33,57 €
TechTrends: Navigating the Frontier of Emerging Technologies highlights how emerging technologies are reshaping industries, enabling sustainable engineering, and transforming education and healthcare. Covering topics from blockchain security and IoT edge computing to machine learning, genomic computing, and virtual reality, this book brings together cutting-edge research and practical insights into the most dynamic fields of technological advancement. Each chapter showcases interdisciplinary innovations such as AI-driven fashion recommendation systems, predictive modeling for tool wear, laser cladding for lightweight alloys, CNN-based plant disease diagnostics, photovoltaic energy optimization, and immersive VR applications in education. By blending computational techniques with engineering and applied sciences, this volume emphasizes the practical potential of technology to solve real-world industrial, societal, and environmental challenges. Key Features · Explores advances in blockchain security, IoT resource optimization, and edge architectures. · Applies machine learning to domains ranging from healthcare to manufacturing. · Investigates renewable energy optimization, genomic computing, and plant disease detection. · Assesses social network modeling, immersive VR in education, and sustainable engineering solutions. · Bridges theory and practice with case-driven, interdisciplinary research.
Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:
Seitenzahl: 222
Veröffentlichungsjahr: 2025
This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the ebook/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.
Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].
Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.
In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.
Bentham Science Publishers Pte. Ltd. No. 9 Raffles Place Office No. 26-01 Singapore 048619 Singapore Email: [email protected]
Today’s society is unrecognizable when compared with the one of ten years ago. It is a world where innovation brings changes that affect not only industries but the very foundations of people’s lives. This book, "TechTrends: Navigating the Frontier of Emerging Technologies", is a collection of ideas about these transformational technologies that should be useful to anyone interested in learning more about these technologies in order to embrace the future.
Such an environment brings the problem of growing difficulty in gaining relevant information as technology advances exponentially. However, it is critical for practitioners, legislators, scientists, and learners to understand the ways these innovations distort, enhance, or evolve their professions and global society. This book directly addresses that task by offering a brief overview of major technologies, including Artificial Intelligence, Blockchain, Internet of Things, and others.
However, this is not what is evident in TechTrends, which is therefore free from these problems due to its clarity. All in all, the authors have well addressed the requirements for details and, at the same time, avoided excess depth which would have made numbers complex. By the end of this book, the reader is going to get theoretical as well as pragmatic perceptions and examples of how these advancements can be put to use in sectors of healthcare, education, and energy.
That being said, the exposure of expertise in this book is almost unbelievable. Several authors of the articles are from the business fields and academic circles and most of them have provided their valuable insights and ideas to the readers. These are the reasons it is safe to say that TechTrends is an invaluable resource when it comes to understanding today’s world, which is filled with emerging technologies and numerous opportunities.
In the rapidly evolving landscape of today’s digital world, staying ahead of technological advancements is no longer an option but a necessity. The emergence of groundbreaking innovations is reshaping industries, redefining possibilities, and fundamentally altering the way we live and work. This book, TechTrends: Navigating the Frontier of Emerging Technologies, is designed to be your compass through this transformative journey.
From Artificial Intelligence to Blockchain and from Quantum Computing to renewable energy, this comprehensive guide examines the key technologies that are driving the future. Each chapter delves deep into the trends that matter most, with a focus on providing clear explanations and practical insights. By blending theoretical understanding with real-world applications, we aim to demystify complex concepts and make them accessible to a broad spectrum of readers.
This book is the result of the combined efforts of industry experts, researchers, and thought leaders who have generously contributed their knowledge and perspectives. Their diverse expertise ensures that the content remains relevant, timely, and rich with practical advice so that readers can immediately apply it to their own contexts.
Whether you are a technologist looking to stay ahead of the curve, a business leader seeking competitive advantages, a student aiming to expand your knowledge, or a policymaker grappling with the implications of emerging technologies, TechTrends offers something valuable. It is not just a reference book but a toolkit for navigating the complexities of tomorrow’s innovations.
As you embark on this exploration of the frontier of emerging technologies, I hope you find the insights within inspiring and empowering. It is my sincere belief that with the right knowledge and understanding, we can harness these technologies to create a better, more connected, and more equitable future for all.
Welcome to the Frontier. Let’s explore it together.
Medical images bear sensitive patient information, making their transmission a security concern. The privacy and security of such graphical representations and incidental patient information in transit via public networks must be preserved. Medical images contain sensitive information, which sets them apart from ordinary images. Medical images are more sensitive and contain crucial information. This leads to a reliance on more secure techniques than conventional methods like cryptography and data hiding, which normally take more time and security. In this chapter, we propose implementing two innovative techniques to enhance the security of medical data sharing: Prescription information concealed in medical images and secure and share-prescription using a multi-secret sharing blockchain. Prescription data hiding, on the other hand, refers to the encryption of prescription details within normal-looking images like X-ray or MRI scans, among others. Incorporating sensitive data into the images makes it difficult for unauthorized persons to access them. Additionally, we build on the potential of using a blockchain, an immovable and distributed database, to share crucial clinical information safely. Medical data is kept through a blockchain database, which spreads the data around a network. It becomes harder for attackers to tamper or alter the data using traditional methods. Smart contracts also add security to data sharing by enabling data to be available only to the relevant parties, which gives security an extra layer. As a novel solution to solve the serious security issues of medical data sharing, the proposed scheme involves prescription data hiding in medical images, multi-secret sharing-based encryption, and the security properties of the blockchain. Our proposed techniques ensure the privacy and integrity of patients' data when transmitting medical images.
Medical data transmission is an important procedure that involves transferring medical images through public networks and ascribes a massive priority to security measures. Such images bear very sensitive patient details; therefore, there is a need to ensure that their transfer is very secure. Several internal traditional data security approaches, like cryptography and data hiding, possess some drawbacks regarding time consumption and the degree of protection they offer to medical image applications. Thus, this project will provide a solution to increase the security of medical images through the security solution enabled by blockchain, prescription data embedding, and multi-secret sharing encryption. The project aims to solve the problems of non-trivial protection of medical image transmission, patient data confidentiality, and data integrity. Medical images are entirely unlike standard images because they contain a large volume of tremendously important data. Therefore, effective measures to enhance security, apart from other traditional methods and techniques, need to be drawn up.
Prescription data in medical images is a combination of concealing prescription data within the medical image using a steganographic approach. This approach provides an extra layer of protection to the greater mass of data incorporated into the images. Through steganography, there are ways that unauthorized people will not be easily able to see what is hidden; hence, the data's privacy and confidentiality will be intact. In addition, for the remainder of the project, the technology being applied is Blockchain, a distributed, unalterable ledger. Due to the distributed nature of Blockchain, clinical data is thus highly robust in terms of issues of hacking or alteration by unauthorized persons. This makes it difficult for the attackers to modify or foolproof the images transmitted by this technology.
For higher security, build multi-secret sharing-based encryption into the project. This encryption divides the security data into portions distributed among the approved parties. The raw data can be disaggregated only when authorized parties merge their shares. It also has a security feature that prevents anyone unauthorized from making any changes or accessing the data in question. This project aims to provide a multi-faceted solution to the problem of insecure medical image transmission. Solutions such as hiding prescription details in the medical images, the use of Blockchain function, and multi-secret sharing-based encryption ensure the enhanced security of patients' information within the framework of the project. Applying these techniques ensures the medical images' security during transmission across public networks while remaining intact and private. Fig. (1) shows the concept of managing healthcare data through blockchain security for medical image transfer. It comprises several parts and their relationships to secure an efficient healthcare data management.
Fig. (1)) The framework of healthcare data management.The research is expected to achieve the following objectives, hence developing a broader security framework for medical image transmission. It aims to ensure patient information's privacy, confidentiality, and integrity and alleviate the risks of transferring medical images over public networks.
The authors of the presented work [1] provide a detailed review of various fields in the healthcare system that utilize security and privacy-oriented methods. It also looks at the related concerns. Further, the research outlines ways of achieving secure and privacy-preserving machine learning for healthcare applications. The research involves a literature review of the present and past contributions, a discussion of the security and reliability of ML and DL models used for healthcare systems' development, and a focus on the dimensions above. The first research question concerns different security issues that may emerge when using ML and DL in healthcare. Besides highlighting the security and robustness issues accompanying the usage of ML and DL, the research briefly reviews general threats and sources of risks that hinder the safe and reliable integration of ML and DL into healthcare applications. Different privacy and security issues must be solved to achieve reliable and secure usage of these models within the clinical context.
Also, the features of applying cryptography as an algorithm in healthcare are investigated in the research. The advantage of cryptography is that it can secure data and information exchanged over the phone or any other communication medium against any attempt to get hold of them. However, it is necessary to point out that the employment of cryptography is closely connected with high costs, and this may become an adverse factor in some cases.
The proposed system [2], uses the Henon chaotic map, Brownian motion, and Chen's chaotic system to make a multiple-stage encryption algorithm. This is true because of the integration of chaos theory with Brownian motion and Chen's chaotic system, which makes the scheme secure for storage systems in hospitals and medical centers. Randomness in the encryption process is created using a two-dimensional Henon chaotic map, while diffusion is created using Brownian motion and Chen's chaos system.
The reliability of the proposed system has been tested using the NIST test, entropy test, histogram, and pixel-based similarity measurement, where the features are as follows: performance analysis parameters like energy, contrast, homogeneity, mean square error, PSNR, NPCR, UACI, and computational complexity. Besides the encryption scheme, cryptography is also realized as an algorithm to secure data and communication from being uncovered and accessible by unauthorized individuals. However, at the same time, it admits that using cryptography can sometimes be expensive.
The encryption algorithm [3], proposed in the context, incorporates two permutations to secure the medical images. Also, the algorithm considers the difficulty level regarding the encryption and decryption of picture-based information. It uses a transformation process that comprises image phases and a newly developed encryption algorithm known as the Hyper Image Encryption Algorithm (HIEA). After that, the generated image is encrypted with the “Hyper Image Encryption Algorithm (HIEA)”. Unlike the existing techniques, it does not use unsystematic sequence numbers for generating the keys, which consume a considerably large amount of time in computation, but the current formula reduces the computation time as much as possible. In order to maximize security, the algorithm is constructed in a specific way in which the medical images are saved, and it would not allow any unauthorized personnel to access them. In an encryption technique, three levels are used, and the key values for logical operations are 256 bits.
