Aqeel A. Yaseen
YOU?
Author Swipe
View article: An Efficient EHR Secure Exchange Among Healthcare Servers Using Light Weight Scheme
An Efficient EHR Secure Exchange Among Healthcare Servers Using Light Weight Scheme Open
This work addresses the critical need for secure and patient-controlled Electronic Health Records (EHR) migration among healthcare hospitals' cloud servers (HHS). The relevant approaches often lack robust access control and leave data vuln…
View article: FOG ENABLED PRIVATE BLOCKCHAIN-BASED IDENTITY AUTHENTICATION SCHEME FOR OIL AND GAS FIELD MONITORING
FOG ENABLED PRIVATE BLOCKCHAIN-BASED IDENTITY AUTHENTICATION SCHEME FOR OIL AND GAS FIELD MONITORING Open
The oil and gas industry remains critical to the global economy, as it contributes to the provision of energy and raw materials. Nonetheless, this sector continued to face clear challenges in operational effectiveness, risk and security. R…
View article: Authentication Healthcare Scheme in WBAN
Authentication Healthcare Scheme in WBAN Open
A wireless body area network (WBAN) connects separate sensors in many places of the human body, such as clothes, under the skin. WBAN can be used in many domains such as health care, sports, and control system. In this paper, a scheme focu…
View article: Design a sturdy and secure authentication scheme capable of early detection of COVID-19 patients using WBANs
Design a sturdy and secure authentication scheme capable of early detection of COVID-19 patients using WBANs Open
COVID-19 was first reported in China Wuhan and rapidly grown up to more than 58 countries based on the World Health Organization (WHO). Well ahead of any health emergency, the health care server has the ability to access these data via aut…
View article: Password authentication scheme based on smart card and QR code
Password authentication scheme based on smart card and QR code Open
As a hopeful computing paradigm, cloud services are obtainable to end users based on pay-as-you-go service. Security is represented one of the vital issues for the extended adoption of cloud computing, with the object of accessing several …
View article: Secure and efficient image retrieval based on global features
Secure and efficient image retrieval based on global features Open
A few years ago, an image retrieval needs have been increased enormously. Therefore, a need for an efficiency and accurate image retrieval scheme has become desired accordingly. In fact, the images require high storage space; for this reas…
View article: Deformation Detection and Classification system for Car parts Products Using Image Processing Algorithms
Deformation Detection and Classification system for Car parts Products Using Image Processing Algorithms Open
Sensitive products deformation marking, and detection projects are becoming more interests in quality control management and widely used in automated industrial sensitive products production. The manual inspection by the workers for the se…