Cargando…
ICT-Guided Glycemic Information Sharing Through Artificial Neural Telecare Network
The revolutionary and retrospective changes in the use of ICT have propelled the introduction of telecare health services in the crucial corona virus pandemic times. There have been revolutionary changes that happened with the advent of this novel corona virus. The proposed technique is based on sec...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer Singapore
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8381865/ https://www.ncbi.nlm.nih.gov/pubmed/34458859 http://dx.doi.org/10.1007/s42979-021-00818-y |
Sumario: | The revolutionary and retrospective changes in the use of ICT have propelled the introduction of telecare health services in the crucial corona virus pandemic times. There have been revolutionary changes that happened with the advent of this novel corona virus. The proposed technique is based on secured glycemic information sharing between the server and users using artificial neural computational learning suite. Using symmetric Tree Parity Machines (TPMs) at the server and user ends, salp swarm-based session key has been generated for the proposed glycemic information modular encryption. The added taste of this paper is that without exchanging the entire session key, both TPMs will get full synchronized in terms of their weight vectors. With rise in the intake of highly rated Glycemic Indexed (GI) foods in today’s COVID-19 lockdown lifestyle, it contributes a lot in the formation of cavities inside the periodontium, and several other diseases likes of COPD, Type I and Type II DM. GI-based food pyramid depicts the merit of the food in the top to bottom spread up approach. High GI food items helps in more co-morbid diseases in patients. It is recommended to have foods from the lower radars of the food pyramid. The proposed encryption with salp swarm-generated key has been more resistant to Man-In-The-Middle attacks. Different mathematical tests were carried on this proposed technique. The outcomes of those tests have proved its efficacy, an acceptance of the proposed technique. The total cryptographic time observed on four GI modules was 0.956 ms, 0.468 ms, 0.643 ms, and 0.771 ms. |
---|