The healthcare technologies in COVID-19 pandemic had grown immensely in various domains. Blockchain technology is one such turnkey technology, which is transforming the data securely; to store electronic health records (EHRs), develop deep learning algorithms, access the data, process the data between physicians and patients to access the EHRs in the form of distributed ledgers. Blockchain technology is also made to supply the data in the cloud and contact the huge amount of healthcare data, which is difficult and complex to process. As the complexity in the analysis of data is increasing day by day, it has become essential to minimize the risk of data complexity. This paper supports deep neural network (DNN) analysis in healthcare and COVID-19 pandemic and gives the smart contract procedure, to identify the feature extracted data (FED) from the existing data. At the same time, the innovation will be useful to analyse future diseases. The proposed method also analyze the existing diseases which had been reported and it is extremely useful to guide physicians in providing appropriate treatment and save lives. To achieve this, the massive data is integrated using Python scripting language under various libraries to perform a wide range of medical and healthcare functions to infer knowledge that assists in the diagnosis of major diseases such as heart disease, blood cancer, gastric and COVID-19.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8420355PMC
http://dx.doi.org/10.1111/exsy.12778DOI Listing

Publication Analysis

Top Keywords

blockchain technology
12
data
11
healthcare covid-19
8
extracted data
8
covid-19 pandemic
8
healthcare
5
technology dnn
4
dnn token-based
4
token-based approach
4
approach healthcare
4

Similar Publications

A digital twin is a virtual model of a real-world system that updates in real-time. In healthcare, digital twins are gaining popularity for monitoring activities like diet, physical activity, and sleep. However, their application in predicting serious conditions such as heart attacks, brain strokes and cancers remains under investigation, with current research showing limited accuracy in such predictions.

View Article and Find Full Text PDF

Interest in supporting Federated Learning (FL) using blockchains has grown significantly in recent years. However, restricting access to the trained models only to actively participating nodes remains a challenge even today. To address this concern, we propose a methodology that incentivizes model parameter sharing in an FL setup under Local Differential Privacy (LDP).

View Article and Find Full Text PDF

Secure IoT data dissemination with blockchain and transfer learning techniques.

Sci Rep

January 2025

Torrens University Australia, Fortitude Valley, QLD 4006, Leaders Institute, 76 Park Road, Woolloongabba, QLD 4102, Brisbane, Queensland, Australia.

Article Synopsis
  • Streaming IoT data is crucial for building trust in sustainable IoT solutions, but current systems often face issues with reliability, security, and transparency due to their centralized structures.
  • The research introduces TraVel, a framework that uses blockchain and transfer learning to improve the security of IoT data management, utilizing decentralized IPFS for data storage and a private Ethereum blockchain for enhanced data integrity.
  • TraVel implements self-executing smart contracts for access control and uses an adversarial domain adaptation model to filter out malicious data, ensuring only validated data is stored, with successful performance shown in simulations.
View Article and Find Full Text PDF

Cybersecurity Solutions for Industrial Internet of Things-Edge Computing Integration: Challenges, Threats, and Future Directions.

Sensors (Basel)

January 2025

Department of Computer Science and Engineering, Yanbu Industrial College, Royal Commission for Jubail and Yanbu, Yanbu Industrial City 41912, Saudi Arabia.

This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT-edge computing). We systematically collected and analyzed the relevant literature from the past five years, applying a rigorous methodology to identify key sources. Our study highlights the prevalent IIoT layer attacks, common intrusion methods, and critical threats facing IIoT-edge computing environments.

View Article and Find Full Text PDF

With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management. However, this also poses challenges related to data privacy breaches and holdership threats. Typically, blockchain technology and cloud storage provide effective solutions.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!