Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
                                            Some full text articles may not yet be available without a charge during the embargo (administrative interval).
                                        
                                        
                                        
                                            
                                                
                                             What is a DOI Number?
                                        
                                    
                                
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
- 
            In the rapidly growing consumer electronics industry, continuous innovation drives increasing demand for smart devices and advanced gadgets. However, this sector faces changing demands and complex supply chains due to the management of rapid technological advancements and consumer expectations. Seamless communication between suppliers and consumers is essential to optimize production processes, minimize waste, and enhance overall customer satisfaction. In response to these demands, this paper presents a solution that combines Digital Twins (DT) and blockchain to improve security and efficiency in metaverse-inspired consumer-oriented supply chains. Herein, DT is used to represent products in virtual spaces and blockchain secures sensitive information using encryption and access controls. Our objective is to create a transparent, secure, and user-friendly system where consumers and suppliers can interact in real-time to verify product details and access important information of featured tasks like warranties and payment settlement. Smart contracts automates these tasks to make processes faster and more reliable. Through experiments, we tested how well the system maintains product integrity, authenticates transactions, and supports consumer-oriented supply chain (CSC) operations. Comparative analysis shows that our approach improves security, performance, and scalability over existing methods. Furthermore, the proposed system not only enhances security, trust, and transparency in CSC but also sets a higher standard for consumer demands and satisfaction. The findings point to the potential solution for future innovations in metaverse-driven CSC management systems.more » « less
- 
            In the era of pervasive digital connectivity, intelligent surveillance systems (ISS) have become essential tools for ensuring public safety, protecting critical infrastructure, and deterring security threats in various environments. The current state of these systems heavily relies on the computational capabilities of mobile devices for tasks such as real-time video analysis, object detection, and tracking. However, the limited processing power and energy constraints of these devices hinder their ability to perform these tasks efficiently and effectively. The dynamic nature of the surveillance environment also adds complexity to the task-offloading process. To address this issue, mobile edge computing (MEC) comes into play by offering edge servers with higher computational capabilities and proximity to mobile devices. It enables ISS by offloading computationally intensive tasks from resource-constrained mobile devices to nearby MEC servers. Therefore, in this paper, we propose and implement an energy-efficient and cost-effective task-offloading framework in the MEC environment. The amalgamation of binary and partial task-offloading strategies is used to achieve a cost-effective and energy-efficient system. We also compare the proposed framework in MEC with mobile cloud computing (MCC) environments. The proposed framework addresses the challenge of achieving energy-efficient and cost-effective solutions in the context of MEC for ISS. The iFogSim simulator is used for implementation and simulation purposes. The simulation results show that the proposed framework reduces latency, cost, execution time, network usage, and energy consumption.more » « less
- 
            Electronic Health Records (EHRs) have become increasingly popular in recent years, providing a convenient way to store, manage and share relevant information among healthcare providers. However, as EHRs contain sensitive personal information, ensuring their security and privacy is most important. This paper reviews the key aspects of EHR security and privacy, including authentication, access control, data encryption, auditing, and risk management. Additionally, the paper dis- cusses the legal and ethical issues surrounding EHRs, such as patient consent, data ownership, and breaches of confidentiality. Effective implementation of security and privacy measures in EHR systems requires a multi-disciplinary approach involving healthcare providers, IT specialists, and regulatory bodies. Ultimately, the goal is to come upon a balance between protecting patient privacy and ensuring timely access to critical medical information for feature healthcare delivery.more » « less
- 
            Free, publicly-accessible full text available February 1, 2026
- 
            The Internet of Medical Things (IoMT) is a network of interconnected medical devices, wearables, and sensors integrated into healthcare systems. It enables real-time data collection and transmission using smart medical devices with trackers and sensors. IoMT offers various benefits to healthcare, including remote patient monitoring, improved precision, and personalized medicine, enhanced healthcare efficiency, cost savings, and advancements in telemedicine. However, with the increasing adoption of IoMT, securing sensitive medical data becomes crucial due to potential risks such as data privacy breaches, compromised health information integrity, and cybersecurity threats to patient information. It is necessary to consider existing security mechanisms and protocols and identify vulnerabilities. The main objectives of this paper aim to identify specific threats, analyze the effectiveness of security measures, and provide a solution to protect sensitive medical data. In this paper, we propose an innovative approach to enhance security management for sensitive medical data using blockchain technology and smart contracts within the IoMT ecosystem. The proposed system aims to provide a decentralized and tamper-resistant plat- form that ensures data integrity, confidentiality, and controlled access. By integrating blockchain into the IoMT infrastructure, healthcare organizations can significantly enhance the security and privacy of sensitive medical data.more » « less
 An official website of the United States government
An official website of the United States government 
				
			 
					 
					
 
                                     Full Text Available
                                                Full Text Available