0% found this document useful (0 votes)
30 views7 pages

Blockchain Enabled Intelligent Surveillance System Model With AI and IoT

Author N.Balaraman

Uploaded by

bala raman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views7 pages

Blockchain Enabled Intelligent Surveillance System Model With AI and IoT

Author N.Balaraman

Uploaded by

bala raman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Blockchain Enabled Intelligent Surveillance

2023 Eighth International Conference on Science Technology Engineering and Mathematics (ICONSTEM) | 979-8-3503-4779-1/23/$31.00 ©2023 IEEE | DOI: 10.1109/ICONSTEM56934.2023.10142303

System Model with AI and IoT


Mr.K.Sathyaseelan1, Tushar vyas2, Ravikiran Madala3, Dr.Vijaya Chamundeeswari4, Himanshu Rai Goyal5 and
Raja Jayaraman6
1
Assistant Professor, Department of Information Technology, Mahendra Institute of Technology (Autonomous), Mallasamudaram,
2
Assistant Professor, Department of Computer Science and Engineering, JECRC University, Jaipur, Rajasthan, India
3
Network and Data Center Engineer, Ph.D Information Technology, University of Cumberlands, Durham, North Carolina,
United States,
4
Professor& Dean, Department of Computer Science and Engineering, Saveetha Engineering College, Chennai, Tamil Nadu
5
Associate Professor, Department of Computer Science Engineering, Graphic Era Deemed to be University, Dehradun,
Uttrakhand, India
6
Assistant Professor, Department of Computer Science and Engineering, St.Martin’s Engineering College, Secunderabad

E-mail : [email protected] [email protected] [email protected]


[email protected] [email protected] [email protected]

Abstract- — In the New Year, Internet of Things (IoT) offices. Clinical practitioners may have the option to
is industrializing in a few certifiable applications, for identify broad-ranging, potentially harmful faults
example, clever transportation, brilliant city to make with more noteworthy precision by utilising
human existence reliable. Extreme amounts of blockchain technology. According to the experts,
detecting information are being delivered from
these areas can be generally improved in order to
various sensors devices in the Modern IoT as a result
of the growing industrialization of IoT. Understanding increase the effectiveness, security, and
the constraints of flow innovations and the potential responsiveness of clinical information exchange in
for future exploration techniques is necessary to the the healthcare system. Because of the usage of this
establishment of a secure and dependable information creative process, clinical foundations may learn
environment. A dishonest individual can connect with about and improve their evaluation of clinical
a trusted person through the blockchain, a information. Clinical preliminary extortion can only
decentralized digital ledger that tracks the be identified and prevented by the implementation of
conversation from start to finish. This report urges the blockchain innovation. Blockchain technology may
medical care industry to deploy blockchain- also help the medical services sector improve its
coordinated digital protection in order to preserve
information literacy. It is possible that concerns
clinically relevant things in light of the use of artificial
intelligence in clinical settings. Applications based on about information deterioration in the medical
blockchain may be able to precisely pinpoint the most services sector might be reduced, provided that a
serious, potentially dangerous mistakes in the medical unique information capacity design is applied in
sector. Blockchain-based decentralized information accordance with the highest level of security.
insurance safeguards patient health records from data
theft. It increases the number of information access
techniques that are accessible as well as their
Keywords:Blockchain, Enabled Intelligent, Surveillance association, accountability, and verification. It is
System Model, AI, IOT
crucial to regularly and always ensure the
classification and security of health data for a variety
I.INTRODUCTION of reasons. By utilising blockchain technology,
medical services associations could benefit from the
Blockchain technology is a ground-breaking
decentralized information security that the
innovation that, among other things, is being utilized
technology manages the cost of while also avoiding
to promote effective solutions in a variety of fields,
some of the risks related to blockchain technology.
including the field of healthcare. Through the use of
On the other hand, the review's important purpose
a Blockchain organisation, patient information is
was to create a cure for the security and interruption
being preserved and transmitted throughout the
problems that had been uncovered all through its
medical services sector, including clinics,
investigation. To achieve the optimal result, a
symptomatic labs, pharmacy stores, and doctors'

Authorized licensed use limited to: IEEE - Sales. Downloaded on August 17,2023 at 04:49:57 UTC from IEEE Xplore. Restrictions apply.
blockchain-based Internet of Things perspective is applications were studied by researchers Fernandez-
now being created. By using a biosensor, it is Carames and Fraga-Lamas. A study by Bodkhe et al.
possible to gradually determine and gather clinical focuses on the development of blockchain
information about a patient, and then to use this arrangements and their usefulness for many
method to save the information on a shared record intelligent applications, especially in Industry 4.0.
(blockchain). The researchers claim that their Xu et al. proposed a blockchain-based method for
biosensor-enabled technique is more precise and electric vehicle charging. The proposed method used
time-effective than other currently accessible blockchain technology to create a secure framework
advancements at recording and sealing information for electric vehicles and eliminate third-party
storing. intermediaries.

For various health regulators, the combination of A comprehensive analysis of the merger of
blockchain and artificial intelligence (AI) could be blockchain technology and IoT was provided by
beneficial, with remote body region organizations Atlam et al. The advantages and multiple advantages
(WBANs) playing an important role. from an IoT of blockchain technology for various IoT
perspective. With the increasing use of network and applications are also highlighted by the designers.
cloud governance as well as IoT, decentralized Rahman et al. proposed a blockchain technique to
methods of trust control are gaining popularity. Due maintain support for security and privacy-focused
to its ability to create a distributed record, the smart agreements for the IoT-enabled beneficial
research community pays great attention to the market in smart city applications.
development of blockchains in several application
areas. a This connected phone network is expected Tahir et al. proposed a blockchain-enabled,
to generate and access huge amounts of data, which probabilistic model-based IoT system for
will increase the potential for innovative applications authentication and approval in medical service
while also presenting important security and applications. Blockchain and IoT are used in Abbas
protection issues will hinder further adoption and et alproposed .'s decentralised information control
growth of this network. It is reasonable to assume plan for intelligent and secure transport to overcome
that the number of devices connected to the Internet difficulties with information adequacy. To
will increase steadily over the coming years as the investigate the attacks, they concentrated on a
cost of devices with maintenance and organizational number of widely used methods, including support
functions declines. vector machines, packing, grouping, and deep
learning-based computations.
II.LITERATURE REVIEW
Gill and colleagues studied how prospective
Hamid et al. published a groundbreaking analysis of distributed computing systems might be affected by
blockchain innovation in Industry 4.0 applications. emerging paradigms like IoT, blockchain, and
The creator survey focused on critical blockchain artificial intelligence. They also recognize a number
applications, security, protection claims, and related of innovative inventions and invite experts to assess
attacks with reasonable answers. To further improve the situation and identify emerging trends. They also
security highlights, they organized and examined propose a well-thought-out strategy for the cloud
various security and protection strategies used in future to examine the impact of paradigm and
Industrial 4.0 applications. technology shifts on the evolution of distributed
computing. Several authors offered a thorough
The projected significance of integrating blockchain analysis of the use of AI for creating imaginative
into actual cyber-physical systems was examined by blockchain applications that are less susceptible to
Lee et al. The three-layer blockchain design was threats.
designed by the designers in order to illustrate how
next-generation manufacturing processes will use We identified some limitations in the existing work
blockchain innovation for current analytics. after a brief review of related overview publications
and other material. For example, experts typically
The advantages and disadvantages of employing focused solely on security and protection issues. A
blockchain and cunning contracts for Industrial 4.0 few studies were conducted with the sole purpose of
examining and illuminating the various aspects and

Authorized licensed use limited to: IEEE - Sales. Downloaded on August 17,2023 at 04:49:57 UTC from IEEE Xplore. Restrictions apply.
features of blockchain in contemporary settings. 𝑰𝑫𝒂,𝒃 = 𝑬𝑫𝒔 (𝑬, 𝑲) → 𝑫𝒕(𝑫𝒂 𝑲, 𝑲𝒂, 𝑲𝒃 )
Although few of them actually achieved so, their
primary focus was on offering an extensive guide for The location of the interruption has been. Here, data
Industry 4.0 and on the uses of the more secure a, b protected from interrupt detection ID is
blockchain. Additionally, other evaluations displayed while ED encrypted data is displayed in a
concentrated primarily on the benefits and symmetric cipher. The data can be kept online using
drawbacks of certain configurations for specific a distributed storage service (K) (E). With
countermeasures. This focus established a layer- imbalanced decoding Dt, the application and the
based engineering for intelligent and sustainable IoT service provider Da can both decode encoded data
applications, with a primary focus on the integration (K, Ka, and Kb) together (K).
of blockchain and AI.
𝑴𝑹 = 𝒂 × 𝒑𝒂. 𝒕 − (𝟏 − 𝒂) × 𝒒𝒕
III.RESEARCH METHODOLOGY
Clinical report has been discussed, it has been found.
In this study, the healthcare industry makes use of The exchange of information in the IoMT demands a
blockchain-coordinated digital protection (BICS)-AI high level of confidence between the participants.
for IoMT. The entirety of email and dialogue Similarly, the medical care system can apply
between fraudulent groups has been put to the reliability appraisal approaches to examine the
blockchain, creating a totally distributed blockchain. dependability of companions. The clinical report
Its cutting-edge innovation might increase the MR has the utmost respect for the accuracy of any
security and proficiency of property monitoring. of potential clinical consideration. When there is a real
the time,It is common practice to keep sensitive degree of confidence in one's talents, qt is a measure
health information in various places, which can of reliability and a consideration. According to the
delay the delivery of basic updates and have an clinical paper cited by MR Counsels, patient records
impact on patient outcomes. However, as people's can first be assessed for reliability using the Trust
modest dedication to their wellbeing grows, so does Review Administration. Reliability can be assessed
the need for them to access and manage their assuming that all data is accessible to hackers. They
information. Using blockchain technology could are used in many health service situations, such as e-
lead to improved health outcomes since EHRs could medicine, telemedicine, and pandemic containment.
be successfully manage using a reliable IoMT's coordination with various health service
decentralized internet-based record. tools and frameworks has resulted in the creation of
a wide variety of health service records. Due to the
Between private and open blockchains, cooperative expansion of IoMT, two problems with traditional
blockchains begin to take shape. Blockchains are operations have arisen:
generally less reliable than private chains because
the cryptographic algorithm has a lower strength 1) lack of interoperability between different IoMT
limit than private chains, which are judged by the domains; and 2) weaknesses in online security and
number of confirmed exchanges per second. protection of organizations and IoMT tools Diverse
Collaborative effort blockchains are more productive biosensors, medical services systems, IoT points of
than open blockchains but less efficient than engagement, and far-off organisations are all part of
individual blockchains. heterogeneous Internet of Things (IoT) systems.
Near field transmission, Bluetooth innovation, and
As information stored on the blockchain is WBAN are only a few of the several remote
permanent, even the smallest changes could result in methods used by IoMT. Because distributed IoMT
inaccurate information. Value-based non-disavowal systems are not equivalent, different information
can be strengthened by the use of computerized boundaries are created. Hence, sharing health
signatures, non-symmetric encryption/unscrambling information between offices and organisations can
techniques, and decentralized agreement be challenging. To prevent and contain pandemics,
mechanisms. A source of information known as clinical practitioners rely on sharing patient
recognizability can be followed using blockchain information. There are many significant security and
data together with accompanying metadata. protection issues with the IoT.

Authorized licensed use limited to: IEEE - Sales. Downloaded on August 17,2023 at 04:49:57 UTC from IEEE Xplore. Restrictions apply.
𝑷𝑯.𝑪𝑺 = 𝒂(𝑺𝑫𝒂 𝑿𝑼𝑫𝒃 ) artificial intelligence calculations. With the help of a
peripheral organization, information-linked state
Serious security and protection concerns have been items and capabilities are connected to the
thought about, as stated. Research demonstrates that blockchain's state centers. Both blockchain and
patients' wellbeing is more closely linked to their cutting-edge technology with blockchain-powered
network protection climate than was previously IoMT can benefit from new verification and
believed. It is an odd dataset SD that gathers and verification mechanisms. Front line and blockchain
jumbles vital climate data UD. Medical services- states reduce the complexity of IoMT devices and
based data a and b cover elements such as clamour, communications. The blockchain state makes
temperature, and other variables. capabilities that are supported by the blockchain
available to other projects, streamlining the
development process.

𝑫𝑺 = 𝑪𝑫 × (𝟏 + 𝒉𝒑𝑺 𝑫 )

IV.RESULTS AND DISCUSSION

Providing medical care The board system is


decentralised, utilises blockchain technology, and is
reliant on the standard business practise. The
proposed arrangement makes use of blockchain
innovation and healthcare IoT gadgets to nurture a
dependable and effective RPM and EHR across the
board system. The proposed system's architecture
uses a permissionless blockchain network and the
idea of decentralised hoarding as a method to keep
track of a patient's essential bodily functions. The
notion of blockchain innovation served as the source
of inspiration for these two ideas. The OPNET
recreations that were utilised to assess the suggested
BICS-AI execution are discussed in this section.
Figure: 1.AI-based BICS framework. This design consists of 20 client devices and 80
sensor hubs. As seen in Figure 1, a unified server
By combining blockchain and IoMT, it is possible to serves as the business's information expert. This
handle network protection and security challenges. strategy employs the 15-stretch reaction suggestion.
Figure 1 shows the network protection engineering The security rate, security execution rate,
that the IoMT used in conjunction with blockchain. achievement rate, and dormancy rate with 1 TB of
The plan could be in one of four states: 1) The status capacity and a handling velocity of 2.4 GHz stand
of the clinical instrument, 2) The state of the art, 3) out when compared to conventional approaches. In
The blockchain, and 4) The state of the information order to assess the suggested approach's consistency
arrangement. Some of the IoMT medical services in BICS-AI, it will also be contrasted with other
tools that are now in use include biosensors, conventional approaches. The x-pivot considers a
wellbeing checkers, and crisis perception. few sensors and y tomahawks like in general
Unquestionably, a state of the art state is projected to execution (%), security execution (%), security rate
be made by the correspondences foundation and (%), and dormancy rate (%) when compared to CS-
computing resources. Information can be gathered BS, SA-SDN, BC-AIDS, and IFN utilising our
and preprocessed by implanted base stations, IoMT technique. BICS-AI
passageways, and remote entities. Furthermore, the
blockchain state acts as a crucial entryway for proper Analysis of security performance
evaluation of various assets at earlier stages. In the Table 1 displays the client hub security rate and
information development stage, it incorporates observation spans for the proposed system's network
distributed computing, increased capacity, and security for IoMT medical services. Hubs control the

Authorized licensed use limited to: IEEE - Sales. Downloaded on August 17,2023 at 04:49:57 UTC from IEEE Xplore. Restrictions apply.
planning limits and gather data on medical services Information on medical services can be obtained by
using the model presented by (2). By classifying the the IoMT remote cloud from client hubs. An
material into categories of secure and unstable, advance notice is made in reference to the outcome.
planning establishes the client's expectations. The medical information is provided in line with the
Patients' precise data is compared to the projected schedule and ties to the domain condition of
model, and the significant expenditures of the matching the writing information from Table 2. The
subsequent activities are shown. The outcome of the network safety model that blockchain supports under
arrangement is really correct and moved this match circumstance results in different patient
consistently. The potential of the suggested model to behaviour in the medical services industry. Whether
boost security advantages numerous IoMT sensor a certain action is secure depends on how much data
networks. The suggested method is used to gather is produced by IoMT sensors. Utilizing Eq., this
and connect data about medical services in order to assessment improves the patient's action accuracy
build an Internet of Clinical Things (IoMT) network and widens the safe area (9). The warning indicator
for validation and digital security. When a patient's is not sent on the off chance that the patient would
request is deemed to be in a crisis, the medical behave as predicted; it is only sent if the patient does
service providers act right away. not behave as expected. It is used to follow states so
that the patient's behaviour may be understood.
Table: 1. security evaluation.
Number of CS- SA- BC- IFN BICS- Latency rate analysis
Sensors BS SDN AIDS AI Figure 2 depicts the idleness relationship between
10 24.2 52.2 67.7 73.7 85.3 the various strategies for dealing with actual well-
20 74.8 82.3 56.7 46.6 34.2 being checks, and the BICS-AI strategy performs
30 44.4 76.4 67.8 78.7 83.4 better than the ACP method in terms of
40 43.2 57.1 63.6 75.6 81.3 normalization and viability. Real sensor-based health
50 43.5 55.6 66.8 78.8 82.4 checking systems built on the IoMT perform better
60 45.2 56.1 64.0 78.0 83.8
than traditional methods in terms of the number of
70 68.8 57.8 67.7 73.5 84.7
concerns assessed.Clinical and biometric data that is
80 40.7 76.4 64.67 75.8 85.3
inconsistent and unreliable creates a reaction space
for the relevant data. This analysis provides a
Success rate analysis comparison
protected medical care industry to IoMT sensor
With the help of sensors that have already been put
networks using a medical services information
into action, this activity could be perceived more
security and protection model using the BICS-AI
clearly. A perceptual history may enable the model
model. The goal of this approach is to advance the
to include additional historical information. The
security of medical services by utilising blockchain
approval timeframe is extended when a public
innovation.
blockchain is utilized since all hubs must participate,
which takes more time.When this problem occurs,
only a small subset of hubs can participate in the 100
Latency Rate Analysis

approval cycle. Time is saved, and the system's 80


overall functionality is improved.
Ratio (%)

60
Table: 2. Security evaluation. BC-AIDS
40
Number of Sensor CS-BS BC-AIDS BICS-AI IFN
10 56.2 68.2 98.5 20
BICS-AI
20 64.3 73.7 73.4 0
30 56.1 73.5 83.8
1020304050607080
40 62.4 68.2 78.2
50 53.0 64.2 73.5 Number of Sensors
60 64.2 72.0 84.2
70 57.7 66.4 98.4 Figure: 2.Incidence of latency aate.
80 50.7 75.1 80.5
90 62.2 77.3 82.4 Accuracy percentage
Although taking therapeutic considerations into

Authorized licensed use limited to: IEEE - Sales. Downloaded on August 17,2023 at 04:49:57 UTC from IEEE Xplore. Restrictions apply.
account, maintaining patient privacy and safely (%)
storing clinical data are crucial. The public has long Security
been concerned about how sensitive medical data performance 82.2 62.8 62.8 63.2 85.3
should be stored and used, but with the development (%)
of blockchain technology, this issue may now be Security Rate
56.2 56.1 66.2 64.8 83.7
(%)
solved. Due to its decentralized nature, reliability,
Latency Rate
and morality, blockchain technology is a strong 24.2 23.8 7.5 24.8 4.2
(%)
contender for keeping sensitive clinical data. Figure
3 shows how the accuracy of patient health
The advantages of the new model may be shown
assessments utilising blockchain technology could
when comparing model execution measurements
be achieved.
(BICS-AI) with traditional IoMT medical care
information security approaches for improved
accuracy, unchanging quality, security, and
inactivity.

V.CONCLUSION

The system that supports medical benefits in general


could be improved by blockchain technology. As
anticipated applications of blockchain technology, a
few structures and tactics to assess the display of
such systems and possible updates to introduce flaws
Figure: 3. (%) accuracy ratio comparison in the configuration of medical services systems are
examined. The clinical history of patients is
To ensure accuracy, the heartbeat and body important to accurately recommend medication to
temperature are both deliberated repeatedly. Rapid them. Potential blockchain security features, such as
and accurate retrieval of patient clinical records is heterogeneous encrypted specialized policies and
now possible because to blockchain technology. A advanced markup, can protect IoMT healthcare
sophisticated computer analyses pulse readings to information. Another method for enhancing digital
determine if they are low, usual, or high. On a security is to combine blockchain with security
screen, the findings of this research are subsequently measures currently in use as approval and access
shown. After conducting research, which includes control providers in our proposed system. IoT
looking at the dispersing of the specialist's general sensors can be used to initiate appropriate auto-
wellbeing markers in the higher layered area, the update projects, ensuring that the software of IoT
likelihood of the specialist's state of being is devices is continuously updated.
evaluated.
The speed with which blockchain- and AI-based
A comparison of the BICS-AI strategy overall concepts are being adopted. Even if the two ideal
In terms of normalization and sufficiency, the BICS- models each bring something new and different, the
AI technique outperforms the ACP strategy for level of creativity and complexity often varies.
wellbeing monitoring systems. In terms of Blockchain technology may one day automate
maintaining criteria and viability across an payments and enable the secure transmission of
anticipated number of cycles, IoMT-based actual sensitive data, information, and trade records due to
sensor-based wellness checking systems perform the pervasiveness of electronic money in modern
better than other traditional techniques of watching culture. Many combinations of innovations like
spans, as demonstrated in Table 3. blockchain, IoT, and AI are possible. We contend
that these advancements will combine since doing so
Table: 3.Results of the BICS-AI method analysis. will result in better action plans, goods, and services.
CS- SA- BC- BICS-
Performance IFN
BS SDN AIDS AI VI.FUTURE SCOPE
Overall
76.7 66.3 75.8 73.2 98.3
performance
From now on, there are numerous options to contact

Authorized licensed use limited to: IEEE - Sales. Downloaded on August 17,2023 at 04:49:57 UTC from IEEE Xplore. Restrictions apply.
this work. Despite the fact that the majority of [9] Lee J, Azamfar M, Singh J. A blockchain enabled
cyber‐physical system architecture for Industry 4.0
analyses support bitcoin-based blockchain systems, manufacturing systems. Manuf Lett. 2019;20:34‐39.
the Tron blockchain organisation may be considered [10] Mohanta BK, Jena D, Panda SS, Sobhanayak S. Blockchain
technology: a survey on applications and security privacy
to be in the future due to its low gas costs and swift challenges. Internet Things. 2019;8:100107.
exchange rate to reduce the communication above. [11] Perera S, Nanayakkara S, Rodrigo M, Senaratne S, Weinand R.
Moreover, the availability of quantum registering Blockchain technology: Is it hype or real in the construction
industry? J Ind Inf Integr. 2020;17:100125.
devices on the adversarial end may intensify IoVs' [12] R. Kumar, R. Tripathi, Towards design and implementation of
future blockchain security issues. In any event, the security and privacy framework for Internet of medical things
duel gaming concepts can be combined with this (iomt) by leveraging blockchain and ipfs technology, J.
Supercomputing, 77 (2021), 7916–7955.
minimal blockchain setup in the future to make the [13] Richard, Nathalie, et al. “Automated Segmentation of Human
organisation defendable against adversaries in the Brain MR Images Using a Multi-agent Approach.” Artificial
Intelligence in Medicine, vol. 30, no. 2, Elsevier BV, Feb. 2004,
organisation that use quantum registration. Using pp. 153–76. Crossref,
grid cryptography and the double game-based shared https://doi.org/10.1016/j.artmed.2003.11.006.
verification approach that has been developed may [14] S. Razdan, S. Sharma, Internet of Medical Things (IoMT):
overview, emerging technologies, and case studies, IETE Tech.
allow for the creation of a new industry for the Rev., 39 (2022), 775–788.
management of quantum processing challenges in [15] Manikandan, G. and Anand, M. “SEC-TAED Based Error
the future. Detection and Correction technique for data transmission
systems”, Indonesian Journal of Electrical Engineering and
Computer Science, Vol.10,No.2, May 2018, pp.696-703,
REFERENCES ISSN:2502-4752
[16] Manikandan,G. and Anand, M. “Mixed Radix 4 & 8 based
[1] A. K. Das, B. Bera, D. Giri, AI and blockchain-based cloud- SDF-SDC FFT Using MBSLS for Efficient Area Reduction”,
assisted secure vaccine distribution and tracking in the iomt- Indian Journal of Public Health Research and Development,vol.
enabled covid-19 environment, IEEE Internet Things Mag., 4 9, Issue 10, 2018.
(2021), 26–32. [17] Kalimuthukumar Sakthivel, Rajesh Krishnasamy, Kannapiran
[2] Abbas K, Tawalbeh LA, Rafiq A, et al. Convergence of Balasubramanian, Vijayakumar Krishnakumar , Manikandan
blockchain and IoT for secure transportation systems in smart Ganesan “ A revolutionary Partial Resonant Inverter and
cities. SecurCommun Networks. 2021;2021:1‐13. doubler rectifier with MPPT based on Sliding Mode Controller
doi:10.1155/2021/5597679 for harvesting Solar photovoltaic sources”, Sustainable
[3] Atlam HF, Azad MA, Alzahrani AG, Wills G. A review of Computing: Informatics and Systems, Volume 36 December
blockchain in internet of things and AI. Big Data CognComput. 2022 100811. https://doi.org/10.1016/j.suscom.2022.100811
2020;4:28. [18] Yu, Huai, et al. “COARSE-TO-FINE ACCURATE
[4] B. Alqaralleh, T. Vaiyapuri, V. S. Parvathy, D. Gupta, A. REGISTRATION FOR AIRBORNE SAR IMAGES USING
Khanna, K. Shankar, Blockchain-assisted secure image SAR-FASTAND DSP-LATCH.” Progress in Electromagnetics
transmission and diagnosis model on Internet of Medical Things Research, vol. 163, The Electromagnetics Academy, 2018, pp.
Environment, Pers. Ubiquitous Comput., 5 (2021). 89–106. Crossref, https://doi.org/10.2528/pier18070801.
[5] Fernandez‐Carames TM, Fraga‐Lamas P. A review on the [19] Kavitha, A., J. N. Swaminathan, and N. Ashok Kumar. "Design
application of blockchain to the next generation of cyber secure of Compresion Sensor by Zno Substrate using Precipitation
Industry 4.0 smart factories. IEEE Access. Method." International Journal of Engineering & Technology
2019;7:45201‐45218. 7.2.24 (2018): 8-10.
[6] Gill SS, Tuli S, Xu M, et al. Transformative effects of IoT, [20] S B G Tilak Babu and Ch Srinivasa Rao, "Efficient detection of
blockchain and artificial intelligence on cloud computing: copy-move forgery using polar complex exponential transform
evolution, vision, trends and open challenges. Internet Things. and gradient direction pattern" ,Multimed Tools Appl (2022).
2019;8:100118. https://doi.org/10.1007/s11042-022-12311-6.
[7] Hameed K, Barika M, Garg S, Amin MB, Kang B. A taxonomy [21] S. B. G. T. Babu and C. S. Rao, “Statistical Features based
study on securing blockchain‐based industrial applications: an Optimized Technique for Copy Move Forgery Detection,” 2020
overview, application perspectives, requirements, attacks, 11th Int. Conf. Comput. Commun. Netw. Technol. ICCCNT
countermeasures, and open issues.J Ind Inf Integr. 2020, 2020.
2022;26:100312.
https://www.sciencedirect.com/science/article/abs/pii/S2452414
X21001060
[8] Hovy, Eduard H. “Automated Discourse Generation Using
Discourse Structure Relations.” Artificial Intelligence, vol. 63,
no. 1–2, Elsevier BV, Oct. 1993, pp. 341–85. Crossref,
https://doi.org/10.1016/0004-3702(93)90021-3.

Authorized licensed use limited to: IEEE - Sales. Downloaded on August 17,2023 at 04:49:57 UTC from IEEE Xplore. Restrictions apply.

You might also like