joint Statement
原文传递
A computer vision-approach for activity recognition and residential monitoring of elderly people
3
作者 Sudhir Gaikwad Shripad Bhatlawande +1 位作者 Swati Shilaskar Anjali Solanke 《Medicine in Novel Technology and Devices》 2023年第4期114-122,共9页
In this study,we explore a human activity recognition(HAR)system using computer vision for assisted living systems(ALS).Most existing HAR systems are implemented using wired or wireless sensor networks.These systems h... In this study,we explore a human activity recognition(HAR)system using computer vision for assisted living systems(ALS).Most existing HAR systems are implemented using wired or wireless sensor networks.These systems have limitations such as cost,power issues,weight,and the inability of the elderly to wear and carry them comfortably.These issues could be overcome by a computer vision based HAR system.But such systems require a highly memory-consuming image dataset.Training such a dataset takes a long time.The proposed computervision-based system overcomes the shortcomings of existing systems.The authors have used key-joint angles,distances between the key joints,and slopes between the key joints to create a numerical dataset instead of an image dataset.All these parameters in the dataset are recorded via real-time event simulation.The data set has 780,000 calculated feature values from 20,000 images.This dataset is used to train and detect five different human postures.These are sitting,standing,walking,lying,and falling.The implementation encompasses four distinct algorithms:the decision tree(DT),random forest(RF),support vector machine(SVM),and an ensemble approach.Remarkably,the ensemble technique exhibited exceptional performance metrics with 99%accuracy,98%precision,97%recall,and an F1 score of 99%. 展开更多
关键词 Assisted living systems Human activity recognition Fall detection key joint angle Landmarks
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部