Loading…

Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System

Presently, technological advancements in the healthcare sector pose a challenging problem relevant to the security and privacy of health-related applications. Medical images can be considered significant and sensitive data in the medical informatics system. In order to transmit medical images in an...

Full description

Saved in:
Bibliographic Details
Published in:Computational intelligence and neuroscience 2022-08, Vol.2022, p.1-13
Main Authors: Geetha, B. T., Mohan, Prakash, Mayuri, A. V. R., Jackulin, T., Aldo Stalin, J. L., Anitha, Varagantham
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c453t-c85f54680e3153dca6e4804b1f6966f44c958db9c92aebcca90b40d2bcfe90123
cites cdi_FETCH-LOGICAL-c453t-c85f54680e3153dca6e4804b1f6966f44c958db9c92aebcca90b40d2bcfe90123
container_end_page 13
container_issue
container_start_page 1
container_title Computational intelligence and neuroscience
container_volume 2022
creator Geetha, B. T.
Mohan, Prakash
Mayuri, A. V. R.
Jackulin, T.
Aldo Stalin, J. L.
Anitha, Varagantham
description Presently, technological advancements in the healthcare sector pose a challenging problem relevant to the security and privacy of health-related applications. Medical images can be considered significant and sensitive data in the medical informatics system. In order to transmit medical images in an open medium, the design of secure encryption algorithms becomes essential. Encryption can be considered one of the effective solutions for accomplishing security. Although numerous models have existed in the literature, they could not adaptable to the rising number of medicinal images in the health sector. At the same time, the optimal key generation process acts as a vital part in defining the performance of the encryption techniques. Therefore, this article presents a Pigeon Inspired Optimization with Encryption-based Secure Medical Image Management (PIOE-SMIM) technique. The proposed PIOE-SMIM approach majorly concentrates on the development of secret share creation (SSC) and the encryption process. At the initial stage, the medical images are converted into a collection of 12 shares using the SSC approach. In addition, an elliptic curve cryptography (ECC) scheme is employed for the encryption process. In order to optimum key creation procedure in the ECC model, the PIO technique is exploited with the aim of maximizing PSNR. Finally, on the receiver side, the decryption and share reconstruction processes are performed to construct the original images. The PIOE-SMIM model displayed an enhanced PSNR of 59.37 dB in image 1. Improved PSNR of 59.53 dB is given for image 5 using the PIOE-SMIM model. For demonstrating an enhanced performance of the PIOE-SMIM method, a widespread experimental study is made and the results highlighted the supremacy of the PIOE-SMIM model over other techniques.
doi_str_mv 10.1155/2022/2243827
format article
fullrecord <record><control><sourceid>gale_pubme</sourceid><recordid>TN_cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_9377849</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A714593148</galeid><sourcerecordid>A714593148</sourcerecordid><originalsourceid>FETCH-LOGICAL-c453t-c85f54680e3153dca6e4804b1f6966f44c958db9c92aebcca90b40d2bcfe90123</originalsourceid><addsrcrecordid>eNp90ctu1DAUBmALgegFdjxAJDZIdKivsb2p1FZtGamoSIUFK8txTmZcJU5qJ1TTp6_DjIrogtXx5dPvYx2EPhD8hRAhjimm9JhSzhSVr9A-KZVcCCrZ6-d1KfbQQUp3GAspMH2L9pjQUimt9tGv734FfSiWIQ0-Ql3cDKPv_KMdfT598OO6uAguboY_-zObMrkFN0UovkHtnW2LZWdXeWdDLh2EsbjdpBG6d-hNY9sE73f1EP28vPhx_nVxfXO1PD-9Xjgu2LhwSjSClwoDI4LVzpbAFeYVaUpdlg3nTgtVV9ppaqFyzmpccVzTyjWgMaHsEJ1sc4ep6qB2uYNoWzNE39m4Mb315t-b4Ndm1f82mkmpuM4Bn3YBsb-fII2m88lB29oA_ZQMlZhpxSVnmX58Qe_6KYb8vVlxKWb3V61sC8aHps_vujnUnErChWaEq6yOtsrFPqUIzXPLBJt5smaerNlNNvPPW772obYP_v_6CePnoP0</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2704759847</pqid></control><display><type>article</type><title>Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System</title><source>Wiley Online Library Open Access</source><source>ProQuest - Publicly Available Content Database</source><creator>Geetha, B. T. ; Mohan, Prakash ; Mayuri, A. V. R. ; Jackulin, T. ; Aldo Stalin, J. L. ; Anitha, Varagantham</creator><contributor>Kumar, Akshi ; Akshi Kumar</contributor><creatorcontrib>Geetha, B. T. ; Mohan, Prakash ; Mayuri, A. V. R. ; Jackulin, T. ; Aldo Stalin, J. L. ; Anitha, Varagantham ; Kumar, Akshi ; Akshi Kumar</creatorcontrib><description>Presently, technological advancements in the healthcare sector pose a challenging problem relevant to the security and privacy of health-related applications. Medical images can be considered significant and sensitive data in the medical informatics system. In order to transmit medical images in an open medium, the design of secure encryption algorithms becomes essential. Encryption can be considered one of the effective solutions for accomplishing security. Although numerous models have existed in the literature, they could not adaptable to the rising number of medicinal images in the health sector. At the same time, the optimal key generation process acts as a vital part in defining the performance of the encryption techniques. Therefore, this article presents a Pigeon Inspired Optimization with Encryption-based Secure Medical Image Management (PIOE-SMIM) technique. The proposed PIOE-SMIM approach majorly concentrates on the development of secret share creation (SSC) and the encryption process. At the initial stage, the medical images are converted into a collection of 12 shares using the SSC approach. In addition, an elliptic curve cryptography (ECC) scheme is employed for the encryption process. In order to optimum key creation procedure in the ECC model, the PIO technique is exploited with the aim of maximizing PSNR. Finally, on the receiver side, the decryption and share reconstruction processes are performed to construct the original images. The PIOE-SMIM model displayed an enhanced PSNR of 59.37 dB in image 1. Improved PSNR of 59.53 dB is given for image 5 using the PIOE-SMIM model. For demonstrating an enhanced performance of the PIOE-SMIM method, a widespread experimental study is made and the results highlighted the supremacy of the PIOE-SMIM model over other techniques.</description><identifier>ISSN: 1687-5265</identifier><identifier>EISSN: 1687-5273</identifier><identifier>DOI: 10.1155/2022/2243827</identifier><identifier>PMID: 35978898</identifier><language>eng</language><publisher>New York: Hindawi</publisher><subject>Algorithms ; Birds ; Cloud computing ; Cryptography ; Curves ; Data encryption ; Encryption ; Health care ; Image coding ; Image enhancement ; Image management ; Informatics ; Magnetic fields ; Medical imaging ; Medical imaging equipment ; Medical informatics ; Optimization ; Performance enhancement ; Population ; Security ; Technology application</subject><ispartof>Computational intelligence and neuroscience, 2022-08, Vol.2022, p.1-13</ispartof><rights>Copyright © 2022 B. T. Geetha et al.</rights><rights>COPYRIGHT 2022 John Wiley &amp; Sons, Inc.</rights><rights>Copyright © 2022 B. T. Geetha et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><rights>Copyright © 2022 B. T. Geetha et al. 2022</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c453t-c85f54680e3153dca6e4804b1f6966f44c958db9c92aebcca90b40d2bcfe90123</citedby><cites>FETCH-LOGICAL-c453t-c85f54680e3153dca6e4804b1f6966f44c958db9c92aebcca90b40d2bcfe90123</cites><orcidid>0000-0002-7408-5938</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2704759847/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2704759847?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,780,784,885,25753,27924,27925,37012,37013,44590,75126</link.rule.ids></links><search><contributor>Kumar, Akshi</contributor><contributor>Akshi Kumar</contributor><creatorcontrib>Geetha, B. T.</creatorcontrib><creatorcontrib>Mohan, Prakash</creatorcontrib><creatorcontrib>Mayuri, A. V. R.</creatorcontrib><creatorcontrib>Jackulin, T.</creatorcontrib><creatorcontrib>Aldo Stalin, J. L.</creatorcontrib><creatorcontrib>Anitha, Varagantham</creatorcontrib><title>Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System</title><title>Computational intelligence and neuroscience</title><description>Presently, technological advancements in the healthcare sector pose a challenging problem relevant to the security and privacy of health-related applications. Medical images can be considered significant and sensitive data in the medical informatics system. In order to transmit medical images in an open medium, the design of secure encryption algorithms becomes essential. Encryption can be considered one of the effective solutions for accomplishing security. Although numerous models have existed in the literature, they could not adaptable to the rising number of medicinal images in the health sector. At the same time, the optimal key generation process acts as a vital part in defining the performance of the encryption techniques. Therefore, this article presents a Pigeon Inspired Optimization with Encryption-based Secure Medical Image Management (PIOE-SMIM) technique. The proposed PIOE-SMIM approach majorly concentrates on the development of secret share creation (SSC) and the encryption process. At the initial stage, the medical images are converted into a collection of 12 shares using the SSC approach. In addition, an elliptic curve cryptography (ECC) scheme is employed for the encryption process. In order to optimum key creation procedure in the ECC model, the PIO technique is exploited with the aim of maximizing PSNR. Finally, on the receiver side, the decryption and share reconstruction processes are performed to construct the original images. The PIOE-SMIM model displayed an enhanced PSNR of 59.37 dB in image 1. Improved PSNR of 59.53 dB is given for image 5 using the PIOE-SMIM model. For demonstrating an enhanced performance of the PIOE-SMIM method, a widespread experimental study is made and the results highlighted the supremacy of the PIOE-SMIM model over other techniques.</description><subject>Algorithms</subject><subject>Birds</subject><subject>Cloud computing</subject><subject>Cryptography</subject><subject>Curves</subject><subject>Data encryption</subject><subject>Encryption</subject><subject>Health care</subject><subject>Image coding</subject><subject>Image enhancement</subject><subject>Image management</subject><subject>Informatics</subject><subject>Magnetic fields</subject><subject>Medical imaging</subject><subject>Medical imaging equipment</subject><subject>Medical informatics</subject><subject>Optimization</subject><subject>Performance enhancement</subject><subject>Population</subject><subject>Security</subject><subject>Technology application</subject><issn>1687-5265</issn><issn>1687-5273</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp90ctu1DAUBmALgegFdjxAJDZIdKivsb2p1FZtGamoSIUFK8txTmZcJU5qJ1TTp6_DjIrogtXx5dPvYx2EPhD8hRAhjimm9JhSzhSVr9A-KZVcCCrZ6-d1KfbQQUp3GAspMH2L9pjQUimt9tGv734FfSiWIQ0-Ql3cDKPv_KMdfT598OO6uAguboY_-zObMrkFN0UovkHtnW2LZWdXeWdDLh2EsbjdpBG6d-hNY9sE73f1EP28vPhx_nVxfXO1PD-9Xjgu2LhwSjSClwoDI4LVzpbAFeYVaUpdlg3nTgtVV9ppaqFyzmpccVzTyjWgMaHsEJ1sc4ep6qB2uYNoWzNE39m4Mb315t-b4Ndm1f82mkmpuM4Bn3YBsb-fII2m88lB29oA_ZQMlZhpxSVnmX58Qe_6KYb8vVlxKWb3V61sC8aHps_vujnUnErChWaEq6yOtsrFPqUIzXPLBJt5smaerNlNNvPPW772obYP_v_6CePnoP0</recordid><startdate>20220808</startdate><enddate>20220808</enddate><creator>Geetha, B. T.</creator><creator>Mohan, Prakash</creator><creator>Mayuri, A. V. R.</creator><creator>Jackulin, T.</creator><creator>Aldo Stalin, J. L.</creator><creator>Anitha, Varagantham</creator><general>Hindawi</general><general>John Wiley &amp; Sons, Inc</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7QF</scope><scope>7QQ</scope><scope>7SC</scope><scope>7SE</scope><scope>7SP</scope><scope>7SR</scope><scope>7TA</scope><scope>7TB</scope><scope>7TK</scope><scope>7U5</scope><scope>7X7</scope><scope>7XB</scope><scope>8AL</scope><scope>8BQ</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BBNVY</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>CCPQU</scope><scope>CWDGH</scope><scope>DWQXO</scope><scope>F28</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>H8D</scope><scope>H8G</scope><scope>HCIFZ</scope><scope>JG9</scope><scope>JQ2</scope><scope>K7-</scope><scope>K9.</scope><scope>KR7</scope><scope>L6V</scope><scope>L7M</scope><scope>LK8</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M0S</scope><scope>M1P</scope><scope>M7P</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PSYQQ</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>7X8</scope><scope>5PM</scope><orcidid>https://orcid.org/0000-0002-7408-5938</orcidid></search><sort><creationdate>20220808</creationdate><title>Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System</title><author>Geetha, B. T. ; Mohan, Prakash ; Mayuri, A. V. R. ; Jackulin, T. ; Aldo Stalin, J. L. ; Anitha, Varagantham</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c453t-c85f54680e3153dca6e4804b1f6966f44c958db9c92aebcca90b40d2bcfe90123</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Birds</topic><topic>Cloud computing</topic><topic>Cryptography</topic><topic>Curves</topic><topic>Data encryption</topic><topic>Encryption</topic><topic>Health care</topic><topic>Image coding</topic><topic>Image enhancement</topic><topic>Image management</topic><topic>Informatics</topic><topic>Magnetic fields</topic><topic>Medical imaging</topic><topic>Medical imaging equipment</topic><topic>Medical informatics</topic><topic>Optimization</topic><topic>Performance enhancement</topic><topic>Population</topic><topic>Security</topic><topic>Technology application</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Geetha, B. T.</creatorcontrib><creatorcontrib>Mohan, Prakash</creatorcontrib><creatorcontrib>Mayuri, A. V. R.</creatorcontrib><creatorcontrib>Jackulin, T.</creatorcontrib><creatorcontrib>Aldo Stalin, J. L.</creatorcontrib><creatorcontrib>Anitha, Varagantham</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Aluminium Industry Abstracts</collection><collection>Ceramic Abstracts</collection><collection>Computer and Information Systems Abstracts</collection><collection>Corrosion Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>Materials Business File</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Neurosciences Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Health &amp; Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>Biological Science Collection</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>ProQuest One Community College</collection><collection>Middle East &amp; Africa Database</collection><collection>ProQuest Central Korea</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>Aerospace Database</collection><collection>Copper Technical Reference Library</collection><collection>SciTech Premium Collection</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>ProQuest Biological Science Collection</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Health &amp; Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Biological Science Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest - Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest One Psychology</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><jtitle>Computational intelligence and neuroscience</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Geetha, B. T.</au><au>Mohan, Prakash</au><au>Mayuri, A. V. R.</au><au>Jackulin, T.</au><au>Aldo Stalin, J. L.</au><au>Anitha, Varagantham</au><au>Kumar, Akshi</au><au>Akshi Kumar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System</atitle><jtitle>Computational intelligence and neuroscience</jtitle><date>2022-08-08</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>13</epage><pages>1-13</pages><issn>1687-5265</issn><eissn>1687-5273</eissn><abstract>Presently, technological advancements in the healthcare sector pose a challenging problem relevant to the security and privacy of health-related applications. Medical images can be considered significant and sensitive data in the medical informatics system. In order to transmit medical images in an open medium, the design of secure encryption algorithms becomes essential. Encryption can be considered one of the effective solutions for accomplishing security. Although numerous models have existed in the literature, they could not adaptable to the rising number of medicinal images in the health sector. At the same time, the optimal key generation process acts as a vital part in defining the performance of the encryption techniques. Therefore, this article presents a Pigeon Inspired Optimization with Encryption-based Secure Medical Image Management (PIOE-SMIM) technique. The proposed PIOE-SMIM approach majorly concentrates on the development of secret share creation (SSC) and the encryption process. At the initial stage, the medical images are converted into a collection of 12 shares using the SSC approach. In addition, an elliptic curve cryptography (ECC) scheme is employed for the encryption process. In order to optimum key creation procedure in the ECC model, the PIO technique is exploited with the aim of maximizing PSNR. Finally, on the receiver side, the decryption and share reconstruction processes are performed to construct the original images. The PIOE-SMIM model displayed an enhanced PSNR of 59.37 dB in image 1. Improved PSNR of 59.53 dB is given for image 5 using the PIOE-SMIM model. For demonstrating an enhanced performance of the PIOE-SMIM method, a widespread experimental study is made and the results highlighted the supremacy of the PIOE-SMIM model over other techniques.</abstract><cop>New York</cop><pub>Hindawi</pub><pmid>35978898</pmid><doi>10.1155/2022/2243827</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0002-7408-5938</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1687-5265
ispartof Computational intelligence and neuroscience, 2022-08, Vol.2022, p.1-13
issn 1687-5265
1687-5273
language eng
recordid cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_9377849
source Wiley Online Library Open Access; ProQuest - Publicly Available Content Database
subjects Algorithms
Birds
Cloud computing
Cryptography
Curves
Data encryption
Encryption
Health care
Image coding
Image enhancement
Image management
Informatics
Magnetic fields
Medical imaging
Medical imaging equipment
Medical informatics
Optimization
Performance enhancement
Population
Security
Technology application
title Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T12%3A31%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_pubme&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Pigeon%20Inspired%20Optimization%20with%20Encryption%20Based%20Secure%20Medical%20Image%20Management%20System&rft.jtitle=Computational%20intelligence%20and%20neuroscience&rft.au=Geetha,%20B.%20T.&rft.date=2022-08-08&rft.volume=2022&rft.spage=1&rft.epage=13&rft.pages=1-13&rft.issn=1687-5265&rft.eissn=1687-5273&rft_id=info:doi/10.1155/2022/2243827&rft_dat=%3Cgale_pubme%3EA714593148%3C/gale_pubme%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c453t-c85f54680e3153dca6e4804b1f6966f44c958db9c92aebcca90b40d2bcfe90123%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2704759847&rft_id=info:pmid/35978898&rft_galeid=A714593148&rfr_iscdi=true