Search Results

Results (4)

Search Parameters:

Keyword: e-Health
Order results
Results per page
Open AccessArticle
9 Pages, 1,012 KB Download PDF

Using Leader Election and Blockchain in E-Health

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 46–54, 2020; DOI: 10.25046/aj050307
Abstract:

The development of electronic healthcare systems requires to adopt modern technologies and architectures. The use of Electronic Personal Health Record (E-PHR) should be supported by efficient storage such as cloud storage which enables more security, availability and accessibility of patients’ records. Actually, the increase of availability of E-PHR enhances parallel access, which improves the performance…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Biotechnology & Applied Microbiology (BAM))
Open AccessArticle
7 Pages, 883 KB Download PDF

Automatic Service Orchestration for e-Health Application

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 244–250, 2019; DOI: 10.25046/aj040430
Abstract:

This paper describes an architectural approach to the development of dynamic service-oriented systems for e-Health using the service orchestration mechanism and semantic technologies. The main idea is the dynamic synthesis of the complex functionality required by user or by software agent. This idea should help to build and easily extend the applied loose-coupled systems without…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 3,409 KB Download PDF

Detecting CTC Attack in IoMT Communications using Deep Learning Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 130–138, 2023; DOI: 10.25046/aj080215
Abstract:

Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
6 Pages, 838 KB Download PDF

An Integrated & Secure System for Wearable Devices

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 432–437, 2018; DOI: 10.25046/aj030651
Abstract:

Health services are under increasing pressure to reduce large waiting times for appointments. The delayed diagnosis of a human illnesses could have profound consequences for the patient. The large waiting times may be attributed to lack of data, the accuracy of the data or the timeliness of the availability of the data. In addition to…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026