Download full-text PDF

Source

Publication Analysis

Top Keywords

preventing unauthorized
4
unauthorized recording
4
recording practice
4
preventing
1
recording
1
practice
1

Similar Publications

The healthcare industry, aided by technology, leverages the Internet of Things (IoT) paradigm to offer patient/user-related services that are ubiquitous and personalized. The authorized repository stores ubiquitous data for which access-level securities are granted. These security measures ensure that only authorized entities can access patient/user health information, preventing unauthorized entries and data downloads.

View Article and Find Full Text PDF

Conventional petroleum markers used to prevent fuel smuggling and unauthorized mixing often involve complex dye synthesis and require inconvenient two-phase liquid-liquid extraction for detection. In this work, we developed two azo dyes (AzoHc, diAzoHc) and two xanthene dyes (FHc, RHc) based on hydrogenated cardanol (Hc). The dyes were synthesized in 50-70 % yields via one or two reaction steps.

View Article and Find Full Text PDF

Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements.

ACS Omega

February 2025

Department of Environmental Toxicology, The Institute for Forensic Science, Texas Tech University, 1207 Gilbert Drive, Lubbock, Texas 79416, United States.

Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This straightforward immune-system-based construct has shown that data obtained from immunoassay interactions may be utilized to create symmetrical key ciphers. The Advanced Encryption Standard (AES), the current standard method to encrypt and decrypt data, was implemented to show that biomolecules from immune systems can be applied to cryptography for security enhancements.

View Article and Find Full Text PDF

A comparative study on serum lipid levels in patients with thyroid dysfunction: a single-center experience in Ethiopia.

BMC Endocr Disord

February 2025

School of Medical Laboratory Sciences, College of Health Sciences and Medicine, Wolaita Sodo University, Wolaita Sodo, Ethiopia.

Background: Thyroid diseases are the most common endocrine disorders worldwide. Thyroid hormones are essential for lipid synthesis, metabolism, and mobilization. Lipid levels in the blood may be altered when there is thyroid dysfunction.

View Article and Find Full Text PDF

The Internet of Things (IoT) connects various medical devices that enable remote monitoring, which can improve patient outcomes and help healthcare providers deliver precise diagnoses and better service to patients. However, IoT-based healthcare management systems face significant challenges in data security, such as maintaining a triad of confidentiality, integrity, and availability (CIA) and securing data transmission. This paper proposes a novel AdaBoost support vector machine (ASVM) based on the grey wolf optimization and international data encryption algorithm (ASVM-based GWO-IDEA) to secure medical data in an IoT-enabled healthcare system.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!