SlideShare a Scribd company logo
1 of 10
Download to read offline
Blockchain based Smart Healthcare 5.0 model using
explainable Artificial Intelligence
Journal: IEEE Access
Manuscript ID Access-2022-21976
Manuscript Type: Regular Manuscript
Date Submitted by the
Author:
23-Aug-2022
Complete List of Authors: GHAZAL , TAHER ; Skyline University College; Universiti Kebangsaan
Malaysia; American University in the Emirates
Hasan, Mohammad Kamrul; Universiti Kebangsaan Malaysia
Abdullah, Siti Norul Huda Sheikh; Universiti Kebangsaan Malaysia
Abu Bakar, Khairul Azmi; Universiti Kebangsaan Malaysia
Al Hamadi, Hussam M. N.; University of Dubai
Yeun, Chan Yeob; Khalifa University College of Engineering
Issa, Ghassan F.; Skyline University College
Subject Category<br>Please
select at least two subject
categories that best reflect
the scope of your manuscript:
Computational and artificial intelligence, Biomedical Engineering
Keywords: <b>Please choose
keywords carefully as they
help us find the most suitable
Editor to review</b>:
Blockchain, Artificial intelligence, Machine learning, Medical Internet of
Things
Additional Manuscript
Keywords:
For Review Only
IEEE Access
AUTHOR RESPONSES TO IEEE ACCESS
SUBMISSION QUESTIONS
Author chosen
manuscript type:
Research Article
Author explanation
/justification for
choosing this
manuscript type:
This manuscript is related to IoMT and Machine learning.
Author description of
how this manuscript fits
within the scope of IEEE
Access:
In this aerticle authors proposed the Blockchain based Smart
Healthcare 5.0 model using explainable Artificial Intelligence.
Author description
detailing the unique
contribution of the
manuscript related to
existing literature:
Implementation of fusion and Block chain using machine learning
technique in medical field.Γ‚
Page 1 of 8
For Review Only
IEEE Access
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
VOLUME XX, 2017 1
Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
Digital Object Identifier 10.1109/ACCESS.2017.Doi Number
Blockchain based Smart Healthcare 5.0 model
using explainable Artificial Intelligence
Taher M. Ghazal1,2,3
, Mohammad Kamrul Hasan2
, Siti Norul Huda Sheikh Abdullah4
, Khairul
Azmi Abu Bakar2
, Hussam Al Hamadi5
, Chan Yeob Yeun6
, Ghassan F. Issa1
1
School of Information Technology, Skyline University College, University City Sharjah, 1797, Sharjah, UAE.
2
Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebansaan Malaysia (UKM), 43600 Bangi, Selangor,
Malaysia.
3
College of Computer and Information Technology, American University in the Emirates, Dubai Academic City, Dubai, UAE
4
Center for Cyber Security, Universiti Kebangsaan Malaysia (UKM), Malaysia.
5
College of Engineering and IT University of Dubai.
6
Center for Cyber-Physical Systems Khalifa University.
Corresponding author: Taher M. Ghazal (e-mail: taher.ghazal@skylineuniversity.ac.ae).
Acknowledgement: This work supported by the Universiti Kebangsaan Malaysia (UKM) under the Research Grant Scheme FRGS/1/ 2020/ICT03/UKM/02/6.
ABSTRACT In the current era, the Internet of Medical Things (IoMT) is familiar with clinical tools and
medical care devices to work with superior patient medical services, knowledge perceptive clinical
arrangements, brilliant drugs, and, surprisingly, advanced excellent medical care administrations. IoMT is an
accelerated information field with a consistently increasing rate that should be gotten without being altered
in real-time. The advancements like Artificial Intelligence (AI), blockchain innovation, and fused AI are
imagined as significant advancements to overcome the concerns in smart healthcare services like protection,
precision, security, and execution. Blockchain is a promising domain that has captivated the world inferable
from its private as well as public nature advancements. In this work, an intelligent medical services
framework is proposed with the arising IoMT innovations that are coordinated with blockchain to offer more
reasonable answers to overcome safe information sharing.
INDEX TERMS Blockchain, smart healthcare model, explainable, artificial intelligence
I. INTRODUCTION
The IoMT has modernized the medical care places and the
medical services industry by diminishing the medical care
administration's intake. The ongoing medical care industry
arrangements are working on the nature of medical services
administrations to patients. These medical services
frameworks gather information as well as monitor, brighten
and advise the guardians and update the medical care suppliers
with the refreshed information to distinguish early recognition
for better medical services. IoMT empowered devices are not
planned because of the security concern that makes it
presented to think twice about terms of safety and protection
risks. Medical care IT groups are taking the affluence of
information, data loss and implementation control as a top
concern [1].
The IoMT is an authentic utilization of IoT devices, going
head-to-head with medical facilities devices utilized in
medical services monitoring [2]. This innovation of
interconnected gadgets permits the patients to monitor their
ailment as indicated by the therapy ideas of the specialists
through an application while making it easy for the specialists
to recognize the patients' clinical history before the exam
through the assortment of continuous information utilizing
IoMT empowered sensors [3].
With the expanded network safety hazards nowadays, each
web-based exchange of information intends to be further
secure to defend the protection of individuals. Similarly, the
difficulties in the IoMT innovation are the exchange of
patients' information safely to the medical services framework
without the impedance of unapproved individuals [4].
Blockchain innovation is considered an arising pattern
while combining the Internet of things and Internet of clinical
things advancements. There are two classes of blockchain:
public blockchain has a permission-less nature through private
blockchain has a permission nature and needs to apply in
nature. The private blockchain is utilized to break the limits
Page 2 of 8
For Review Only
IEEE Access
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
VOLUME XX, 2017 9
that were inclined before. The fascination of private
blockchain is its permission or authorized nature rather than
the permission-less nature to address the network safety
concerns [5].
Artificial intelligence (AI) is used for machine learning [26-
32], to permit frameworks to naturally gain from information
and leave with choices that contradict human assistance
requirements. AI is granting frameworks to obtain from a fact
and recover themselves without being explicitly altered. AI
can mechanize and expand the productivity of smart medical
care frameworks while bringing down medical care costs in a
better, more effective, and compact way [6,7, 23].
Data fusion is the most common way of joining data and
information from remote and distinct sources with inadequate
fundamental information to attach careful, complete data
about a substance and bring data together [8,9]. Special-level
information combinations can create a singular choice for a
private source before joining choices from different sources to
deliver a smarter choice about an activity. By seeing the
information designs from different AI calculations, choice-
level information combination with AI [10, 24, 25] may assist
in conveying a superior choice.
IoMT surrounded by a private blockchain might endorse the
assortment and exchange of various source information with
upgraded secure correspondence. However, decision-level
fused AI may help encourage change by combining decisions
in light of individual AI calculation expectations.
II. LITERATURE REVIEW
Many investigations on IoMT and clinic officials have been
led utilizing different strategies, and a couple of them have
been examined as far as clinic the board as well as smart
medical care checking components. In this study, authors [11]
depicted that an RFID have perceived as a very helpful
approach to working on checking patients, medications, and
clinical assets in clinics, where digitalization further develops
productivity and wellbeing. This commitment analyzed the
best in a class of RFID for healthcare applications, portraying
how it can assist with working on clinical benefits while
calling attention to its restrictions. It was found that much
effort was placed into programming improvement, and a
careful assessment of the actual layer was rarely completed.
Although the RFID framework referenced in this commitment
is restricted to a small clinic region, there is no security
component to guarantee secure correspondence.
The dissemination of body pressure is estimated utilizing a
strain-detecting sleeping cushion put underneath the
individual's body, information is shipped off a PC for
handling, and outcomes are conveyed for observation and
conclusion. The authors [12] designed an Internet of Things
(IoT) framework application for far-off clinical observation in
this exploration. The clinical space has different applications
for such a framework, making it reasonable for clinical use in
regions, for example, rest studies, central careful measures,
clinical imaging strategies, and different regions, including
assurance of body act on a sleeping cushion.
In this inspection, the authors [13] adopted an IoT-based
framework that monitors and tracks mental imbalance patients
utilizing sensors that gather signals from the mind. There are
no security limitations in this exploration while gathering
sensor information, which might be more destructive to the
patients assuming that the patients are mistreated in light of the
mocking information.
The Authors [14], in this consideration, have cultivated a
methodology of a healthcare monitoring framework engrossed
in a distributed computing stage to carry out unavoidable
health monitoring, including modules, for example, cloud
storage [15] and numerous inhabitants' access control layer,
medical care information explanation layer, and medical care
information investigation layer.
In another analysis, the authors [16] made an IoT-based back-
end stage to associate and monitor older patients' health while
utilizing a start-to-finish clinical health care procedure. As per
this research, [17] presented a revolutionary thought in the
field of cardio flags and proposed a method for heart patients
called iCarMa, which determined the sincerity of the
cardiovascular patients and its convenient discovery and
determination.
In this review, the author [18] highlighted the significance
of IoMT, which was extremely valuable for the patients if
critical issues were expected at the beginning phase. This was
conceivable with the assistance of IoT, which helped the
patients in the field of far-off medical services frameworks.
The proposed medical care framework gathered information
from IoMT-empowered sensors without the utilization of a
confusing instrument.
This article [19] proposed a medical care framework to
empower the sharing of clinical records of medical clinics and
facilities utilizing unit connection innovation to upgrade trust
among clinical gadgets. The limitations of this research
include the decentralized idea of blockchain, which might
bring about inaccurate communication from its permission-
less nature and slow performance speed while transferring
countless exchanges for performance.
Fusion-based approaches might further develop the
monitoring healthcare services' nature to predict a patient's
disease. In this work [20], a model is projected to resolve the
basic issues of elderly individuals with neurological concerns
to recognize the disease using IoMT-empowered sensors. The
proposed model was supported by intertwined AI.
III. PROPOSED METHODOLOGY
A key factor in all data handling is the protection of
sensitive information, such as in the case of smart medical care
frameworks. This research is introducing improved security
and decision-making of IoMT applications, including
blockchain for information security and Explainable Artificial
Intelligence (EAI) for patient monitoring in a more effective
way. EAI is essential for assisting healthcare providers in
evaluating black-box
Page 3 of 8
For Review Only
IEEE Access
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
VOLUME XX, 2017 9
Figure 1: Proposed smart healthcare system
Figure 1 presents that the arrangement of the proposed
healthcare model is being evaluated utilizing the training and
validation phases. The training phase contains the five layers
specifically; IoMT infrastructure, blockchain layer,
information Data acquisition layer, preprocessing layer,
application layer, fusion approach and performance layer. The
Internet of Medical Things (IoMT) is a foundation of clinical
tools, programming applications, healthcare frameworks, and
healthcare administrations that sense and send information
from human body sensors to the blockchain layer. It is an
important layer used to overcome security risks by using a
blockchain. After the blockchain, the encrypted data is sent to
the data acquisition layer. The data acquisition layer collects
data from the blockchain layer, converts it into electrical
signals, and does the required processing on it. Then the stored
data is passed through the preprocessing layer, which is
important while reducing the amount of noise generated due
to the wireless communication. The preprocessed data is then
promoted to the application layer using the XGBoost
approach. This algorithm is responsible for predicting
patterns. The objective function (loss function and
regularization) of XGBoost at iteration t that is needed to
minimize is the following:
ᢋ𝑑
= βˆ‘ 𝑙(𝑦𝑖, 𝑦
̂𝑖
(π‘‘βˆ’1)
) + 𝑓𝑑(π‘₯𝑖)) + Ω(𝑓𝑑)
𝑛
𝑖=1 (1)
Then the output of XGBoost is fed forward for the
predictions. EAI methods use predictions and health data to
generate explanations. EAI aids medical specialists in
interpreting black-box models and their decision-making
procedure to verify a specific decision taken by a machine
learning model that is extremely important in the medical
field. The primary goal of EAI is to build trust in machine
learning through the importance of local and global variables
using post-hoc explanations.
EAI is a research field that goals to make AI systems results
more understandable to medical specialists. EAI focuses on
the challenge of deciphering the mysteries of the black boxes,
but it also implies Responsible AI because it can aid in creating
transparent models. A human being can explain an
interpretable system, and this is closely related to the idea of
explainability. Enabling explainability in ML aims to make it
easier for end-users and other stakeholders to understand the
reasoning behind algorithmic decisions.
After the EAI predictions, it is checked if the information
regarding disease prediction is found or not. In the case of
β€œNo”, the XGBoost algo. will be retrained, and so on, but in
the case of β€œYes”, the disease prediction outcome is stored
on a cloud database. In the Validation stage, the trained
patterns are imported from the cloud data set and it is
anticipated whether the patient is healthy or unhealthy.
IV. Simulation Results
In this research work, the EAI approach is being used for
IoMT to calculate an insightful framework for better and more
effective patient medical service monitoring using primary
sources of data. The proposed fusion approach is applied to a
Page 4 of 8
For Review Only
IEEE Access
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
VOLUME XX, 2017 9
dataset gathered from the UCI Machine Learning information
dataset. The dataset is separated into training sets of 70%
(24675 samples) and 30% for the testing (10575 samples). The
proposed approach is utilized to a total number of samples of
35250 to work on checking the condition of patient medical
care. The following equations define the various initial
conditions that are used in the implementation of various
measurement calculations:
𝑆𝑒𝑛𝑠𝑖𝑑𝑖𝑣𝑖𝑑𝑦 =
βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’
βˆ‘ πΆπ‘œπ‘›π‘‘π‘–π‘‘π‘–π‘œπ‘› π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’
(2)
𝑆𝑝𝑒𝑐𝑖𝑓𝑖𝑐𝑖𝑑𝑦 =
βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’
βˆ‘ πΆπ‘œπ‘›π‘‘π‘–π‘‘π‘–π‘œπ‘› π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’
(3)
π΄π‘π‘π‘’π‘Ÿπ‘Žπ‘π‘¦ =
βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’+ βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’
βˆ‘ π‘‡π‘œπ‘‘π‘Žπ‘™ π‘ƒπ‘œπ‘π‘’π‘™π‘Žπ‘‘π‘–π‘œπ‘›
(4)
𝑀𝑖𝑠𝑠 βˆ’ π‘…π‘Žπ‘‘π‘’ =
βˆ‘ πΉπ‘Žπ‘™π‘ π‘’ π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’
βˆ‘ πΆπ‘œπ‘›π‘‘π‘–π‘‘π‘–π‘œπ‘› π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’
(5)
πΉπ‘Žπ‘™π‘™π‘œπ‘’π‘‘ =
βˆ‘ πΉπ‘Žπ‘™π‘ π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’
βˆ‘ πΆπ‘œπ‘›π‘‘π‘–π‘‘π‘–π‘œπ‘› π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’
(6)
πΏπ‘–π‘˜π‘’π‘™π‘–β„Žπ‘œπ‘œπ‘‘ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ π‘…π‘Žπ‘‘π‘–π‘œ =
βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ π‘…π‘Žπ‘‘π‘–π‘œ
βˆ‘ πΉπ‘Žπ‘™π‘ π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ π‘…π‘Žπ‘‘π‘–π‘œ
(7)
πΏπ‘–π‘˜π‘’π‘™π‘–β„Žπ‘œπ‘œπ‘‘ π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’ π‘…π‘Žπ‘‘π‘–π‘œ =
βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ π‘…π‘Žπ‘‘π‘–π‘œ
βˆ‘ πΉπ‘Žπ‘™π‘ π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ π‘…π‘Žπ‘‘π‘–π‘œ
(8)
π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ π‘ƒπ‘Ÿπ‘’π‘‘π‘–π‘π‘‘π‘–π‘£π‘’ π‘‰π‘Žπ‘™π‘’π‘’ =
βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’
βˆ‘ π‘ƒπ‘Ÿπ‘’π‘‘π‘–π‘π‘‘π‘’π‘‘ πΆπ‘œπ‘›π‘‘π‘–π‘‘π‘–π‘œπ‘› π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’
(9)
π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’ π‘ƒπ‘Ÿπ‘’π‘‘π‘–π‘π‘‘π‘–π‘£π‘’ π‘‰π‘Žπ‘™π‘’π‘’ =
βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’
βˆ‘ π‘ƒπ‘Ÿπ‘’π‘‘π‘–π‘π‘‘π‘’π‘‘ πΆπ‘œπ‘›π‘‘π‘–π‘‘π‘–π‘œπ‘› π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’
(10)
TABLE 1: PROPOSED MODEL SMART HEALTHCARE SYSTEM TRAINING
(XGBOOST)
Proposed Model Training
Input
Total number of
samples (24675)
Result (output)
Expected output Predicted Positive Predicted
Negative
True Positive
(T.P.)
False Positive
(F.P.)
12707 Positive 12310 397
False Negative
(F.N.)
True Negative
(TN)
11968 Negative 1456 10512
Table 1 shows the proposed smart healthcare
system training while predicting the disease. Throughout the
training, individually, a sum of 24675 samples is utilized,
which are isolated into 12707,11968 positives as well as
negative samples. 12707 true positives are effectively
anticipated, and no disease is recognized; however, 397
records are mistakenly anticipated as negatives,
demonstrating disease. Essentially, 11968 samples are
acquired, with a negative appearance of disease and a
positive appearance of no disease, with 10512 samples
accurately recognized as awkward appearance disease and
1456 samples mistakenly anticipated as sure, demonstrating
no disease regardless of the presence of the disease.
TABLE 2: PROPOSED MODEL SMART HEALTHCARE SYSTEM VALIDATION
(XGBOOST)
Proposed Model Validation
Input
Total number of
samples (10575)
Result (output)
Expected output Predicted Positive Predicted
Negative
True Positive
(T.P.)
False Positive
(F.P.)
5213 Positive 4823 390
False Negative
(F.N.)
True Negative
(TN)
5362 Negative 703 4659
Table 2 shows the proposed smart healthcare
system validation while predicting the disease. During
validation, a sum of 10575 samples is utilized, separated into
5213,5362 positive and negative samples. 4823 true
positives are effectively anticipated, and no disease is
distinguished; however, 390 records are mistakenly
anticipated as negatives, demonstrating disease. Essentially,
5362 samples are gotten, with the negative appearance of
disease in addition to positive appearance of no disease, with
4659 samples accurately distinguished as awkward
appearance disease and 703 samples incorrectly anticipated
as sure, showing no disease despite the presence of the
disease.
TABLE 3: PROPOSED SMART HEALTHCARE SYSTEM PERFORMANCE
EVALUATION IN TRAINING AND VALIDATION USING DIFFERENT
STATISTICAL MEASURES
Accuracy
Sensitivity
TPR
SpecificityTNR
Miss-Rate
(%)
FNR
Fall-out
FPR
LR+
LR-
PPV
(Precision)
NPV
XGBoost
Training
0.92
0.89
0.96
0.08
0.036
24.72
0.083
0.96
0.87
Validation
0.89
0.87
0.92
0.11
0.077
11.30
0.120
0.92
0.86
Table 3 (XGBoost) further shows that throughout
training, the proposed system's accuracy, sensitivity,
Page 5 of 8
For Review Only
IEEE Access
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
VOLUME XX, 2017 9
specificity, miss rate, and precision are 0.92, 0.89, 0.96, 0.08,
and 0.96, consecutively.
Figure 2: Features with Eli5
but during validation, the suggested model is 0.89, 0.87,
0.92, 0.11, and 0.92. Furthermore, the propsoed system
yields 0.036, 24.72, 0.083, and 0.87 throughout training and
0.077, 11.30, 0.120, and 0.86 during validation in terms of
dropout likelihood positive ratio, likelihood negative ratio,
Figure 2 is showing the weight with each feature in the
given set of parameters. Figure 3 shows the LIME
explanations for one instance randomly selected from the
patient dataset. The top left figure depicts the patient's
disease's projected result with probability. Class negative
disease is found in patients with an unhealthy outcome, while
class positive disease is not found in patients with a good
outcome. The orange color symbolizes the target class
positive, while the blue colour indicates the target class
negative. Color denotes the weight for each feature with their
anticipated class. They represent the local positive or
negative weights ascribed to each characteristic. The longer
the colour bar, the larger the weight.
Figure 3: LIME explanation for one instance
FIGURE 4: MODEL
OUTPUT VALUE
Page 6 of 8
For Review Only
IEEE Access
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
VOLUME XX, 2017 9
It is shown in Figure 4 that the value would be predicted if
the features are not known for the current instance. The base
value is the average of the model output over the training
dataset. Red represents features that pushed the model score
higher, and blue represents features that pushed the score
lower. The bigger the arrow, the bigger the impact of the
feature on the output. The amount of decrease or increase in
the impact can be seen on the x-axis.
TABLE 4. COMPARISON OF THE PROPOSED FRAMEWORK WITH PREVIOUS
MACHINE LEARNING ALGORITHMS
Method
Accuracy
(%)
Miss-rate
(%)
MC-CNN [21] 87.14 12.86
RF [22] 85.3 14.7
The proposed smart healthcare system 0.89 11
The accuracy and miss rate of several machine learning
algorithms are compared in Table 6, demonstrating that the
proposed system is significantly more reliable than
alternative algorithms.
V. Conclusion:
Internet of Medical Things (IoMT) has been used in parallel
with other approaches to supervising patient health, taking
reasonable care of front-line staff, and boosting efficiency by
minimizing the risk of complications in people's existence in
many nations. In addition to slowing down IoMT device
communication, the health care industry's current blockchain
security measures also limit the processing power of IoMT-
enabled devices. Patients may be physically harmed or
severely impaired due to unauthorized access to information.
Blockchain technology and Explainable artificial
intelligence will address security concerns while providing
strong decision-making for enhanced patient health care
quality monitoring in this planned research project. Due to
its usefulness in healthcare, a blockchain is an aggressive
technology that can be connected with other domains to
address processing capacity concerns operationally and a
degree of control over the transaction. New IoMT
technologies may be more feasible if they are integrated with
the integration of blockchain technology, and EAI. The
suggested technique gives superior outcomes to the prior
systems, with an 89% accuracy rate and an 11% miss rate,
which is better as compared to the previously published
approaches.
ACKNOWLEDGMENT
Not applicable
REFERENCES
[1] M. I. Tariq, β€œEvaluation of the challenges in the internet of medical
things with multicriteria decision making (ahp and topsis) to overcome
its obstruction under fuzzy environment,” Mobile Information Systems
2020.
[2] G. Bigini, V. Freschi, and E. Lattanzi, β€œA review on blockchain for the
internet of medical things: definitions, challenges, applications, and
vision,” Future Internet, vol. 208, 2020
[3] N. Garg, M. Wazid, A. K. Das, D. P. Singh, J. J. Rodrigues et al.,
β€œBAKMP-IoMT: Design of blockchain enabled authenticated key
management protocol for Internet of medical things deployment,”
IEEE Access, pp. 95956-95977, 2020.
[4] A. A. Abdellatif, A. Z. Al-Marridi, A. Mohamed, A. Erbad, C. F.
Chiasserini et al., β€œHealth: toward secure, blockchain-enabled
healthcare systems,” IEEE Network, pp. 312-319, 2020.
[5] N. e. Dilawar, β€œBlockchain: securing internet of medical things
(IoMT),” Int. J. Adv. Comput. Sci. Appl vol. 10.1, pp. 82-89, 2019.
[6] J. Verbraeken, M. Wolting, J. Katzy, T. Verbelen, and J. S.
Rellermeyer, β€œA survey on distributed machine learning,” ACM
Computing Surveys (CSUR), pp. 1-33, 2020.
[7] M. Hiwale, S. Phanasalkar, and K. Kotecha, β€œUsing blockchain and
distributed machine learning to manage decentralized but trustworthy
disease data,” Science & Technology Libraries, pp. 1-24, 2021
[8] B. Cheng, Z. Lai, and H. Deng, β€œMedical image classification based
on deep features extracted by deep model and statistic feature fusion
with multilayer perceptron,” Computational intelligence and
neuroscience, 2018.
[9] T. Meng, X. Jing, Z. Yan, and W. Pedrycz, β€œA survey on machine
learning for data fusion,” Information Fusion, pp. 115-129, 2020.
[10] F. Bravo-Marquez, S. Reeves, and M. Ugarte, β€œProof-of-learning: a
blockchain consensus mechanism based on machine learning
competitions,” In 2019 IEEE International Conference on
Decentralized Applications and Infrastructures (DAPPCON), pp.
119-124, 2019.
[11] Y. Á. López, J. Franssen, N. Álvarez, J. Pagnozzi, I. G. P. Arrillaga et
al., β€œRFID technology for management and tracking: e-health
applications,” Sensors, vol. 3, no. 1, pp. 266, 2018.
[12] F. Wortmann, and K. FlΓΌchter, β€œInternet of things. business &
information systems engineering,” pp. 221-224.
[13] K. S. Kumar, "IoT based health monitoring system for autistic
patients," Proceedings of the 3rd International Symposium on Big
Data and Cloud Computing Challenges (ISBCC–16'). Springer, 2016.
[14] B. Xu, L. Xu, H. Cai, L. Jiang, Y. Luo et al., β€œThe design of an m-
Health monitoring system based on a cloud computing platform,”
Enterprise Information Systems, pp. 17-36, 2017.
[15] Y. Ren, Y. Leng, J. Qi, P. K. Sharma, and J. Wang, β€œMultiple cloud
storage mechanism based on blockchain in smart homes,” Future
Generation Computer Systems, pp. 304-313.
[16] M. Hosseinzadeh, J. Koohpayehzadeh, M. Ghafour, A. Ahmed, P.
Asghari, et al., β€œAn elderly health monitoring system based on
biological and behavioral indicators in Internet of things,” Journal of
Ambient Intelligence and Humanized Computing, vol. 2, no. 4, pp. 1-
11, 2020
[17] C. e. Puri, "iCarMa: inexpensive cardiac arrhythmia management--an
iot healthcare analytics solution," Proceedings of the first workshop
on IoT-enabled healthcare and wellness technologies and systems,
2016.
[18] C. Iwendi, S. Khan, J. H. Anajemba, and A. K. Bashir, β€œRealizing an
efficient IoMTassisted patient diet recommendation system through
machine learning model,” IEEE Access, pp. 28462-28474, 2020.
[19] S. Bittins, G. Kober, A. Margheri, M. Masi, A. Miladi et al.,
β€œHealthcare data management by using blockchain technology,”
Applications of Blockchain in Healthcare, pp. 1-27, 2021.
[20] M. Nahiduzzaman, M. Tasnim, N. T. Newaz, M. S. Kaiser, and M.
Mahmud, β€œMachine learning based early fall detection for elderly
people with neurological disorder using multimodal data fusion,”
International Conference on Brain Informatics, pp. 204214,2020.
[21] A. Masood, B. Sheng, P. Li, X. Hou, X. Wei et al., β€œComputer-assisted
decision support system in pulmonary cancer detection and stage
classification on CT images,” Journal Of Biomedical Informatics, vol.
79, pp. 117-128, 2018.
[22] W. Shen, M. Zhou, F. Yang, D. Yu, D. Dong et al., β€œMulti-crop
convolutional neural networks for lung nodule malignancy
suspiciousness classification,” Pattern Recognition, vol. 61, pp. 663-
673, 2017.
[23] T. Babu, D. Gupta, T. Singh, and S. Hameed, β€œColon cancer prediction
on different magnified colon biopsy images,” In 2018 Tenth
International Conference on Advanced Computing (ICoAC), pp. 277-
280, IEEE, December 2018.
[24] T. M. Ghazal, A. U. Rehman, M. Saleem, M. Ahmad, S. Ahmad, et
al., β€œIntelligent model to predict early liver disease using machine
Page 7 of 8
For Review Only
IEEE Access
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
VOLUME XX, 2017 9
learning technique,” In 2022 International Conference on Business
Analytics for Technology and Security (ICBATS), pp. 1-5, IEEE, 2022.
[25] M. Saleem, S. Abbas, T. M. Ghazal, M. A. Khan, N. Sahawneh, et al.,
β€œSmart cities: Fusion-based intelligent traffic congestion control
system for vehicular networks using machine learning techniques,
Egyptian Informatics Journal,2022.
[26] M. Asif, S. Abbas, M. A. Khan, A. Fatima, M. A. Khan et al.,
β€œMapReduce based intelligent model for intrusion detection using
machine learning technique,” Journal of King Saud University-
Computer and Information Sciences.
[27] M. F. Khan, T. M. Ghazal, R. A. Said, A. Fatima, S. Abbas et al., β€œAn
IoMT-enabled smart healthcare model to monitor elderly people using
machine learning technique,” Computational Intelligence and
Neuroscience, 2021.
[28] S. A. Raza, S. Abbas, T. M. Ghazal, M. A. Khan, M. Ahmad et al.,
Content based automated file organization using machine learning
approaches.
[29] M. Saleem, M. A. Khan, S. Abbas, M. Asif, M. Hassan, β€œIntelligent
FSO link for communication in natural disasters empowered with
fuzzy inference system,” In 2019 International Conference on
Electrical, Communication, and Computer Engineering (ICECCE),
pp. 1-6, IEEE, 2019
[30] S.M. Muneer, M. B. Alvi, and M. A. Rasool, β€œGenetic algorithm based
intelligent system for estate value estimation,” International Journal
of Computational and Innovative Sciences, vol. 1, no. 1.
[31] M.U.U.A.H. Muhammad, and A.M.S.F.M. Saleem, β€œIntelligent
intrusion detection system for apache web server empowered with
machine learning approaches,” International Journal of
Computational and Innovative Sciences, vol. 1, no. 1, 2022.
[32] R. Akmal, and M. Saleem,β€œA novel method to improve the round
robin cpu scheduling quantum time using arithmetic mean,”
International Journal of Computational and Innovative Sciences, vol.
1, no. 2, pp. 69-82. 2022.
TAHER M. GHAZAL (Member, IEEE) has
received B.Sc. degree in Software
Engineering from Al Ain University (2011),
M.Sc. degree in Information Technology
Management from The British University in
Dubai, associated with The University of
Manchester and The University of Edinburgh.
(2013), PHD in IT/Software Engineering from
Damascus University (2019) and PHD in
Information Science and Technology from
Universiti Kebangsaan Malaysia (2023). He
has more than 10 years of extensive and diverse experience as lecturer,
Instructor, Tutor, Researcher, Teacher, IT Support/Specialist Engineer and
Business/Systems Analyst. He served in Engineering, Computer Science,
ICT, Head of STEM and Innovation Departments, also he involved in
Quality Assurance, Accreditation and Data Analysis, in several
governmental and private educational institutions under KHDA, Ministry of
Education and Ministry of Higher Education and Scientific Research, UAE.
His research interests are centered towards IoT, IoMT, Artificial Intelligent,
Machine Learning, Deep Learning,
Information Systems, Software Engineering, Security, Building Info.
Modeling, IT, Quality of Education, Management, Big Data, IoT,
Innovation, Information Science & Technology, Quality of Software, and
Project Management.
MOHAMMAD KAMRUL HASAN
(M’13–SM’17) is currently working as a
Senior Lecturer, in the Faculty of Information
Science and Technology, at Center for Cyber
Security, Universiti Kebangsaan Malaysia
(UKM). He completed Doctor of Philosophy
(Ph.D.) degree in Electrical and
Communication Engineering from the faculty
of Engineering, International Islamic
University, Malaysia in 2016. He is
specialized with elements pertaining to
cutting-edge information centric networks; Computer networks, Data
communication and security, Mobile Network and Privacy Protection,
Cyber-physical systems, Industrial IoT, Transparent AI, and Electric
Vehicles Networks. He has published more than 150 indexed papers in
ranked journals and conference proceedings. Dr. Kamrul is a Senior
Member of the Institute of Electrical and Electronics Engineers (SMIEEE-
90852712), Member of Institution of Engineering and Technology (MIET-
1100572830), and the member of Internet Society (198312). Dr. Kamrul is
a certified professional technologist, Malaysia. He also served the IEEE
student branch as chair from 2014 to 2016. He has actively participated in
many events/workshops/trainings for the IEEE and IEEE humanity
programs in Malaysia. He works as the editorial member in many
prestigious high-impact journals Such as IEEE, IET, Elsevier, Frontier and
MDPI, and general chair, co-chair, and speaker for conferences and
workshops for the shake of society and academy knowledge building and
sharing and learning. He has been contributing and working as a volunteer
for under privileged children for the welfare of society.
SITI NORUL HUDA SHEIKH
ABDULLAH Received her first Degree
in Computing at the University of
Manchester Institute of Science and
Technology, United Kingdom. She
furthered her master`s study in the area
of Artificial Intelligence in Universiti
Kebangsaan Malaysia. Later, she
continued her Ph.D. Study in the area of
Computer Vision at Faculty of Electrical
Engineering, Universiti Teknologi
Malaysia. Starting her career, she
involved in conducting national and international activities such as Cyber
Security Academia Malaysia (CSAM), FIRA, Asian Foundation, IMWU,
DFRS, MIAMI, MACE, and IDB Alumni. After serving as a Chairperson
of the Center for Cyber Security, she now holds a post as the Deputy Dean
(Research and Innovation), Faculty of Information Science and Technology,
Universiti Kebangsaan Malaysia, and Chairperson of CSAM. Her research
focuses are Digital Forensics, Pattern Recognition, and Computer Vision
Surveillance systems. She has published four books entitled " Pattern
Recognition", Computational Intelligence in Data Science Application”, "
Smart Prediction of Suspect`s Serial Crime Location ", and " Optical Script
Reader: Texture Binary Innovation" and more than 50 journal and 100
conference manuscripts correspondingly. Beliau menerima Ijazah Sarjana
Muda dalam bidang Komputeran di Institut Universiti Sains dan Teknologi
Manchester, United Kingdom. Beliau melanjutan pelajaran di peringkat
Sarjana dalam bidang Kecerdasan Buatan di Universiti Kebangsaan
Malaysia. Kemudian, beliau menyambung pelajarannya di peringkat Doktor
Falsafah pula. Bidang kajian yang dijalankan adalah Visi Komputer di
Fakulti Kejuruteraan Elektrik, Universiti Teknologi Malaysia. Kerjaya
beliau bermula apabila beliau melibatkan diri dalam mengendalikan aktiviti
dalam dan luar negara seperti Pertubuhan Akademia Keselamatan Siber
Malaysia (CSAM), Federation of International Robot Soccer Association
(FIRA), Asian Foundation, IMWU, DFRS, MIAMI, MACE dan IBD
Alumni. Setelah berkhidmat sebagai Pengerusi Pusat Keselamatan Siber,
beliau kini memegang jawatan sebagai Timbalan Dekan (Penyelidikan dan
Inovasi), Fakulti Sains dan Teknologi Maklumat, Universiti Kebangsaan
Malaysia dan Pengerusi CSAM. Fokus kajian beliau adalah Forensik
Digital, Pengecaman Pola, dan Sistem Pengawasan Visi Komputer. Beliau
juga telah menghasilkan empat buah buku berjudul "Pengecaman Pola”,
"Kecerdasan Komputasi bagi Aplikasi Sains Data", "Ramalan Pintar Lokasi
Suspek Jenayah Bersiri" dan "Pembaca Skrip Optikal: tekstur dan
mempunyai lebih kurang 50 dan 100 manuskrip jurnal dan persidangan.
KHAIRUL AZMI ABU BAKAR received a
degree in Computer Engineering from Iowa State
University, USA and a master's degree in
Communication and Computer Engineering from
Universiti Kebangsaan Malaysia. He was awarded
a PhD degree in Electrical Engineering from the
University of Strathclyde, United Kingdom, for
the study on free-riding nodes in an open MANET.
He is currently a senior lecturer at the Center for
Cyber Security under the Faculty of Information
Science and Technology, Universiti Kebangsaan Malaysia. Before that, he
Page 8 of 8
For Review Only
IEEE Access
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
VOLUME XX, 2017 9
was a staff researcher at MIMOS Berhad, Malaysia's national applied
research and development center in microelectronic and ICT. He has been
involved in many R&D projects in micro-controller, smartcards, and
security systems under open-source platforms. His primary research
interests include network security, the internet of things and computer
networks. He is also an IEEE member.
Hussam Al-Hammadi studied computer
engineering at Ajman University, where he
graduated in 2005
with honors. He holds several international
certificates in networking, business, and tutoring,
like MCSA, MCSE, CCNA, CBP, and CTP. He
spent the period between 2005 and 2010 working
as a computer consultant and tutor in several
governmental and private institutions until joining
Khalifa University as a teaching assistant in 2010.
In 2017, he received his Ph.D. degree in computer engineering from Khalifa
University, where he is currently a Research Scientist at KU Center for
Cyber-Physical Systems (C2PS). His research interests focus on AI for
security and security for AI, in addition to applied security protocols for
several systems like: software agents, SCADA, e-health systems, and
autonomous vehicles. It also includes developing e-forensics and security
methodologies for smartphones and drones. He is an IEEE senior member
and the secretary of the IEEE UAE section since 2019. Finally, he is a
frequent reviewer in several journals, including IEEE Access and IEEE
Systems Journal, KSII Transaction on Internet and information, and
International Journal of Communication Systems.
CHAN YEOB YEUN (Senior Member,
IEEE) received the M.Sc. and Ph.D. degrees in
information security from the Royal Holloway,
University of London, in 1996 and 2000,
respectively. After his Ph.D. degree, he joined
Toshiba TRL, Bristol, U.K., and later became
the Vice President at the Mobile Handset
Research and Development Center, LG
Electronics, Seoul, South Korea, in 2005. He
was responsible for developing mobile TV
technologies and related security. He left LG
Electronics, in 2007, and joined ICU (merged with KAIST), South Korea,
until August 2008, and then the Khalifa University of Science and
Technology, in September 2008. He is currently a Researcher in
cybersecurity, including the IoT/USN security, cyber-physical system
security, cloud/fog security, and cryptographic techniques, an Associate
Professor with the Department of Electrical Engineering and Computer
Science, and the Cybersecurity Leader of the Center for Cyber-Physical
Systems (C2PS). He also enjoys lecturing for M.Sc. cyber security and
Ph.D. engineering courses at Khalifa University. He has published more
than 140 journal articles and conference papers, nine book chapters, and ten
international patent applications. He also works on the editorial board of
multiple international journals and on the steering committee of
international conferences.
GHASSAN F. ISSA received the M.S. and
Ph.D. degrees in computer science/artificial
intelligence from Old Dominion University,
VA, USA, in 1987 and 1992, respectively. He
was a Faculty Member and the Department
Chair of computer science at the Pennsylvania
College of Technology (Penn State), USA,
from 1992 to 1995. He also served as the Dean
for computer science at Applied Science
University, Amman, Jordan, from 2003 to
2005, and the Dean for information
technology at the University of Petra,
Amman, from 2008 to 2018. He is a Professor of computer science.
Currently, he is a Professor and the Dean of the School of Information
Technology, Skyline University College, Al Sharjah, United Arab Emirates.
His research interests include AI, and machine learning with work on deep
neural networks fine-tuning, learning by analogy, and associative
classification algorithms.
Page 9 of 8
For Review Only
IEEE Access
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60

More Related Content

Similar to Access-2022-21976_Proof_hi.pdf

Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsIJARIIT
Β 
Role of Technology & Importance in Tracking Healthcare Services
Role of Technology & Importance in Tracking Healthcare Services Role of Technology & Importance in Tracking Healthcare Services
Role of Technology & Importance in Tracking Healthcare Services Associate Professor in VSB Coimbatore
Β 
Be31178182
Be31178182Be31178182
Be31178182IJMER
Β 
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...IRJET Journal
Β 
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...IRJET Journal
Β 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud SolutionIRJET Journal
Β 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...IRJET Journal
Β 
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...IRJET Journal
Β 
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...IRJET Journal
Β 
Big data analytics and internet of things for personalised healthcare: opport...
Big data analytics and internet of things for personalised healthcare: opport...Big data analytics and internet of things for personalised healthcare: opport...
Big data analytics and internet of things for personalised healthcare: opport...IJECEIAES
Β 
AI-Chronic Disease Suggestion System
AI-Chronic Disease Suggestion SystemAI-Chronic Disease Suggestion System
AI-Chronic Disease Suggestion SystemIJAEMSJORNAL
Β 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
Β 
Cloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the HospitalsCloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the Hospitalsijtsrd
Β 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
Β 
KARE – A Patent Protected AI based Technology into Hospital and Healthcare
KARE – A Patent Protected AI based Technology into Hospital and Healthcare KARE – A Patent Protected AI based Technology into Hospital and Healthcare
KARE – A Patent Protected AI based Technology into Hospital and Healthcare IIJSRJournal
Β 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET Journal
Β 
IRJET - A Survey on Blockchain Technology for Electronic Health Record
IRJET -  	  A Survey on Blockchain Technology for Electronic Health RecordIRJET -  	  A Survey on Blockchain Technology for Electronic Health Record
IRJET - A Survey on Blockchain Technology for Electronic Health RecordIRJET Journal
Β 
Role of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare SystemsRole of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare Systemsijtsrd
Β 
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...IJNSA Journal
Β 
A literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemA literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemBRNSSPublicationHubI
Β 

Similar to Access-2022-21976_Proof_hi.pdf (20)

Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of Things
Β 
Role of Technology & Importance in Tracking Healthcare Services
Role of Technology & Importance in Tracking Healthcare Services Role of Technology & Importance in Tracking Healthcare Services
Role of Technology & Importance in Tracking Healthcare Services
Β 
Be31178182
Be31178182Be31178182
Be31178182
Β 
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...
Β 
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
Β 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
Β 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
Β 
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
Β 
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
A Literature Survey on Vaccine safe Health Tracker based on blockchain techno...
Β 
Big data analytics and internet of things for personalised healthcare: opport...
Big data analytics and internet of things for personalised healthcare: opport...Big data analytics and internet of things for personalised healthcare: opport...
Big data analytics and internet of things for personalised healthcare: opport...
Β 
AI-Chronic Disease Suggestion System
AI-Chronic Disease Suggestion SystemAI-Chronic Disease Suggestion System
AI-Chronic Disease Suggestion System
Β 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
Β 
Cloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the HospitalsCloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the Hospitals
Β 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
Β 
KARE – A Patent Protected AI based Technology into Hospital and Healthcare
KARE – A Patent Protected AI based Technology into Hospital and Healthcare KARE – A Patent Protected AI based Technology into Hospital and Healthcare
KARE – A Patent Protected AI based Technology into Hospital and Healthcare
Β 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
Β 
IRJET - A Survey on Blockchain Technology for Electronic Health Record
IRJET -  	  A Survey on Blockchain Technology for Electronic Health RecordIRJET -  	  A Survey on Blockchain Technology for Electronic Health Record
IRJET - A Survey on Blockchain Technology for Electronic Health Record
Β 
Role of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare SystemsRole of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare Systems
Β 
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
Β 
A literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemA literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring System
Β 

More from mokamojah

diagnostics-12-02142.pdf
diagnostics-12-02142.pdfdiagnostics-12-02142.pdf
diagnostics-12-02142.pdfmokamojah
Β 
electronics-11-02668-v2.pdf
electronics-11-02668-v2.pdfelectronics-11-02668-v2.pdf
electronics-11-02668-v2.pdfmokamojah
Β 
iros2021_jiaming.pdf
iros2021_jiaming.pdfiros2021_jiaming.pdf
iros2021_jiaming.pdfmokamojah
Β 
dwdwdwdwdwd
dwdwdwdwdwddwdwdwdwdwd
dwdwdwdwdwdmokamojah
Β 
Access-2022-24126_Proof_hi.pdf
Access-2022-24126_Proof_hi.pdfAccess-2022-24126_Proof_hi.pdf
Access-2022-24126_Proof_hi.pdfmokamojah
Β 
2933bf63f71e22ee0d6e84792f3fec1a.pdf
2933bf63f71e22ee0d6e84792f3fec1a.pdf2933bf63f71e22ee0d6e84792f3fec1a.pdf
2933bf63f71e22ee0d6e84792f3fec1a.pdfmokamojah
Β 
diagnostics-1925996.pdf
diagnostics-1925996.pdfdiagnostics-1925996.pdf
diagnostics-1925996.pdfmokamojah
Β 
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdfmokamojah
Β 

More from mokamojah (9)

diagnostics-12-02142.pdf
diagnostics-12-02142.pdfdiagnostics-12-02142.pdf
diagnostics-12-02142.pdf
Β 
electronics-11-02668-v2.pdf
electronics-11-02668-v2.pdfelectronics-11-02668-v2.pdf
electronics-11-02668-v2.pdf
Β 
dwdwd
dwdwddwdwd
dwdwd
Β 
iros2021_jiaming.pdf
iros2021_jiaming.pdfiros2021_jiaming.pdf
iros2021_jiaming.pdf
Β 
dwdwdwdwdwd
dwdwdwdwdwddwdwdwdwdwd
dwdwdwdwdwd
Β 
Access-2022-24126_Proof_hi.pdf
Access-2022-24126_Proof_hi.pdfAccess-2022-24126_Proof_hi.pdf
Access-2022-24126_Proof_hi.pdf
Β 
2933bf63f71e22ee0d6e84792f3fec1a.pdf
2933bf63f71e22ee0d6e84792f3fec1a.pdf2933bf63f71e22ee0d6e84792f3fec1a.pdf
2933bf63f71e22ee0d6e84792f3fec1a.pdf
Β 
diagnostics-1925996.pdf
diagnostics-1925996.pdfdiagnostics-1925996.pdf
diagnostics-1925996.pdf
Β 
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
Β 

Recently uploaded

Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
Β 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
Β 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
Β 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
Β 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
Β 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
Β 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
Β 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
Β 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
Β 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
Β 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis GagnΓ©
Β 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
Β 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
Β 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
Β 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
Β 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
Β 
VIP Kolkata Call Girl Howrah πŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Howrah πŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Howrah πŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Howrah πŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Β 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
Β 
Call Girls In DLf Gurgaon βž₯99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon βž₯99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon βž₯99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon βž₯99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
Β 

Recently uploaded (20)

Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
Β 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Β 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
Β 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
Β 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Β 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
Β 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Β 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
Β 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Β 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
Β 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Β 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Β 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
Β 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
Β 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Β 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Β 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
Β 
VIP Kolkata Call Girl Howrah πŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Howrah πŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Howrah πŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Howrah πŸ‘‰ 8250192130 Available With Room
Β 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
Β 
Call Girls In DLf Gurgaon βž₯99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon βž₯99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon βž₯99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon βž₯99902@11544 ( Best price)100% Genuine Escort In 24...
Β 

Access-2022-21976_Proof_hi.pdf

  • 1. Blockchain based Smart Healthcare 5.0 model using explainable Artificial Intelligence Journal: IEEE Access Manuscript ID Access-2022-21976 Manuscript Type: Regular Manuscript Date Submitted by the Author: 23-Aug-2022 Complete List of Authors: GHAZAL , TAHER ; Skyline University College; Universiti Kebangsaan Malaysia; American University in the Emirates Hasan, Mohammad Kamrul; Universiti Kebangsaan Malaysia Abdullah, Siti Norul Huda Sheikh; Universiti Kebangsaan Malaysia Abu Bakar, Khairul Azmi; Universiti Kebangsaan Malaysia Al Hamadi, Hussam M. N.; University of Dubai Yeun, Chan Yeob; Khalifa University College of Engineering Issa, Ghassan F.; Skyline University College Subject Category<br>Please select at least two subject categories that best reflect the scope of your manuscript: Computational and artificial intelligence, Biomedical Engineering Keywords: <b>Please choose keywords carefully as they help us find the most suitable Editor to review</b>: Blockchain, Artificial intelligence, Machine learning, Medical Internet of Things Additional Manuscript Keywords: For Review Only IEEE Access
  • 2. AUTHOR RESPONSES TO IEEE ACCESS SUBMISSION QUESTIONS Author chosen manuscript type: Research Article Author explanation /justification for choosing this manuscript type: This manuscript is related to IoMT and Machine learning. Author description of how this manuscript fits within the scope of IEEE Access: In this aerticle authors proposed the Blockchain based Smart Healthcare 5.0 model using explainable Artificial Intelligence. Author description detailing the unique contribution of the manuscript related to existing literature: Implementation of fusion and Block chain using machine learning technique in medical field.Γ‚ Page 1 of 8 For Review Only IEEE Access 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
  • 3. VOLUME XX, 2017 1 Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. Digital Object Identifier 10.1109/ACCESS.2017.Doi Number Blockchain based Smart Healthcare 5.0 model using explainable Artificial Intelligence Taher M. Ghazal1,2,3 , Mohammad Kamrul Hasan2 , Siti Norul Huda Sheikh Abdullah4 , Khairul Azmi Abu Bakar2 , Hussam Al Hamadi5 , Chan Yeob Yeun6 , Ghassan F. Issa1 1 School of Information Technology, Skyline University College, University City Sharjah, 1797, Sharjah, UAE. 2 Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebansaan Malaysia (UKM), 43600 Bangi, Selangor, Malaysia. 3 College of Computer and Information Technology, American University in the Emirates, Dubai Academic City, Dubai, UAE 4 Center for Cyber Security, Universiti Kebangsaan Malaysia (UKM), Malaysia. 5 College of Engineering and IT University of Dubai. 6 Center for Cyber-Physical Systems Khalifa University. Corresponding author: Taher M. Ghazal (e-mail: taher.ghazal@skylineuniversity.ac.ae). Acknowledgement: This work supported by the Universiti Kebangsaan Malaysia (UKM) under the Research Grant Scheme FRGS/1/ 2020/ICT03/UKM/02/6. ABSTRACT In the current era, the Internet of Medical Things (IoMT) is familiar with clinical tools and medical care devices to work with superior patient medical services, knowledge perceptive clinical arrangements, brilliant drugs, and, surprisingly, advanced excellent medical care administrations. IoMT is an accelerated information field with a consistently increasing rate that should be gotten without being altered in real-time. The advancements like Artificial Intelligence (AI), blockchain innovation, and fused AI are imagined as significant advancements to overcome the concerns in smart healthcare services like protection, precision, security, and execution. Blockchain is a promising domain that has captivated the world inferable from its private as well as public nature advancements. In this work, an intelligent medical services framework is proposed with the arising IoMT innovations that are coordinated with blockchain to offer more reasonable answers to overcome safe information sharing. INDEX TERMS Blockchain, smart healthcare model, explainable, artificial intelligence I. INTRODUCTION The IoMT has modernized the medical care places and the medical services industry by diminishing the medical care administration's intake. The ongoing medical care industry arrangements are working on the nature of medical services administrations to patients. These medical services frameworks gather information as well as monitor, brighten and advise the guardians and update the medical care suppliers with the refreshed information to distinguish early recognition for better medical services. IoMT empowered devices are not planned because of the security concern that makes it presented to think twice about terms of safety and protection risks. Medical care IT groups are taking the affluence of information, data loss and implementation control as a top concern [1]. The IoMT is an authentic utilization of IoT devices, going head-to-head with medical facilities devices utilized in medical services monitoring [2]. This innovation of interconnected gadgets permits the patients to monitor their ailment as indicated by the therapy ideas of the specialists through an application while making it easy for the specialists to recognize the patients' clinical history before the exam through the assortment of continuous information utilizing IoMT empowered sensors [3]. With the expanded network safety hazards nowadays, each web-based exchange of information intends to be further secure to defend the protection of individuals. Similarly, the difficulties in the IoMT innovation are the exchange of patients' information safely to the medical services framework without the impedance of unapproved individuals [4]. Blockchain innovation is considered an arising pattern while combining the Internet of things and Internet of clinical things advancements. There are two classes of blockchain: public blockchain has a permission-less nature through private blockchain has a permission nature and needs to apply in nature. The private blockchain is utilized to break the limits Page 2 of 8 For Review Only IEEE Access 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
  • 4. VOLUME XX, 2017 9 that were inclined before. The fascination of private blockchain is its permission or authorized nature rather than the permission-less nature to address the network safety concerns [5]. Artificial intelligence (AI) is used for machine learning [26- 32], to permit frameworks to naturally gain from information and leave with choices that contradict human assistance requirements. AI is granting frameworks to obtain from a fact and recover themselves without being explicitly altered. AI can mechanize and expand the productivity of smart medical care frameworks while bringing down medical care costs in a better, more effective, and compact way [6,7, 23]. Data fusion is the most common way of joining data and information from remote and distinct sources with inadequate fundamental information to attach careful, complete data about a substance and bring data together [8,9]. Special-level information combinations can create a singular choice for a private source before joining choices from different sources to deliver a smarter choice about an activity. By seeing the information designs from different AI calculations, choice- level information combination with AI [10, 24, 25] may assist in conveying a superior choice. IoMT surrounded by a private blockchain might endorse the assortment and exchange of various source information with upgraded secure correspondence. However, decision-level fused AI may help encourage change by combining decisions in light of individual AI calculation expectations. II. LITERATURE REVIEW Many investigations on IoMT and clinic officials have been led utilizing different strategies, and a couple of them have been examined as far as clinic the board as well as smart medical care checking components. In this study, authors [11] depicted that an RFID have perceived as a very helpful approach to working on checking patients, medications, and clinical assets in clinics, where digitalization further develops productivity and wellbeing. This commitment analyzed the best in a class of RFID for healthcare applications, portraying how it can assist with working on clinical benefits while calling attention to its restrictions. It was found that much effort was placed into programming improvement, and a careful assessment of the actual layer was rarely completed. Although the RFID framework referenced in this commitment is restricted to a small clinic region, there is no security component to guarantee secure correspondence. The dissemination of body pressure is estimated utilizing a strain-detecting sleeping cushion put underneath the individual's body, information is shipped off a PC for handling, and outcomes are conveyed for observation and conclusion. The authors [12] designed an Internet of Things (IoT) framework application for far-off clinical observation in this exploration. The clinical space has different applications for such a framework, making it reasonable for clinical use in regions, for example, rest studies, central careful measures, clinical imaging strategies, and different regions, including assurance of body act on a sleeping cushion. In this inspection, the authors [13] adopted an IoT-based framework that monitors and tracks mental imbalance patients utilizing sensors that gather signals from the mind. There are no security limitations in this exploration while gathering sensor information, which might be more destructive to the patients assuming that the patients are mistreated in light of the mocking information. The Authors [14], in this consideration, have cultivated a methodology of a healthcare monitoring framework engrossed in a distributed computing stage to carry out unavoidable health monitoring, including modules, for example, cloud storage [15] and numerous inhabitants' access control layer, medical care information explanation layer, and medical care information investigation layer. In another analysis, the authors [16] made an IoT-based back- end stage to associate and monitor older patients' health while utilizing a start-to-finish clinical health care procedure. As per this research, [17] presented a revolutionary thought in the field of cardio flags and proposed a method for heart patients called iCarMa, which determined the sincerity of the cardiovascular patients and its convenient discovery and determination. In this review, the author [18] highlighted the significance of IoMT, which was extremely valuable for the patients if critical issues were expected at the beginning phase. This was conceivable with the assistance of IoT, which helped the patients in the field of far-off medical services frameworks. The proposed medical care framework gathered information from IoMT-empowered sensors without the utilization of a confusing instrument. This article [19] proposed a medical care framework to empower the sharing of clinical records of medical clinics and facilities utilizing unit connection innovation to upgrade trust among clinical gadgets. The limitations of this research include the decentralized idea of blockchain, which might bring about inaccurate communication from its permission- less nature and slow performance speed while transferring countless exchanges for performance. Fusion-based approaches might further develop the monitoring healthcare services' nature to predict a patient's disease. In this work [20], a model is projected to resolve the basic issues of elderly individuals with neurological concerns to recognize the disease using IoMT-empowered sensors. The proposed model was supported by intertwined AI. III. PROPOSED METHODOLOGY A key factor in all data handling is the protection of sensitive information, such as in the case of smart medical care frameworks. This research is introducing improved security and decision-making of IoMT applications, including blockchain for information security and Explainable Artificial Intelligence (EAI) for patient monitoring in a more effective way. EAI is essential for assisting healthcare providers in evaluating black-box Page 3 of 8 For Review Only IEEE Access 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
  • 5. VOLUME XX, 2017 9 Figure 1: Proposed smart healthcare system Figure 1 presents that the arrangement of the proposed healthcare model is being evaluated utilizing the training and validation phases. The training phase contains the five layers specifically; IoMT infrastructure, blockchain layer, information Data acquisition layer, preprocessing layer, application layer, fusion approach and performance layer. The Internet of Medical Things (IoMT) is a foundation of clinical tools, programming applications, healthcare frameworks, and healthcare administrations that sense and send information from human body sensors to the blockchain layer. It is an important layer used to overcome security risks by using a blockchain. After the blockchain, the encrypted data is sent to the data acquisition layer. The data acquisition layer collects data from the blockchain layer, converts it into electrical signals, and does the required processing on it. Then the stored data is passed through the preprocessing layer, which is important while reducing the amount of noise generated due to the wireless communication. The preprocessed data is then promoted to the application layer using the XGBoost approach. This algorithm is responsible for predicting patterns. The objective function (loss function and regularization) of XGBoost at iteration t that is needed to minimize is the following: ᢋ𝑑 = βˆ‘ 𝑙(𝑦𝑖, 𝑦 ̂𝑖 (π‘‘βˆ’1) ) + 𝑓𝑑(π‘₯𝑖)) + Ω(𝑓𝑑) 𝑛 𝑖=1 (1) Then the output of XGBoost is fed forward for the predictions. EAI methods use predictions and health data to generate explanations. EAI aids medical specialists in interpreting black-box models and their decision-making procedure to verify a specific decision taken by a machine learning model that is extremely important in the medical field. The primary goal of EAI is to build trust in machine learning through the importance of local and global variables using post-hoc explanations. EAI is a research field that goals to make AI systems results more understandable to medical specialists. EAI focuses on the challenge of deciphering the mysteries of the black boxes, but it also implies Responsible AI because it can aid in creating transparent models. A human being can explain an interpretable system, and this is closely related to the idea of explainability. Enabling explainability in ML aims to make it easier for end-users and other stakeholders to understand the reasoning behind algorithmic decisions. After the EAI predictions, it is checked if the information regarding disease prediction is found or not. In the case of β€œNo”, the XGBoost algo. will be retrained, and so on, but in the case of β€œYes”, the disease prediction outcome is stored on a cloud database. In the Validation stage, the trained patterns are imported from the cloud data set and it is anticipated whether the patient is healthy or unhealthy. IV. Simulation Results In this research work, the EAI approach is being used for IoMT to calculate an insightful framework for better and more effective patient medical service monitoring using primary sources of data. The proposed fusion approach is applied to a Page 4 of 8 For Review Only IEEE Access 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
  • 6. VOLUME XX, 2017 9 dataset gathered from the UCI Machine Learning information dataset. The dataset is separated into training sets of 70% (24675 samples) and 30% for the testing (10575 samples). The proposed approach is utilized to a total number of samples of 35250 to work on checking the condition of patient medical care. The following equations define the various initial conditions that are used in the implementation of various measurement calculations: 𝑆𝑒𝑛𝑠𝑖𝑑𝑖𝑣𝑖𝑑𝑦 = βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ βˆ‘ πΆπ‘œπ‘›π‘‘π‘–π‘‘π‘–π‘œπ‘› π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ (2) 𝑆𝑝𝑒𝑐𝑖𝑓𝑖𝑐𝑖𝑑𝑦 = βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’ βˆ‘ πΆπ‘œπ‘›π‘‘π‘–π‘‘π‘–π‘œπ‘› π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’ (3) π΄π‘π‘π‘’π‘Ÿπ‘Žπ‘π‘¦ = βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’+ βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ βˆ‘ π‘‡π‘œπ‘‘π‘Žπ‘™ π‘ƒπ‘œπ‘π‘’π‘™π‘Žπ‘‘π‘–π‘œπ‘› (4) 𝑀𝑖𝑠𝑠 βˆ’ π‘…π‘Žπ‘‘π‘’ = βˆ‘ πΉπ‘Žπ‘™π‘ π‘’ π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’ βˆ‘ πΆπ‘œπ‘›π‘‘π‘–π‘‘π‘–π‘œπ‘› π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ (5) πΉπ‘Žπ‘™π‘™π‘œπ‘’π‘‘ = βˆ‘ πΉπ‘Žπ‘™π‘ π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ βˆ‘ πΆπ‘œπ‘›π‘‘π‘–π‘‘π‘–π‘œπ‘› π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’ (6) πΏπ‘–π‘˜π‘’π‘™π‘–β„Žπ‘œπ‘œπ‘‘ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ π‘…π‘Žπ‘‘π‘–π‘œ = βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ π‘…π‘Žπ‘‘π‘–π‘œ βˆ‘ πΉπ‘Žπ‘™π‘ π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ π‘…π‘Žπ‘‘π‘–π‘œ (7) πΏπ‘–π‘˜π‘’π‘™π‘–β„Žπ‘œπ‘œπ‘‘ π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’ π‘…π‘Žπ‘‘π‘–π‘œ = βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ π‘…π‘Žπ‘‘π‘–π‘œ βˆ‘ πΉπ‘Žπ‘™π‘ π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ π‘…π‘Žπ‘‘π‘–π‘œ (8) π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ π‘ƒπ‘Ÿπ‘’π‘‘π‘–π‘π‘‘π‘–π‘£π‘’ π‘‰π‘Žπ‘™π‘’π‘’ = βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ βˆ‘ π‘ƒπ‘Ÿπ‘’π‘‘π‘–π‘π‘‘π‘’π‘‘ πΆπ‘œπ‘›π‘‘π‘–π‘‘π‘–π‘œπ‘› π‘ƒπ‘œπ‘ π‘–π‘‘π‘–π‘£π‘’ (9) π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’ π‘ƒπ‘Ÿπ‘’π‘‘π‘–π‘π‘‘π‘–π‘£π‘’ π‘‰π‘Žπ‘™π‘’π‘’ = βˆ‘ π‘‡π‘Ÿπ‘’π‘’ π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’ βˆ‘ π‘ƒπ‘Ÿπ‘’π‘‘π‘–π‘π‘‘π‘’π‘‘ πΆπ‘œπ‘›π‘‘π‘–π‘‘π‘–π‘œπ‘› π‘π‘’π‘”π‘Žπ‘‘π‘–π‘£π‘’ (10) TABLE 1: PROPOSED MODEL SMART HEALTHCARE SYSTEM TRAINING (XGBOOST) Proposed Model Training Input Total number of samples (24675) Result (output) Expected output Predicted Positive Predicted Negative True Positive (T.P.) False Positive (F.P.) 12707 Positive 12310 397 False Negative (F.N.) True Negative (TN) 11968 Negative 1456 10512 Table 1 shows the proposed smart healthcare system training while predicting the disease. Throughout the training, individually, a sum of 24675 samples is utilized, which are isolated into 12707,11968 positives as well as negative samples. 12707 true positives are effectively anticipated, and no disease is recognized; however, 397 records are mistakenly anticipated as negatives, demonstrating disease. Essentially, 11968 samples are acquired, with a negative appearance of disease and a positive appearance of no disease, with 10512 samples accurately recognized as awkward appearance disease and 1456 samples mistakenly anticipated as sure, demonstrating no disease regardless of the presence of the disease. TABLE 2: PROPOSED MODEL SMART HEALTHCARE SYSTEM VALIDATION (XGBOOST) Proposed Model Validation Input Total number of samples (10575) Result (output) Expected output Predicted Positive Predicted Negative True Positive (T.P.) False Positive (F.P.) 5213 Positive 4823 390 False Negative (F.N.) True Negative (TN) 5362 Negative 703 4659 Table 2 shows the proposed smart healthcare system validation while predicting the disease. During validation, a sum of 10575 samples is utilized, separated into 5213,5362 positive and negative samples. 4823 true positives are effectively anticipated, and no disease is distinguished; however, 390 records are mistakenly anticipated as negatives, demonstrating disease. Essentially, 5362 samples are gotten, with the negative appearance of disease in addition to positive appearance of no disease, with 4659 samples accurately distinguished as awkward appearance disease and 703 samples incorrectly anticipated as sure, showing no disease despite the presence of the disease. TABLE 3: PROPOSED SMART HEALTHCARE SYSTEM PERFORMANCE EVALUATION IN TRAINING AND VALIDATION USING DIFFERENT STATISTICAL MEASURES Accuracy Sensitivity TPR SpecificityTNR Miss-Rate (%) FNR Fall-out FPR LR+ LR- PPV (Precision) NPV XGBoost Training 0.92 0.89 0.96 0.08 0.036 24.72 0.083 0.96 0.87 Validation 0.89 0.87 0.92 0.11 0.077 11.30 0.120 0.92 0.86 Table 3 (XGBoost) further shows that throughout training, the proposed system's accuracy, sensitivity, Page 5 of 8 For Review Only IEEE Access 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
  • 7. VOLUME XX, 2017 9 specificity, miss rate, and precision are 0.92, 0.89, 0.96, 0.08, and 0.96, consecutively. Figure 2: Features with Eli5 but during validation, the suggested model is 0.89, 0.87, 0.92, 0.11, and 0.92. Furthermore, the propsoed system yields 0.036, 24.72, 0.083, and 0.87 throughout training and 0.077, 11.30, 0.120, and 0.86 during validation in terms of dropout likelihood positive ratio, likelihood negative ratio, Figure 2 is showing the weight with each feature in the given set of parameters. Figure 3 shows the LIME explanations for one instance randomly selected from the patient dataset. The top left figure depicts the patient's disease's projected result with probability. Class negative disease is found in patients with an unhealthy outcome, while class positive disease is not found in patients with a good outcome. The orange color symbolizes the target class positive, while the blue colour indicates the target class negative. Color denotes the weight for each feature with their anticipated class. They represent the local positive or negative weights ascribed to each characteristic. The longer the colour bar, the larger the weight. Figure 3: LIME explanation for one instance FIGURE 4: MODEL OUTPUT VALUE Page 6 of 8 For Review Only IEEE Access 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
  • 8. VOLUME XX, 2017 9 It is shown in Figure 4 that the value would be predicted if the features are not known for the current instance. The base value is the average of the model output over the training dataset. Red represents features that pushed the model score higher, and blue represents features that pushed the score lower. The bigger the arrow, the bigger the impact of the feature on the output. The amount of decrease or increase in the impact can be seen on the x-axis. TABLE 4. COMPARISON OF THE PROPOSED FRAMEWORK WITH PREVIOUS MACHINE LEARNING ALGORITHMS Method Accuracy (%) Miss-rate (%) MC-CNN [21] 87.14 12.86 RF [22] 85.3 14.7 The proposed smart healthcare system 0.89 11 The accuracy and miss rate of several machine learning algorithms are compared in Table 6, demonstrating that the proposed system is significantly more reliable than alternative algorithms. V. Conclusion: Internet of Medical Things (IoMT) has been used in parallel with other approaches to supervising patient health, taking reasonable care of front-line staff, and boosting efficiency by minimizing the risk of complications in people's existence in many nations. In addition to slowing down IoMT device communication, the health care industry's current blockchain security measures also limit the processing power of IoMT- enabled devices. Patients may be physically harmed or severely impaired due to unauthorized access to information. Blockchain technology and Explainable artificial intelligence will address security concerns while providing strong decision-making for enhanced patient health care quality monitoring in this planned research project. Due to its usefulness in healthcare, a blockchain is an aggressive technology that can be connected with other domains to address processing capacity concerns operationally and a degree of control over the transaction. New IoMT technologies may be more feasible if they are integrated with the integration of blockchain technology, and EAI. The suggested technique gives superior outcomes to the prior systems, with an 89% accuracy rate and an 11% miss rate, which is better as compared to the previously published approaches. ACKNOWLEDGMENT Not applicable REFERENCES [1] M. I. Tariq, β€œEvaluation of the challenges in the internet of medical things with multicriteria decision making (ahp and topsis) to overcome its obstruction under fuzzy environment,” Mobile Information Systems 2020. [2] G. Bigini, V. Freschi, and E. Lattanzi, β€œA review on blockchain for the internet of medical things: definitions, challenges, applications, and vision,” Future Internet, vol. 208, 2020 [3] N. Garg, M. Wazid, A. K. Das, D. P. Singh, J. J. Rodrigues et al., β€œBAKMP-IoMT: Design of blockchain enabled authenticated key management protocol for Internet of medical things deployment,” IEEE Access, pp. 95956-95977, 2020. [4] A. A. Abdellatif, A. Z. Al-Marridi, A. Mohamed, A. Erbad, C. F. Chiasserini et al., β€œHealth: toward secure, blockchain-enabled healthcare systems,” IEEE Network, pp. 312-319, 2020. [5] N. e. Dilawar, β€œBlockchain: securing internet of medical things (IoMT),” Int. J. Adv. Comput. Sci. Appl vol. 10.1, pp. 82-89, 2019. [6] J. Verbraeken, M. Wolting, J. Katzy, T. Verbelen, and J. S. Rellermeyer, β€œA survey on distributed machine learning,” ACM Computing Surveys (CSUR), pp. 1-33, 2020. [7] M. Hiwale, S. Phanasalkar, and K. Kotecha, β€œUsing blockchain and distributed machine learning to manage decentralized but trustworthy disease data,” Science & Technology Libraries, pp. 1-24, 2021 [8] B. Cheng, Z. Lai, and H. Deng, β€œMedical image classification based on deep features extracted by deep model and statistic feature fusion with multilayer perceptron,” Computational intelligence and neuroscience, 2018. [9] T. Meng, X. Jing, Z. Yan, and W. Pedrycz, β€œA survey on machine learning for data fusion,” Information Fusion, pp. 115-129, 2020. [10] F. Bravo-Marquez, S. Reeves, and M. Ugarte, β€œProof-of-learning: a blockchain consensus mechanism based on machine learning competitions,” In 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON), pp. 119-124, 2019. [11] Y. Á. LΓ³pez, J. Franssen, N. Álvarez, J. Pagnozzi, I. G. P. Arrillaga et al., β€œRFID technology for management and tracking: e-health applications,” Sensors, vol. 3, no. 1, pp. 266, 2018. [12] F. Wortmann, and K. FlΓΌchter, β€œInternet of things. business & information systems engineering,” pp. 221-224. [13] K. S. Kumar, "IoT based health monitoring system for autistic patients," Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC–16'). Springer, 2016. [14] B. Xu, L. Xu, H. Cai, L. Jiang, Y. Luo et al., β€œThe design of an m- Health monitoring system based on a cloud computing platform,” Enterprise Information Systems, pp. 17-36, 2017. [15] Y. Ren, Y. Leng, J. Qi, P. K. Sharma, and J. Wang, β€œMultiple cloud storage mechanism based on blockchain in smart homes,” Future Generation Computer Systems, pp. 304-313. [16] M. Hosseinzadeh, J. Koohpayehzadeh, M. Ghafour, A. Ahmed, P. Asghari, et al., β€œAn elderly health monitoring system based on biological and behavioral indicators in Internet of things,” Journal of Ambient Intelligence and Humanized Computing, vol. 2, no. 4, pp. 1- 11, 2020 [17] C. e. Puri, "iCarMa: inexpensive cardiac arrhythmia management--an iot healthcare analytics solution," Proceedings of the first workshop on IoT-enabled healthcare and wellness technologies and systems, 2016. [18] C. Iwendi, S. Khan, J. H. Anajemba, and A. K. Bashir, β€œRealizing an efficient IoMTassisted patient diet recommendation system through machine learning model,” IEEE Access, pp. 28462-28474, 2020. [19] S. Bittins, G. Kober, A. Margheri, M. Masi, A. Miladi et al., β€œHealthcare data management by using blockchain technology,” Applications of Blockchain in Healthcare, pp. 1-27, 2021. [20] M. Nahiduzzaman, M. Tasnim, N. T. Newaz, M. S. Kaiser, and M. Mahmud, β€œMachine learning based early fall detection for elderly people with neurological disorder using multimodal data fusion,” International Conference on Brain Informatics, pp. 204214,2020. [21] A. Masood, B. Sheng, P. Li, X. Hou, X. Wei et al., β€œComputer-assisted decision support system in pulmonary cancer detection and stage classification on CT images,” Journal Of Biomedical Informatics, vol. 79, pp. 117-128, 2018. [22] W. Shen, M. Zhou, F. Yang, D. Yu, D. Dong et al., β€œMulti-crop convolutional neural networks for lung nodule malignancy suspiciousness classification,” Pattern Recognition, vol. 61, pp. 663- 673, 2017. [23] T. Babu, D. Gupta, T. Singh, and S. Hameed, β€œColon cancer prediction on different magnified colon biopsy images,” In 2018 Tenth International Conference on Advanced Computing (ICoAC), pp. 277- 280, IEEE, December 2018. [24] T. M. Ghazal, A. U. Rehman, M. Saleem, M. Ahmad, S. Ahmad, et al., β€œIntelligent model to predict early liver disease using machine Page 7 of 8 For Review Only IEEE Access 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
  • 9. VOLUME XX, 2017 9 learning technique,” In 2022 International Conference on Business Analytics for Technology and Security (ICBATS), pp. 1-5, IEEE, 2022. [25] M. Saleem, S. Abbas, T. M. Ghazal, M. A. Khan, N. Sahawneh, et al., β€œSmart cities: Fusion-based intelligent traffic congestion control system for vehicular networks using machine learning techniques, Egyptian Informatics Journal,2022. [26] M. Asif, S. Abbas, M. A. Khan, A. Fatima, M. A. Khan et al., β€œMapReduce based intelligent model for intrusion detection using machine learning technique,” Journal of King Saud University- Computer and Information Sciences. [27] M. F. Khan, T. M. Ghazal, R. A. Said, A. Fatima, S. Abbas et al., β€œAn IoMT-enabled smart healthcare model to monitor elderly people using machine learning technique,” Computational Intelligence and Neuroscience, 2021. [28] S. A. Raza, S. Abbas, T. M. Ghazal, M. A. Khan, M. Ahmad et al., Content based automated file organization using machine learning approaches. [29] M. Saleem, M. A. Khan, S. Abbas, M. Asif, M. Hassan, β€œIntelligent FSO link for communication in natural disasters empowered with fuzzy inference system,” In 2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), pp. 1-6, IEEE, 2019 [30] S.M. Muneer, M. B. Alvi, and M. A. Rasool, β€œGenetic algorithm based intelligent system for estate value estimation,” International Journal of Computational and Innovative Sciences, vol. 1, no. 1. [31] M.U.U.A.H. Muhammad, and A.M.S.F.M. Saleem, β€œIntelligent intrusion detection system for apache web server empowered with machine learning approaches,” International Journal of Computational and Innovative Sciences, vol. 1, no. 1, 2022. [32] R. Akmal, and M. Saleem,β€œA novel method to improve the round robin cpu scheduling quantum time using arithmetic mean,” International Journal of Computational and Innovative Sciences, vol. 1, no. 2, pp. 69-82. 2022. TAHER M. GHAZAL (Member, IEEE) has received B.Sc. degree in Software Engineering from Al Ain University (2011), M.Sc. degree in Information Technology Management from The British University in Dubai, associated with The University of Manchester and The University of Edinburgh. (2013), PHD in IT/Software Engineering from Damascus University (2019) and PHD in Information Science and Technology from Universiti Kebangsaan Malaysia (2023). He has more than 10 years of extensive and diverse experience as lecturer, Instructor, Tutor, Researcher, Teacher, IT Support/Specialist Engineer and Business/Systems Analyst. He served in Engineering, Computer Science, ICT, Head of STEM and Innovation Departments, also he involved in Quality Assurance, Accreditation and Data Analysis, in several governmental and private educational institutions under KHDA, Ministry of Education and Ministry of Higher Education and Scientific Research, UAE. His research interests are centered towards IoT, IoMT, Artificial Intelligent, Machine Learning, Deep Learning, Information Systems, Software Engineering, Security, Building Info. Modeling, IT, Quality of Education, Management, Big Data, IoT, Innovation, Information Science & Technology, Quality of Software, and Project Management. MOHAMMAD KAMRUL HASAN (M’13–SM’17) is currently working as a Senior Lecturer, in the Faculty of Information Science and Technology, at Center for Cyber Security, Universiti Kebangsaan Malaysia (UKM). He completed Doctor of Philosophy (Ph.D.) degree in Electrical and Communication Engineering from the faculty of Engineering, International Islamic University, Malaysia in 2016. He is specialized with elements pertaining to cutting-edge information centric networks; Computer networks, Data communication and security, Mobile Network and Privacy Protection, Cyber-physical systems, Industrial IoT, Transparent AI, and Electric Vehicles Networks. He has published more than 150 indexed papers in ranked journals and conference proceedings. Dr. Kamrul is a Senior Member of the Institute of Electrical and Electronics Engineers (SMIEEE- 90852712), Member of Institution of Engineering and Technology (MIET- 1100572830), and the member of Internet Society (198312). Dr. Kamrul is a certified professional technologist, Malaysia. He also served the IEEE student branch as chair from 2014 to 2016. He has actively participated in many events/workshops/trainings for the IEEE and IEEE humanity programs in Malaysia. He works as the editorial member in many prestigious high-impact journals Such as IEEE, IET, Elsevier, Frontier and MDPI, and general chair, co-chair, and speaker for conferences and workshops for the shake of society and academy knowledge building and sharing and learning. He has been contributing and working as a volunteer for under privileged children for the welfare of society. SITI NORUL HUDA SHEIKH ABDULLAH Received her first Degree in Computing at the University of Manchester Institute of Science and Technology, United Kingdom. She furthered her master`s study in the area of Artificial Intelligence in Universiti Kebangsaan Malaysia. Later, she continued her Ph.D. Study in the area of Computer Vision at Faculty of Electrical Engineering, Universiti Teknologi Malaysia. Starting her career, she involved in conducting national and international activities such as Cyber Security Academia Malaysia (CSAM), FIRA, Asian Foundation, IMWU, DFRS, MIAMI, MACE, and IDB Alumni. After serving as a Chairperson of the Center for Cyber Security, she now holds a post as the Deputy Dean (Research and Innovation), Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, and Chairperson of CSAM. Her research focuses are Digital Forensics, Pattern Recognition, and Computer Vision Surveillance systems. She has published four books entitled " Pattern Recognition", Computational Intelligence in Data Science Application”, " Smart Prediction of Suspect`s Serial Crime Location ", and " Optical Script Reader: Texture Binary Innovation" and more than 50 journal and 100 conference manuscripts correspondingly. Beliau menerima Ijazah Sarjana Muda dalam bidang Komputeran di Institut Universiti Sains dan Teknologi Manchester, United Kingdom. Beliau melanjutan pelajaran di peringkat Sarjana dalam bidang Kecerdasan Buatan di Universiti Kebangsaan Malaysia. Kemudian, beliau menyambung pelajarannya di peringkat Doktor Falsafah pula. Bidang kajian yang dijalankan adalah Visi Komputer di Fakulti Kejuruteraan Elektrik, Universiti Teknologi Malaysia. Kerjaya beliau bermula apabila beliau melibatkan diri dalam mengendalikan aktiviti dalam dan luar negara seperti Pertubuhan Akademia Keselamatan Siber Malaysia (CSAM), Federation of International Robot Soccer Association (FIRA), Asian Foundation, IMWU, DFRS, MIAMI, MACE dan IBD Alumni. Setelah berkhidmat sebagai Pengerusi Pusat Keselamatan Siber, beliau kini memegang jawatan sebagai Timbalan Dekan (Penyelidikan dan Inovasi), Fakulti Sains dan Teknologi Maklumat, Universiti Kebangsaan Malaysia dan Pengerusi CSAM. Fokus kajian beliau adalah Forensik Digital, Pengecaman Pola, dan Sistem Pengawasan Visi Komputer. Beliau juga telah menghasilkan empat buah buku berjudul "Pengecaman Pola”, "Kecerdasan Komputasi bagi Aplikasi Sains Data", "Ramalan Pintar Lokasi Suspek Jenayah Bersiri" dan "Pembaca Skrip Optikal: tekstur dan mempunyai lebih kurang 50 dan 100 manuskrip jurnal dan persidangan. KHAIRUL AZMI ABU BAKAR received a degree in Computer Engineering from Iowa State University, USA and a master's degree in Communication and Computer Engineering from Universiti Kebangsaan Malaysia. He was awarded a PhD degree in Electrical Engineering from the University of Strathclyde, United Kingdom, for the study on free-riding nodes in an open MANET. He is currently a senior lecturer at the Center for Cyber Security under the Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia. Before that, he Page 8 of 8 For Review Only IEEE Access 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
  • 10. VOLUME XX, 2017 9 was a staff researcher at MIMOS Berhad, Malaysia's national applied research and development center in microelectronic and ICT. He has been involved in many R&D projects in micro-controller, smartcards, and security systems under open-source platforms. His primary research interests include network security, the internet of things and computer networks. He is also an IEEE member. Hussam Al-Hammadi studied computer engineering at Ajman University, where he graduated in 2005 with honors. He holds several international certificates in networking, business, and tutoring, like MCSA, MCSE, CCNA, CBP, and CTP. He spent the period between 2005 and 2010 working as a computer consultant and tutor in several governmental and private institutions until joining Khalifa University as a teaching assistant in 2010. In 2017, he received his Ph.D. degree in computer engineering from Khalifa University, where he is currently a Research Scientist at KU Center for Cyber-Physical Systems (C2PS). His research interests focus on AI for security and security for AI, in addition to applied security protocols for several systems like: software agents, SCADA, e-health systems, and autonomous vehicles. It also includes developing e-forensics and security methodologies for smartphones and drones. He is an IEEE senior member and the secretary of the IEEE UAE section since 2019. Finally, he is a frequent reviewer in several journals, including IEEE Access and IEEE Systems Journal, KSII Transaction on Internet and information, and International Journal of Communication Systems. CHAN YEOB YEUN (Senior Member, IEEE) received the M.Sc. and Ph.D. degrees in information security from the Royal Holloway, University of London, in 1996 and 2000, respectively. After his Ph.D. degree, he joined Toshiba TRL, Bristol, U.K., and later became the Vice President at the Mobile Handset Research and Development Center, LG Electronics, Seoul, South Korea, in 2005. He was responsible for developing mobile TV technologies and related security. He left LG Electronics, in 2007, and joined ICU (merged with KAIST), South Korea, until August 2008, and then the Khalifa University of Science and Technology, in September 2008. He is currently a Researcher in cybersecurity, including the IoT/USN security, cyber-physical system security, cloud/fog security, and cryptographic techniques, an Associate Professor with the Department of Electrical Engineering and Computer Science, and the Cybersecurity Leader of the Center for Cyber-Physical Systems (C2PS). He also enjoys lecturing for M.Sc. cyber security and Ph.D. engineering courses at Khalifa University. He has published more than 140 journal articles and conference papers, nine book chapters, and ten international patent applications. He also works on the editorial board of multiple international journals and on the steering committee of international conferences. GHASSAN F. ISSA received the M.S. and Ph.D. degrees in computer science/artificial intelligence from Old Dominion University, VA, USA, in 1987 and 1992, respectively. He was a Faculty Member and the Department Chair of computer science at the Pennsylvania College of Technology (Penn State), USA, from 1992 to 1995. He also served as the Dean for computer science at Applied Science University, Amman, Jordan, from 2003 to 2005, and the Dean for information technology at the University of Petra, Amman, from 2008 to 2018. He is a Professor of computer science. Currently, he is a Professor and the Dean of the School of Information Technology, Skyline University College, Al Sharjah, United Arab Emirates. His research interests include AI, and machine learning with work on deep neural networks fine-tuning, learning by analogy, and associative classification algorithms. Page 9 of 8 For Review Only IEEE Access 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60