{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:29:48Z","timestamp":1764937788954,"version":"3.28.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T00:00:00Z","timestamp":1725321600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T00:00:00Z","timestamp":1725321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Prog Artif Intell"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s13748-024-00335-y","type":"journal-article","created":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T12:02:16Z","timestamp":1725364936000},"page":"279-291","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Secured and efficient MLP algorithm based on Sand Cat Swarm Optimization and homomorphic encryption for healthcare data"],"prefix":"10.1007","volume":"13","author":[{"given":"Bhawana S.","family":"Dakhare","sequence":"first","affiliation":[]},{"given":"Lata L.","family":"Ragha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,3]]},"reference":[{"key":"335_CR1","doi-asserted-by":"crossref","unstructured":"Mahapatra, B., Krishnamurthi, R., Nayyar, A.: Healthcare models and algorithms for privacy and security in healthcare records. Security and privacy of electronic healthcare records: Concepts, paradigms and solutions. 183, (2019)","DOI":"10.1049\/PBHE020E_ch8"},{"key":"335_CR2","doi-asserted-by":"crossref","unstructured":"Ghazal, T.M.: Internet of things with artificial intelligence for health care security. Arab. J. Sci. Eng. (2021)","DOI":"10.1007\/s13369-021-06083-8"},{"key":"335_CR3","doi-asserted-by":"publisher","first-page":"12345","DOI":"10.1109\/ACCESS.2022.3145372","volume":"10","author":"K Kandasamy","year":"2022","unstructured":"Kandasamy, K., Srinivas, S., Achuthan, K., Rangan, V.P.: Digital healthcare-cyberattacks in Asian organizations: An analysis of vulnerabilities, risks, NIST perspectives, and recommendations. IEEE Access. 10, 12345\u201312364 (2022)","journal-title":"IEEE Access."},{"issue":"2","key":"335_CR4","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/TII.2022.3194590","volume":"19","author":"Y Wu","year":"2022","unstructured":"Wu, Y., Zhang, L., Berretti, S., Wan, S.: Medical image encryption by content-aware dna computing for secure healthcare. IEEE Trans. Industr. Inf. 19(2), 2089\u20132098 (2022)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"335_CR5","doi-asserted-by":"crossref","unstructured":"Maathavan, K.S.K., Venkatraman, S.: A Secure Encrypted Classified Electronic Healthcare Data for Public Cloud Environment. Intell. Autom. Soft Comput. 32(2), (2022)","DOI":"10.32604\/iasc.2022.022276"},{"issue":"13","key":"335_CR6","doi-asserted-by":"publisher","first-page":"14866","DOI":"10.1007\/s11227-022-04453-z","volume":"78","author":"J Nayak","year":"2022","unstructured":"Nayak, J., Meher, S.K., Souri, A., Naik, B., Vimal, S.: Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection. J. Supercomputing. 78(13), 14866\u201314891 (2022)","journal-title":"J. Supercomputing"},{"issue":"15","key":"335_CR7","doi-asserted-by":"publisher","first-page":"8693","DOI":"10.1007\/s00521-024-09531-2","volume":"36","author":"B Jin","year":"2024","unstructured":"Jin, B., Xu, X.: Forecasting wholesale prices of yellow corn through the gaussian process regression. Neural Comput. Appl. 36(15), 8693\u20138710 (2024)","journal-title":"Neural Comput. Appl."},{"issue":"4","key":"335_CR8","doi-asserted-by":"publisher","first-page":"101","DOI":"10.3390\/bdcc6040101","volume":"6","author":"MN Ramachandra","year":"2022","unstructured":"Ramachandra, M.N., Srinivasa Rao, M., Lai, W.C., Parameshachari, B.D., Ananda Babu, J., Hemalatha, K.L.: An efficient and secure big data storage in cloud environment by using triple data encryption standard. Big Data Cogn. Comput. 6(4), 101 (2022)","journal-title":"Big Data Cogn. Comput."},{"key":"335_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, F., Chen, Y., Meng, W., Wu, Q.: Hybrid encryption algorithms for medical data storage security in cloud database. International Journal of Database Management Systems (IJDMS). 11, (2019)","DOI":"10.5121\/ijdms.2019.11104"},{"issue":"1","key":"335_CR10","doi-asserted-by":"publisher","first-page":"59","DOI":"10.4018\/IJISP.2019010105","volume":"13","author":"P Gautam","year":"2019","unstructured":"Gautam, P., Ansari, M.D., Sharma, S.K.: Enhanced security for electronic health care information using obfuscation and RSA algorithm in cloud computing. Int. J. Inform. Secur. Priv. (IJISP). 13(1), 59\u201369 (2019)","journal-title":"Int. J. Inform. Secur. Priv. (IJISP)"},{"key":"335_CR11","doi-asserted-by":"publisher","first-page":"111837","DOI":"10.1016\/j.asoc.2024.111837","volume":"162","author":"S Karthick","year":"2024","unstructured":"Karthick, S., Muthukumaran, N.: Deep RegNet-150 architecture for single image super resolution of real-time unpaired image data. Applied Soft Computing. 162, 111837 (2024). https:\/\/doi.org\/10.1016\/j.asoc.2024.111837","journal-title":"Applied Soft Computing"},{"key":"335_CR12","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s40009-023-01353-5","volume":"47","author":"S Karthick","year":"2024","unstructured":"Karthick, S., Muthukumaran, N.: Deep Regression Network for Single-Image Super-Resolution Based on Down- and Upsampling with RCA Blocks. National Academy Science Letters. 47, 279-283 (2024). https:\/\/doi.org\/10.1007\/s40009-023-01353-5","journal-title":"National Academy Science Letters"},{"issue":"1","key":"335_CR13","first-page":"100001","volume":"1","author":"B Jin","year":"2024","unstructured":"Jin, B., Xu, X.: Price forecasting through neural networks for crude oil, heating oil, and natural gas. Measurement: Energy. 1(1), 100001 (2024)","journal-title":"Measurement: Energy"},{"key":"335_CR14","doi-asserted-by":"crossref","unstructured":"Khadidos, A.O., Shitharth, S., Khadidos, A.O., Sangeetha, K., Alyoubi, K.H.: Healthcare data security using IoT sensors based on random hashing mechanism. Journal of Sensors. 1\u201317 (2022) (2022)","DOI":"10.1155\/2022\/8457116"},{"key":"335_CR15","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1007\/s11277-020-07229-x","volume":"114","author":"K Tamilarasi","year":"2020","unstructured":"Tamilarasi, K., Jawahar, A.: Medical data security for healthcare applications using hybrid lightweight encryption and swarm optimization algorithm. Wireless Pers. Commun. 114, 1865\u20131886 (2020)","journal-title":"Wireless Pers. Commun."},{"key":"335_CR16","doi-asserted-by":"publisher","first-page":"21165","DOI":"10.1007\/s11042-021-10723-4","volume":"80","author":"R Denis","year":"2021","unstructured":"Denis, R., Madhubala, P.: Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems. Multimedia Tools Appl. 80, 21165\u201321202 (2021)","journal-title":"Multimedia Tools Appl."},{"key":"335_CR17","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1007\/s11277-019-06450-7","volume":"108","author":"V Sri Vigna Hema","year":"2019","unstructured":"Sri Vigna Hema, V., Kesavan, R.: ECC based secure sharing of healthcare data in the health cloud environment. Wireless Pers. Commun. 108, 1021\u20131035 (2019)","journal-title":"Wireless Pers. Commun."},{"key":"335_CR18","unstructured":"Yaseen, A.A., Patel, K., Yassin, A.A., Aldarwish, A.J., Hussein, H.A.: Secure Electronic Healthcare Record using Robust Authentication Scheme. IAENG Int. J. Comput. Sci. 50(2) (2023)"},{"key":"335_CR19","doi-asserted-by":"publisher","first-page":"54776","DOI":"10.1109\/ACCESS.2020.2980942","volume":"8","author":"GT Reddy","year":"2020","unstructured":"Reddy, G.T., Reddy, M.P.K., Lakshmanna, K., Kaluri, R., Rajput, D.S., Srivastava, G., Baker, T.: Analysis of dimensionality reduction techniques on big data. Ieee Access. 8, 54776\u201354788 (2020)","journal-title":"Ieee Access."},{"key":"335_CR20","doi-asserted-by":"publisher","first-page":"26163","DOI":"10.1109\/ACCESS.2022.3155882","volume":"10","author":"E Lee","year":"2022","unstructured":"Lee, E., Lee, J.W., Kim, Y.S., No, J.S.: Optimization of homomorphic comparison algorithm on rns-ckks scheme. IEEE Access. 10, 26163\u201326176 (2022)","journal-title":"IEEE Access."},{"issue":"8","key":"335_CR21","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.3390\/jpm12081208","volume":"12","author":"A Al Bataineh","year":"2022","unstructured":"Al Bataineh, A., Manacek, S.: MLP-PSO hybrid algorithm for heart disease prediction. J. Personalized Med. 12(8), 1208 (2022)","journal-title":"J. Personalized Med."},{"issue":"4","key":"335_CR22","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1007\/s00366-022-01604-x","volume":"39","author":"A Seyyedabbasi","year":"2023","unstructured":"Seyyedabbasi, A., Kiani, F.: Sand cat swarm optimization: A nature-inspired algorithm to solve global optimization problems. Eng. Comput. 39(4), 2627\u20132651 (2023)","journal-title":"Eng. Comput."},{"key":"335_CR23","unstructured":"FEDESORIANO: Kaggle: [https:\/\/www.kaggle.com\/datasets\/fedesoriano\/heart-failure-prediction]. (2021). Accessed on 24-10-2023."}],"container-title":["Progress in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13748-024-00335-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13748-024-00335-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13748-024-00335-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:23:27Z","timestamp":1729661007000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13748-024-00335-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,3]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["335"],"URL":"https:\/\/doi.org\/10.1007\/s13748-024-00335-y","relation":{},"ISSN":["2192-6352","2192-6360"],"issn-type":[{"type":"print","value":"2192-6352"},{"type":"electronic","value":"2192-6360"}],"subject":[],"published":{"date-parts":[[2024,9,3]]},"assertion":[{"value":"22 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article is a completely original work of its authors; it has not been published before and will not be sent to other publications until the journal\u2019s editorial board decides not to accept it for publication.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declared that they have no conflicts of interest to this work. We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}