{"id":"https://openalex.org/W4415944075","doi":"https://doi.org/10.1016/j.jii.2025.101007","title":"A Novel graph-embedded musical chairs optimization with secure elliptic encryption framework for intelligent edge computing in healthcare iot networks","display_name":"A Novel graph-embedded musical chairs optimization with secure elliptic encryption framework for intelligent edge computing in healthcare iot networks","publication_year":2025,"publication_date":"2025-11-06","ids":{"openalex":"https://openalex.org/W4415944075","doi":"https://doi.org/10.1016/j.jii.2025.101007"},"language":"en","primary_location":{"id":"doi:10.1016/j.jii.2025.101007","is_oa":false,"landing_page_url":"https://doi.org/10.1016/j.jii.2025.101007","pdf_url":null,"source":{"id":"https://openalex.org/S2898195457","display_name":"Journal of Industrial Information Integration","issn_l":"2452-414X","issn":["2452-414X","2467-964X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Industrial Information Integration","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"R. Gowthamani","orcid":null},"institutions":[{"id":"https://openalex.org/I4210133257","display_name":"KPR Institute of Engineering and Technology","ror":"https://ror.org/02q9f3a53","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210133257"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"R. Gowthamani","raw_affiliation_strings":["Department of Computer Science and Engineering, Sri Krishna College of Engineering and Technology, Kuniamuthur, Coimbatore, 641008, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Sri Krishna College of Engineering and Technology, Kuniamuthur, Coimbatore, 641008, Tamil Nadu, India","institution_ids":["https://openalex.org/I4210133257"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087408931","display_name":"S. Oswalt Manoj","orcid":"https://orcid.org/0000-0001-8251-2920"},"institutions":[{"id":"https://openalex.org/I4210133257","display_name":"KPR Institute of Engineering and Technology","ror":"https://ror.org/02q9f3a53","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210133257"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Oswalt Manoj","raw_affiliation_strings":["Department of Computer Science and Engineering, Sri Krishna College of Engineering and Technology, Kuniamuthur, Coimbatore, 641008, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Sri Krishna College of Engineering and Technology, Kuniamuthur, Coimbatore, 641008, Tamil Nadu, India","institution_ids":["https://openalex.org/I4210133257"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210133257"],"apc_list":{"value":2780,"currency":"USD","value_usd":2780},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.36987045,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"49","issue":null,"first_page":"101007","last_page":"101007"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.16660000383853912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.16660000383853912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.07959999889135361,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.05339999869465828,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6399000287055969},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.6348999738693237},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4302000105381012},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.3986999988555908},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3896999955177307},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.3847000002861023},{"id":"https://openalex.org/keywords/low-latency","display_name":"Low latency (capital markets)","score":0.3675999939441681},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.35339999198913574},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.32440000772476196},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.3222000002861023}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.754800021648407},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6399000287055969},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.6348999738693237},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4302000105381012},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4212000072002411},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.3986999988555908},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3896999955177307},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.3847000002861023},{"id":"https://openalex.org/C46637626","wikidata":"https://www.wikidata.org/wiki/Q6693015","display_name":"Low latency (capital markets)","level":2,"score":0.3675999939441681},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.35339999198913574},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.32440000772476196},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.3222000002861023},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.32199999690055847},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.320499986410141},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.3156999945640564},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.30329999327659607},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.302700012922287},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.30239999294281006},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.29089999198913574},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.2903999984264374},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27959999442100525},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.27619999647140503},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.27619999647140503},{"id":"https://openalex.org/C197298091","wikidata":"https://www.wikidata.org/wiki/Q5318963","display_name":"Dynamic data","level":2,"score":0.2761000096797943},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2761000096797943},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.27250000834465027},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.27079999446868896},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.265500009059906},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2630999982357025},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C149672232","wikidata":"https://www.wikidata.org/wiki/Q337048","display_name":"Adaptive optimization","level":2,"score":0.25850000977516174},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.25589999556541443}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.jii.2025.101007","is_oa":false,"landing_page_url":"https://doi.org/10.1016/j.jii.2025.101007","pdf_url":null,"source":{"id":"https://openalex.org/S2898195457","display_name":"Journal of Industrial Information Integration","issn_l":"2452-414X","issn":["2452-414X","2467-964X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Industrial Information Integration","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W4220792723","https://openalex.org/W4225340709","https://openalex.org/W4285993124","https://openalex.org/W4296112435","https://openalex.org/W4313555592","https://openalex.org/W4316369084","https://openalex.org/W4318694123","https://openalex.org/W4381188480","https://openalex.org/W4386825138","https://openalex.org/W4391188276","https://openalex.org/W4391347706","https://openalex.org/W4391517491","https://openalex.org/W4392863983","https://openalex.org/W4399462342","https://openalex.org/W4400264547","https://openalex.org/W4405584328","https://openalex.org/W4406137943","https://openalex.org/W4407930042"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-11-06T00:00:00"}
