0% found this document useful (0 votes)
144 views8 pages

(IJIT-V6I5P4) :elayaraja P

E-Healthcare promises to be the next big wave in healthcare, so the security is must in this system. The security in the sensor network communication is highly recommended to provide data confidentiality and authentication. Many number of security algorithms are proposed by many authors, among the all security model, the Blockchain technology (BT) with distributed Ledger Plays a maximum security level of E-healthcare system.

Uploaded by

IJITJournals
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
144 views8 pages

(IJIT-V6I5P4) :elayaraja P

E-Healthcare promises to be the next big wave in healthcare, so the security is must in this system. The security in the sensor network communication is highly recommended to provide data confidentiality and authentication. Many number of security algorithms are proposed by many authors, among the all security model, the Blockchain technology (BT) with distributed Ledger Plays a maximum security level of E-healthcare system.

Uploaded by

IJITJournals
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

RESEARCH ARTICLE OPEN ACCESS

Blockchain Technology In E-Healthcare Applications


Elayaraja P
Software Engineer-Chennai

ABSTRACT
E-Healthcare promises to be the next big wave in healthcare, so the security is must in this system. The security in
the sensor network communication is highly recommended to provide data confidentiality and authentication. Many
number of security algorithms are proposed by many authors, among the all security model, the Blockchain
technology (BT) with distributed Ledger Plays a maximum security level of E- healthcare system. After this process
the BT approach applied to secure the sensitive data with different layers function and encryption, decryption
process. Once the health information is secured, the access control process considered to the authentication purpose.
At finally the simulation results are carried out to analyze the performance the E-healthcare data security model, in
terms of throughput, emery and security Level measures.
Keyword: BT with distributed Ledger Plays a maximum security level of E- healthcare.

I. INTRODUCTION
Blockchain Technology (BT) works by storing blockchain was proposed as an access control
information in recording ledgers that are distributed manager of healthcare data [62].
in a decentralized manner across all computing
devices that are part of the blockchain infrastructure II. RELATED WORKS
[1-10].The ledger is stored in a decentralized network
of nodes that are created through cryptographic Blockchain has a range of built-in features, such
processes computed by all miners within the network as distributed ledger, decentralized storage,
[11-20].The inherent characteristics of blockchain authentication, security, and immutability, and has
architecture and design provide properties like moved beyond hype to practical applications in
transparency, robustness, auditability, and security industry sectors [63]. Even with these improvements,
[21-30]. A blockchain can be considered a distributed there are still concerns as blockchain technology has
database that is organized as a list of ordered blocks, its own specific vulnerabilities and issues that need to
where the committed blocks are immutable [31-40]. be addressed, such as mining incentives, mining
Let’s assume a scenario where patients keep their attacks, and key management. a comprehensive
data in any Electronic Health Record (EHR) system classification of blockchain-enabled applications
for preservation and also for further access [41]. across diverse sectors such as supply chain, business,
Patients share their personal data with the doctors and healthcare, IoT, privacy, and data management, and
healthcare organizations with the help of these EHR we establish key themes, trends and emerging areas
systems. System will store the data on blockchain for Storing and running computation on sensitive
when the patient shares her data with the system [41- private healthcare data in cloud are possible by
56]. To ensure the confidentiality of outsourced decentralization which is enabled by peer to peer
EHRs, existing scheme employs a smartphone-based (P2P) network [64-65] leveraging the decentralized
key agreement scheme to establish a secure channel or distributed property, blockchain technology
between the patient and the doctor [57-60]. would use ensures the accountability and integrity. Information
the distributed ledger to allow a person to prove security and privacy are enhanced by the blockchain
he/she exists at a certain time and place, and is technology in which data are encrypted and
verified by a group of individuals through the use of distributed across the entire network [66] It can
the distributed nature of block chain [61].Selecting ensure both information security and privacy while
the exact e-healathcare data, the classifier model simultaneously increasing the trust of the public
used, from the classified data, able to access those sectors. The relevant aspects of the blockchain
records and such access needs to be enforced and technology and we discuss some use cases in the
monitored [10]. Blockchain based access control healthcare area which might be improved by the use
manager for heath data to enhance the of this technology [67-70]. It’s provided the security,
interoperability of this system. Off blockchain anonymity and data integrity without any third-party
mechanism with the involvement of public

ISSN: 2454-5414 www.ijitjournal.org Page 20


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

organization in control of the transactions and, healthcare applications. They cut down on
therefore, it creates interesting research areas. operational inefficiencies. Greater security is also
provided due to their decentralized nature, as well as
III. METHODOLOGY FOR the fact that the ledgers are immutable. Specialized
SECURITY distributed consensus protocols enable databases to
be shared in a peer-to-peer network without the need
Blockchain innovation as an approach to achieve a for all participants to trust each other. Distributing
reliable and user enabled answer for e-Health databases between multiple peers in a trustless
environment. Electronic Health Records (EHRs) are fashion has enabled novel decentralized applications
never made to deal with lifetime records among such as cryptographic currencies.
different organizations, and patients leave their
information dispersed among different institutions. 3.2 E-Healthcare Security analysis Via BT
For secure the healthcare database, basically
classifier, that is Support Vector Machine (SVM) Hyper ledger is considered a permissioned BT, which
utilized to categorize E-healthcare data in sensitive means that only designated parties are allowed access
and non-sensitive data. Enhancing the security of E- to the BT, in contrast to the public blockchain which
healthcare services information, user-based access is open to all. In healthcare, this type of blockchain
control used. The underlying distributed ledger design can be useful as it defines a defined user base
record innovation of Bitcoin is additionally consisting of providers, payers and other affiliated
demonstrated as the Bitcoin square chain, to parties to only be allowed access in the blockchain.
recognize it from other square chain advancements From the classified healthcare data, we are taken
[71-75]. This blockchain technology utilized to sensitive daa to security model, In addition to the
support drug prescriptions and supply chain protocol, additional inclusion and exclusion criteria
management, pregnancy and any risk data were employed based on the significance of the topic
management as well as to support access control, data and the frequency BT, Healthcare, or both were
sharing and managing of an audit trail of medical referenced in the research.
activities Healthcare systems could improve security
Procedure of BT
and reliability of patients' information since patients
would have power over their social insurance BT is a block that records some of the transactions
records. At last, the authorization procedure made in a given amount of time. A block may be
determines which part of information can be confined understood as an individual bank statement. Blocks
to an outer requester upon the security approach. are linked together in chronological order using
hashes so that nobody can tamper with this ledger,
3.1 BT- A Distributed Ledger Technology
while being accessible to everyone. Each block
It’s a distributed database, maintained by a consensus contains the hash of the previous block [18].
protocol run by nodes in a peer-to-peer network. This Therefore, if a person intends to tamper with it, he
consensus protocol replaces a central administrator, must change all the hashes of the blocks before. This
since all peers contribute to maintaining the integrity BT model worked based on Hash function concept, a
of the database. This distribution model consists of single node may announce its conclusion about the
different layer functions that are fabric layer, submitted information. Other nodes in the system just
application layer and networking layer. This all verify it. The miner, which announced the
layers are used for secure communication consensus, conclusion, first, is rewarded after majority of the
public key infrastructure, and database structuring. other nodes verify it as being correct. Since verifying
However, there are concepts for decentralized the result is a computationally inexpensive task, the
governance model that sit in the application layer, process does not take much time. The only way to
and enable network participants to have a say in change the blockchain data is to have more than 51%
future updates to the fabric layer. of computational power, and in that scenario, it is
more logical to mine rather than attack for benefits.
While distributed ledgers allow any peer to create The blockchain is also well suited because it does not
new transactions and read from the shared database, have a single point of failure, which makes it robust.
malicious changes to historical transactions are
spotted by honest peers. Distributed ledgers such as Important Elements in BT
blockchain are exceedingly useful for financial
Distributed Ledger: Sensitive E-healthcare data are
transactions, not only this, its applicable in E-
distributed ledger offers a measure of resilience by

ISSN: 2454-5414 www.ijitjournal.org Page 21


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

limiting the impact of a cyber-security incident IV. RESULT ANALYSIS


experienced by any single node.
Above discussed methodology are implemented in
Hash Functions: This function utilized to the secure MATLAB 2015a with i7 processor and 4GB RAM.
the information in cloud storage systems, it makes it To evaluate the performance this method, E-
difficult to reproduce the data from the hash alone. healthcare data are utilized. The performance
analyzed in terms of Throughput, Energy and
• The proposed data secure approach Encryption & decryption Time.
considers the hash function with three
features given below which needs to be
fulfilled for this examination.
• The previous block hashes can be more than
one if the blockchain is branched and all of
them are appended.
• Basically each block contains the block hash
with previous block hash cash and time
stamp, block version with nonce, and Target
address include the message.

3.3 Access Control Model for E-Healthcare

Control Security Model architecture is based on the


scenario of data interoperability and supports the
security fundamentals of healthcare systems along
with the capability of providing fine grained access
control. It makes use of three different security and
privacy requirements: identification, authentication, Figure 1: Graph for E-Healthcare Data Classifier
and authorization. Identification is not an original
security issue in itself, but its purpose is to identify Figure 1 shows the E-healthcare data classification
users. Thus, it is used to affect the way a user can be accuracy, here our selected classifier Model
authenticated. Better secure the E-health data some compared to the K-Nearest Neighbor (KNN) and
terms are considered that is Naive Bayes (NB) classifier. “X” axis represented the
size of data and “Y” shows the Accuracy level of
E-Healthcare Data owner: Attribute-based access data classification process. For example the database
policy, separating his own particular data into various size is 300 the accuracy of SVM is 89.22%, it’s
parts, encrypting each part by using symmetric compared to the NB, and the difference is 2.5 to 6%,
encryption strategies under various content keys. similarly KNN classifier. From this graph the
classifiers show good to excellent results on data
User: The user is approved to access the data if the classification.
access policy associated with the cipher information
which was characterized by data owner is fulfilled by V. CONCLUSION
data attribute.
This BT concept was originally associated with
Service provider: The SP consists of data servers to digital currency, but many other potential uses for the
control data access, and a data service director to deal technology are emerging, including Integrity
with the attributes of users. applications for healthcare data being transacted
around a large multi-tier network and or archival
Central authority: This is a completely trusted systems. This chapter detail discussed the Security of
gathering that is in charge of entitling, denying, and E-healthcare in ledger distributed system, its get
updating the attributes of users. It produces public better security level, throughput and energy level.
and private parameters for the frameworks and From this study to get the maximum scalability,
stipends the diverse access to users based on their security and performance of E-healthcare security
attributes. process. As using BT cipher encryption it is hard to
break the security by intruder as compare to that of
stream cipher. Nice trade-off between security and
performance will help to put forward good solutions

ISSN: 2454-5414 www.ijitjournal.org Page 22


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

to actual applications. In future optimization [10] Le, D.-N.a, Kumar, R.b, Nguyen, G.N.,
techniques with BT used for healthcare data security Chatterjee, J.M.d, Cloud Computing and
model. Virtualization, DOI: 10.1002/9781119488149, Wiley.

REFERENCE [11] Kumari, J. S., Babu, C. S., Lenine, D., &


Lakshman, J. (2009, December). Improvement of
[1] Chakchai So-In, Tri Gia Nguyen, Gia Nhu static performance of multilevel inverter for single-
Nguyen: Barrier Coverage Deployment Algorithms phase grid connected photovoltaic modules. In 2009
for Mobile Sensor Networks. Journal of Internet Second International Conference on Emerging
Technology 12/2017; 18(7):1689-1699. Trends in Engineering & Technology (pp. 691-697).
IEEE.
[2] Suresh, G., Epsiba, P., & Kumaratharan, N.
(2016). Content based Image Retrieval Based on [12] Senthil Kumar, B. V., Kumar, A., & Suresh,
Curvelet and PCA using HTF. Asian Journal of G. (2016). Functional equations related to spatial
Research in Social Sciences and Humanities, 6(8), filtering in image enhancement. Int. J. Control
2165-2176. Theory Appl, 9(28), 555-564.

[3] Shankar, K., Zhang, Y., Liu, Y., Wu, L., & [13] Shankar, K., Lakshmanaprabu, S. K.,
Chen, C. H. (2020). Hyperparameter tuning deep Khanna, A., Tanwar, S., Rodrigues, J. J., & Roy, N.
learning for diabetic retinopathy fundus image R. (2019). Alzheimer detection using Group Grey
classification. IEEE Access, 8, 118164-118173. Wolf Optimization based features with convolutional
classifier. Computers & Electrical Engineering, 77,
[4] Kumar, M. R., Lenine, D., & Babu, C. S. 230-243.
(2011). A variable switching frequency with boost
power factor correction converter. Telkomnika, 9(1), [14] Epsiba, P., Suresh, G., & Kumaratharan, N.
47. (2020). Edge Detection-Based Depth Analysis Using
TD-WHOG Scheme. In Intelligent Computing in
[5] Lenine, D., Babu, C. S., & Shankaraiah, G. Engineering (pp. 397-407). Springer, Singapore.
(2012). Performance Evaluation of Fuzzy and PI
Controller for Boost Converter with Active PFC. [15] Anand Nayyar, Vikram Puri, Nhu Gia
International Journal of Power Electronics and Drive Nguyen, BioSenHealth 1.0: A Novel Internet of
Systems, 2(4), 445. Medical Things (IoMT) Based Patient Health
Monitoring System, Lecture Notes in Networks and
[6] Kathiresan, S., Sait, A. R. W., Gupta, D., Systems. Springer, 2019
Lakshmanaprabu, S. K., Khanna, A., & Pandey, H.
M. (2020). Automated detection and classification of [16] Kumari, J. Surya, Ch Sai Babu, and Mr D.
fundus diabetic retinopathy images using synergic Lenine. "An Enhancement of Static Performance of
deep learning model. Pattern Recognition Letters. Multilevel Inverter for Single Phase Grid Connected
Photovoltaic modules." International journal of
[7] Ezhilarasu, P., & Krishnaraj, N. (2015). Recent Trends in Engineering, Academy Publishers,
Triple Substring Based Classification for Finland 3.3 (2010): 20-24.
Nondeterministic Finite Automata. IJAER, 10(59),
177-82. [17] Ezhilarasu, P., Krishnaraj, N., & Babu, S. V.
(2015). Applications of finite automata in text search-
[8] Epsiba, P., Kumaratharan, N., & Suresh, G. a review. International Journal of Science,
(2020). A novel discrete CURVELET transform and Engineering and Computer Technology, 5(5), 116.
modified WHOG for video surveillance services.
Concurrency and Computation: Practice and [18] Suresh, G., Epsiba, P., Sivanandam, S. N., &
Experience, 32(4), e5046. Rajaram, M. (2011). Block Based Motion Estimation
using FWS-LMedS Algorithm for Video
[9] Shankar, K., & Elhoseny, M. (2019). Trust Compression. European Journal of Scientific
Based Cluster Head Election of Secure Message Research, 49(4), 533-541.
Transmission in MANET Using Multi Secure
Protocol with TDES. J. UCS, 25(10), 1221-1239. [19] Shankar, K., Lakshmanaprabu, S. K., Gupta,
D., Khanna, A., & de Albuquerque, V. H. C. (2020).
Adaptive optimal multi key based encryption for

ISSN: 2454-5414 www.ijitjournal.org Page 23


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

digital image security. Concurrency and Method. International Journal of Computer and
Computation: Practice and Experience, 32(4), e5122. Network Security, 2(6).

[20] Lenine, D., Babu, C. S., & Kumari, J. S. [29] Lenine, D., Babu, C. S., & Kumari, J. S.
(2010, October). A static improvement of predictive (2010, October). A static improvement of predictive
control for single phase voltage fed power factor control for single phase voltage fed power factor
correction converters. In 2010 International correction converters. In 2010 International
Conference on Advances in Recent Technologies in Conference on Advances in Recent Technologies in
Communication and Computing (pp. 116-120). IEEE. Communication and Computing (pp. 116-120). IEEE.

[21] Shankar, K., Elhoseny, M., Kumar, R. S., [30] Van, V.N., Chi, L.M., Long, N.Q., Nguyen,
Lakshmanaprabu, S. K., & Yuan, X. (2020). Secret G.N., Le, D.-N, A performance analysis of openstack
image sharing scheme with encrypted shadow images open-source solution for IaaS cloud computing,
using optimal homomorphic encryption technique. Advances in Intelligent Systems and Computing,
Journal of Ambient Intelligence and Humanized 380, pp. 141-150.
Computing, 11(5), 1821-1833.
[31] Suresh, G., Epsiba, P., Rajaram, M., &
[22] Reddy, J. N., Lenine, D., & Kumar, M. V. Sivanandam, S. N. (2010, July). A low complex
(2018). Experimental Study of Seven Level Magnetic scalable spatial adjacency ACC-DCT based video
Coupled Impedance Source Inverter. compression method. In 2010 Second International
conference on Computing, Communication and
[23] Suresh, G. (2009). IMAGE AND VIDEO Networking Technologies (pp. 1-6). IEEE.
CODING WITH A NEW WASH TREE
ALGORITHM FOR MULTIMEDIA SERVICES 1. [32] Nieto, Y., García-Díaz, V., Montenegro, C.,
& Crespo, R. G. (2019). Supporting academic
[24] Shankar, K., Elhoseny, M., Chelvi, E. D., decision making at higher educational institutions
Lakshmanaprabu, S. K., & Wu, W. (2018). An using machine learning-based algorithms. Soft
efficient optimal key based chaos function for Computing, 23(12), 4145-4153.
medical image security. IEEE Access, 6, 77145-
77154. [33] Shankar, K., Elhoseny, M.,
Lakshmanaprabu, S. K., Ilayaraja, M., Vidhyavathi,
[25] EPSIBA, P., SUBATHRA, S., SARDAR R. M., Elsoud, M. A., & Alkhambashi, M. (2020).
BASHA, N., SURESH, G., & KUMARATHARAN, Optimal feature level fusion based ANFIS classifier
N. (2013). METADATA BASED HIGH QUALITY for brain MRI image classification.
IMAGE/VIDEO STREAMING USING CURVELET CONCURRENCY AND COMPUTATION-
TRANSFORM. Journal of Theoretical & Applied PRACTICE & EXPERIENCE, 32(1).
Information Technology, 57(2).
[34] Dey, N., Ashour, A.S., Chakraborty, S., Le,
[26] Lopez-Martinez, F., Schwarcz, A., Núñez- D.-N., Nguyen, G.N, Healthy and unhealthy rat
Valdez, E. R., & Garcia-Diaz, V. (2018). Machine hippocampus cells classification: A neural based
learning classification analysis for a hypertensive automated system for Alzheimer disease
population as a function of several risk factors. classification, Journal of Advanced Microscopy
Expert Systems with Applications, 110, 206-215. Research, 11(1), pp. 1-10
[27] Ezhilarasu, P., Prakash, J., Krishnaraj, N., [35] Rubini, L. Jerlin, and Eswaran Perumal.
Satheesh Kumar, D., Sudhakar, K., & Parthasarathy, "Hybrid Kernel Support Vector Machine Classifier
C. (2014). A Novel Approach to Classify and Grey Wolf Optimization Algorithm Based
Nondeterministic Finite Automata Based on More Intelligent Classification Algorithm for Chronic
than Two Loops and its Position. SSRG International Kidney Disease." Journal of Medical Imaging and
Journal of Computer Science and Engineering Health Informatics 10.10 (2020): 2297-2307.
(SSRG-IJCSE), 1(10), 46-49.
[36] Sreenivas, M. B. S., Babu, C. S., & Lenine,
[28] Suresh, G., Epsiba, P., Rajaram, D. M., & M. D. (2012). Design and Analysis of Predictive
Sivanandam, D. S. (2010). Scalable ACC-DCT control using PI controller for Boost Converter with
Based Video Compression Using Up/Down Sampling Active Power Factor Correction. International

ISSN: 2454-5414 www.ijitjournal.org Page 24


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

Journal of Emerging Technology and Advanced [46] Rao, S. K., Lenine, D., & Sujatha, P. (2020).
Engineering, 2(6). Constant Current Analysis of Shell Type Transformer
at Different Temperatures of Core by Using
[37] Krishnaraj, N., Ezhilarasu, P., Karthik, S., & Quickfield Software. In Emerging Trends in
Prabhakar, M. (2016). J,” Enhancing Security in Electrical, Communications, and Information
Mobile Devices through Multimodal biometrics”. Technologies (pp. 175-184). Springer, Singapore.
Middle-East Journal of Scientific Research, 23(8),
1598-1603. [47] Le Nguyen Bao, Dac-Nhuong Le, Gia Nhu
Nguyen, Vikrant Bhateja, Suresh Chandra Satapathy
[38] Shankar, K., Lakshmanaprabu, S. K., Gupta, (2017), Optimizing Feature Selection in Video-based
D., Maseleno, A., & De Albuquerque, V. H. C. Recognition using Max-Min Ant System for the
(2020). Optimal feature-based multi-kernel SVM Online Video Contextual Advertisement User-
approach for thyroid disease classification. The Oriented System, Journal of Computational Science,
Journal of Supercomputing, 76(2), 1128-1143. Elsevier ISSN: 1877-7503. Vol.21, pp.361-370.
[39] Suresh, G., Epsiba, P., Rajaram, M., & [48] Arulanthu, P., & Perumal, E. (2020). An
Sivanandam, S. N. (2010). An improved low intelligent IoT with cloud centric medical decision
complex spatially scalable ACC-DCT based video support system for chronic kidney disease prediction.
compression method. IJCSE) International Journal on International Journal of Imaging Systems and
Computer Science and Engineering, 2(03). Technology.
[40] Lambert, J. R., Arulanthu, P., & Perumal, E. [49] Shankar, K., & Eswaran, P. (2016). RGB-
Identification of Nominal Attributes for Intelligent based secure share creation in visual cryptography
Classification of Chronic Kidney Disease using using optimal elliptic curve cryptography technique.
Optimization Algorithm. Journal of Circuits, Systems and Computers, 25(11),
1650138.
[41] Bhateja, V., Gautam, A., Tiwari, A., Nhu,
N.G., Le, D.-N, Haralick features-based classification [50] Ezhilarasu, P., & Krishnaraj, N. (2015).
of mammograms using SVM, Advances in Intelligent Double Substring based Classification for
Systems and Computing, Volume 672, 2018, Pages Nondeterministic Finite Automata. Indian Journal Of
787-795. Science And Technology, 8, 26.
[42] López-Martínez, F., Núñez-Valdez, E. R., [51] Velu, K., Arulanthu, P., & Perumal, E.
Gomez, J. L., & García-Díaz, V. (2019). A neural (2019, October). Energy Reduction Stratagem in
network approach to predict early neonatal sepsis. Smart Homes Using Association Rule Mining. In
Computers & Electrical Engineering, 76, 379-388. International Conference on Innovative Data
Communication Technologies and Application (pp.
[43] Lenine, D., & Bau, S. (2009). Comparison 188-193). Springer, Cham.
between variable switching frequency and timer
controller with constant switching frequency [52] Núñez-Valdez, E. R., García-Díaz, V.,
techniques for PFC converters. International Journal Lovelle, J. M. C., Achaerandio, Y. S., & González-
of Computer and Electrical Engineering, 1(2), 183- Crespo, R. (2017). A model-driven approach to
187. generate and deploy videogames on multiple
platforms. Journal of Ambient Intelligence and
[44] Shankar, K., & Eswaran, P. (2017). RGB Humanized Computing, 8(3), 435-447.
based multiple share creation in visual cryptography
with aid of elliptic curve cryptography. China [53] Huyen, D.T.T., Binh, N.T., Tuan, T.M.,
Communications, 14(2), 118-130. Nguyen, G.N, Dey, N., Son, L.H, Analyzing trends in
hospital-cost payments of patients using ARIMA and
[45] Ezhilarasu, P., Thirunavukkarasu, E., GIS: Case study at the Hanoi Medical University
Karuppusami, G., & Krishnaraj, N. (2015). Single Hospital, Vietnam, Journal of Medical Imaging and
substring based classification for nondeterministic Health Informatics, 7(2), pp. 421-429.
finite automata. International Journal on Applications
in Information and Communication Engineering, [54] Uthayakumar, J., Elhoseny, M., & Shankar,
1(10), 29-31. K. (2020). Highly Reliable and Low-Complexity
Image Compression Scheme Using Neighborhood

ISSN: 2454-5414 www.ijitjournal.org Page 25


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

Correlation Sequence Algorithm in WSN. IEEE Vol.29(12), pp 1517–1533, Springer, ISSN: 0941-
Transactions on Reliability. 0643.

[55] Jiménez, A. C., García-Díaz, V., & Bolaños, [65] Tolosa, J. B., Sanjuán‐Martínez, O.,
S. (2018). A decentralized framework for multi-agent García‐Díaz, V., G‐Bustelo, B. C. P., & Lovelle, J.
robotic systems. Sensors, 18(2), 417. M. C. (2011). Towards the systematic measurement
of ATL transformation models. Software: Practice
[56] Elhoseny, M., & Shankar, K. (2019). and Experience, 41(7), 789-815.
Reliable data transmission model for mobile ad hoc
network using signcryption technique. IEEE [66] Raj, R. J. S., Shobana, S. J., Pustokhina, I.
Transactions on Reliability. V., Pustokhin, D. A., Gupta, D., & Shankar, K.
(2020). Optimal Feature Selection-Based Medical
[57] Krishnaraj, N., Kumar, P., & Bhagavan, S. Image Classification Using Deep Learning Model in
K. (2018). Conceptual Semantic Model for Web Internet of Medical Things. IEEE Access, 8, 58006-
Document Clustering Using Term Frequency. EAI 58017.
Endorsed Transactions on Energy Web, 5(20).
[67] García-Díaz, V., Espada, J. P., Crespo, R.
[58] Jerlin Rubini, L., & Perumal, E. (2020). G., G-Bustelo, B. C. P., & Lovelle, J. M. C. (2018).
Efficient classification of chronic kidney disease by An approach to improve the accuracy of probabilistic
using multi‐kernel support vector machine and fruit classifiers for decision support systems in sentiment
fly optimization algorithm. International Journal of analysis. Applied Soft Computing, 67, 822-833.
Imaging Systems and Technology, 30(3), 660-673.
[68] Mohanty, S. N., Ramya, K. C., Rani, S. S.,
[59] Elhoseny, M., Shankar, K., & Uthayakumar, Gupta, D., Shankar, K., Lakshmanaprabu, S. K., &
J. (2019). Intelligent diagnostic prediction and Khanna, A. (2020). An efficient Lightweight
classification system for chronic kidney disease. integrated Blockchain (ELIB) model for IoT security
Scientific reports, 9(1), 1-14. and privacy. Future Generation Computer Systems,
102, 1027-1037.
[60] Elhoseny, M., Selim, M. M., & Shankar, K.
(2020). Optimal Deep Learning based Convolution [69] Krishnaraj, N., Ezhilarasu, P., & Gao, X. Z.
Neural Network for digital forensics Face Sketch Hybrid Soft Computing Approach for Prediction of
Synthesis in internet of things (IoT). International Cancer in Colon Using Microarray Gene Data.
Journal of Machine Learning and Cybernetics, 1-12. Current Signal Transduction Therapy, 11(2).
[61] Krishnaraj, N., Kavitha, M. G., Jayasankar, [70] Cueva-Fernandez, G., Espada, J. P., García-
T., & Kumar, K. V. A Glove Based Approach to Díaz, V., García, C. G., & Garcia-Fernandez, N.
Recognize Indian Sign Languages. (2014). Vitruvius: An expert system for vehicle
sensor tracking and managing application generation.
[62] Montenegro-Marin, C. E., Cueva-Lovelle, J. Journal of network and computer applications, 42,
M., Sanjuán-Martínez, O., & García-Díaz, V. (2012). 178-188.
Domain specific language for the generation of
learning management systems modules. Journal of [71] Anand Nayyar, Vikram Puri, Nhu Gia
Web Engineering, 11(1), 23. Nguyen, Dac Nhuong Le, Smart Surveillance Robot
for the Real Time Monitoring and Control System in
[63] Pustokhina, I. V., Pustokhin, D. A., Gupta, Environment and Industrial Applications, Advances
D., Khanna, A., Shankar, K., & Nguyen, G. N. in Intelligent System and Computing, pp 229-243,
(2020). An effective training scheme for deep neural Springer
network in edge computing enabled Internet of
medical things (IoMT) systems. IEEE Access, 8, [72] Sankhwar, S., Gupta, D., Ramya, K. C.,
107112-107123. Rani, S. S., Shankar, K., & Lakshmanaprabu, S. K.
(2020). Improved grey wolf optimization-based
[64] Amira S. Ashour, Samsad Beagum, Nilanjan feature subset selection with fuzzy neural classifier
Dey, Ahmed S. Ashour, Dimitra Sifaki Pistolla, Gia for financial crisis prediction. Soft Computing, 24(1),
Nhu Nguyen, Dac-Nhuong Le, Fuqian Shi (2018), 101-110.
Light Microscopy Image De-noising using Optimized
LPA-ICI Filter, Neural Computing and Applications,

ISSN: 2454-5414 www.ijitjournal.org Page 26


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

[73] García-Díaz, V., Fernández-Fernández, H.,


Palacios-González, E., G-Bustelo, B. C. P., Sanjuán-
Martínez, O., & Lovelle, J. M. C. (2010). Talisman
mde: Mixing MDE principles. Journal of Systems
and Software, 83(7), 1179-1191.

[74] Le Nguyen, B., Lydia, E. L., Elhoseny, M.,


Pustokhina, I., Pustokhin, D. A., Selim, M. M., ... &
Shankar, K. (2020). Privacy Preserving Blockchain
Technique to Achieve Secure and Reliable Sharing of
IoT Data. CMC-COMPUTERS MATERIALS &
CONTINUA, 65(1), 87-107.

[75] Ezhilarasu, P., & Krishnaraj, N. (2015).


Applications of Finite Automata in Lexical Analysis
and as a Ticket Vending Machine–A Review. Int. J.
Comput. Sci. Eng. Technol, 6(05), 267-270.

ISSN: 2454-5414 www.ijitjournal.org Page 27

You might also like