Neural Cryptography with Fog Computing Network for Health Monitoring Using IoMT

نویسندگان

چکیده

Sleep apnea syndrome (SAS) is a breathing disorder while person asleep. The traditional method for examining SAS Polysomnography (PSG). standard procedure of PSG requires complete overnight observation in laboratory. typically provides accurate results, but it expensive and time consuming. However, people with (SA), available beds laboratories are limited. Resultantly, may produce inaccurate diagnosis. Thus, this paper proposes the Internet Medical Things (IoMT) framework machine learning concept fully connected neural network (FCNN) k-nearest neighbor (k-NN) classifier. This describes smart monitoring patient’s sleeping habit diagnosis SA using FCNN-KNN+ average square error (ASE). For diagnosing SA, Oxygen saturation (SpO2) sensor device popularly used heart rate blood oxygen level. information securely stored IoMT fog computing network. Doctors can carefully monitor patient remotely on basis values, which efficiently proposed technique takes less than 0.2 s an accuracy 95%, higher existing models.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fog Forecasting Using Self Growing Neural Network

This paper proposes a method to solve problem that comes with imbalanced training sets which is often seen in the practical applications. We modi ed Self Growing Neural Network CombNET-II to deal with the imbalanced condition. This model is then applied to practical application which was launched in '99 Fog Forecasting Contest sponsored by Neurocomputing Technical Group of IEICE, Japan. In this...

متن کامل

Cryptography Using Chaotic Neural Network

The goal of any cryptographic system is the exchange of information among the intended users without any leakage of information to others who may have unauthorized access to it. In 1976, Diffie and Hellmann found that a common secret key could be created over public channel accessible to any opponent. Since then many public key cryptography have been presented which are based on number theory a...

متن کامل

Fog Computing: Comprehensive Approach for Security Data Theft Attack Using Elliptic Curve Cryptography and Decoy Technology

Fog computing extends cloud computing, provides the services like data, compute, storage and application to end user. It improves the quality of service and also reduces latency. According to Cisco, due to its wide geographical distribution, the Fog computing is well suited for real time analytics and big data. This article, by exploitation advantages of Fog computing Paradigm, analyzes its app...

متن کامل

Neural Network Based Cryptography

In this paper, neural network based cryptology is performed. The system consists of two stages. In the first stage, neural network-based pseudo-random numbers (NPRNGs) are generated and the results are tested for randomness using National Institute of Standard Technology (NIST) randomness tests. In the second stage, a neural network-based cryptosystem is designed using NPRNGs. In this cryptosys...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer systems science and engineering

سال: 2023

ISSN: ['0267-6192']

DOI: https://doi.org/10.32604/csse.2023.024605