1
|
Zahedian Nezhad M, Bojnordi AJJ, Mehraeen M, Bagheri R, Rezazadeh J. Securing the future of IoT-healthcare systems: A meta-synthesis of mandatory security requirements. Int J Med Inform 2024; 185:105379. [PMID: 38417238 DOI: 10.1016/j.ijmedinf.2024.105379] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/06/2023] [Revised: 01/30/2024] [Accepted: 02/13/2024] [Indexed: 03/01/2024]
Abstract
INTRODUCTION Healthcare-based Internet of Things (Healthcare-IoT) is a turning point in the development of health information systems. This emerging trend significantly contributes to enhancing users' awareness of their health, ultimately leading to an extension in life expectancy. Security and privacy are among the greatest challenges for H-IoT systems. To establish complete safety and security in these systems, the implementation of mandatory security requirements is imperative. For this reason, this study identifies the necessary security requirements for H-IoT systems using a Meta-Synthesis approach. METHODS Initially, following the Seven-Stage Sandelowski & Barroso approach, the existing literature was searched in the Scopus and Web of Science databases. Among the 844 extracted articles from the period of 2010 to 2020, 78 final articles were reviewed and analyzed, leading to the identification of 51 security requirements. Subsequently, to assess the quality of the identified requirements and their overlap, interviews were conducted with two experts. RESULTS Finally, 14 security requirements, predominantly with technical and quantitative aspects, were identified for designing a Healthcare-IoT system and implementing security mechanisms. CONCLUSION The findings of this study emphasize that addressing the identified 14 security requirements is crucial for safeguarding Healthcare-IoT systems and ensuring their robustness in the evolving health information landscape.
Collapse
Affiliation(s)
- Mahmoud Zahedian Nezhad
- Faculty of Economic and Administrative Sciences, Ferdowsi University of Mashhad, Mashhad, Iran
| | | | - Mohammad Mehraeen
- Faculty of Economic and Administrative Sciences, Ferdowsi University of Mashhad, Mashhad, Iran.
| | - Rouholla Bagheri
- Faculty of Economic and Administrative Sciences, Ferdowsi University of Mashhad, Mashhad, Iran.
| | - Javad Rezazadeh
- Crown Institute of Higher Education (CIHE), Sydney, Australia
| |
Collapse
|
2
|
Gupta DS, Mazumdar N, Nag A, Singh JP. Secure data authentication and access control protocol for industrial healthcare system. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2023; 14:4853-4864. [PMID: 36684481 PMCID: PMC9838518 DOI: 10.1007/s12652-022-04370-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/02/2021] [Accepted: 07/30/2022] [Indexed: 05/25/2023]
Abstract
Because of recent COVID-19 epidemic, the Internet-of-Medical-Things (IoMT) has acquired a significant impetus to diagnose patients remotely, regulate medical equipment, and track quarantined patients via smart electronic devices installed at the patient's end. Nevertheless, the IoMT confronts various security and privacy issues, such as entity authentication, confidentiality, and integrity of health-related data, among others, rendering this technology vulnerable to different attacks. To address these concerns, a number of security procedures based on traditional cryptographic approaches, such as discrete logarithm and integer factorization problems, have been developed. All of these protocols, however, are vulnerable to quantum attacks. This paper, in this context, presents a data authentication and access control protocol for IoMT systems that can withstand quantum attacks. A comprehensive formal security assessment demonstrates that the proposed algorithm can endure both current and future threats. In terms of data computing, transmission, and key storage overheads, it also surpasses other related techniques.
Collapse
Affiliation(s)
- Daya Sagar Gupta
- Department of Computer Science and Engineering, Rajiv Gandhi Institute of Petroleum Technology Jais, Amethi, UP 229304 India
| | - Nabajyoti Mazumdar
- Department of Information Technology, Indian Institute of Information Technology Allahabad, Prayagraj, India
| | - Amitava Nag
- Department of Computer Science and Engineering, Central Institute of Technology Kokrajhar, BTR, Kokrajhar, India
| | - Jyoti Prakash Singh
- Department of Computer Science and Engineering, National Institute of Technology Patna, Patna, India
| |
Collapse
|
3
|
Fu J, Wang H, Na R, Jisaihan A, Wang Z, Ohno Y. Recent advancements in digital health management using multi-modal signal monitoring. MATHEMATICAL BIOSCIENCES AND ENGINEERING : MBE 2023; 20:5194-5222. [PMID: 36896542 DOI: 10.3934/mbe.2023241] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/18/2023]
Abstract
Healthcare is the method of keeping or enhancing physical and mental well-being with its aid of illness and injury prevention, diagnosis, and treatment. The majority of conventional healthcare practices involve manual management and upkeep of client demographic information, case histories, diagnoses, medications, invoicing, and drug stock upkeep, which can result in human errors that have an impact on clients. By linking all the essential parameter monitoring equipment through a network with a decision-support system, digital health management based on Internet of Things (IoT) eliminates human errors and aids the doctor in making more accurate and timely diagnoses. The term "Internet of Medical Things" (IoMT) refers to medical devices that have the ability to communicate data over a network without requiring human-to-human or human-to-computer interaction. Meanwhile, more effective monitoring gadgets have been made due to the technology advancements, and these devices can typically record a few physiological signals simultaneously, including the electrocardiogram (ECG) signal, the electroglottography (EGG) signal, the electroencephalogram (EEG) signal, and the electrooculogram (EOG) signal. Yet, there has not been much research on the connection between digital health management and multi-modal signal monitoring. To bridge the gap, this article reviews the latest advancements in digital health management using multi-modal signal monitoring. Specifically, three digital health processes, namely, lower-limb data collection, statistical analysis of lower-limb data, and lower-limb rehabilitation via digital health management, are covered in this article, with the aim to fully review the current application of digital health technology in lower-limb symptom recovery.
Collapse
Affiliation(s)
- Jiayu Fu
- Department of Mathematical Health Science, Graduate School of Medicine, Osaka University, Osaka 5650871, Japan
| | - Haiyan Wang
- Ma'anshan University, maanshan 243000, China
| | - Risu Na
- Department of Mathematical Health Science, Graduate School of Medicine, Osaka University, Osaka 5650871, Japan
- Shanghai Jian Qiao University, Shanghai 201315, China
| | - A Jisaihan
- Department of Mathematical Health Science, Graduate School of Medicine, Osaka University, Osaka 5650871, Japan
| | - Zhixiong Wang
- Department of Mathematical Health Science, Graduate School of Medicine, Osaka University, Osaka 5650871, Japan
- Ma'anshan University, maanshan 243000, China
| | - Yuko Ohno
- Department of Mathematical Health Science, Graduate School of Medicine, Osaka University, Osaka 5650871, Japan
| |
Collapse
|
4
|
Fu J, Wang H, Na R, Jisaihan A, Wang Z, Ohno Y. A novel "five-in-one" comprehensive medical care framework for rehabilitation and nursing. MATHEMATICAL BIOSCIENCES AND ENGINEERING : MBE 2023; 20:5004-5023. [PMID: 36896533 DOI: 10.3934/mbe.2023232] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/18/2023]
Abstract
With the evolution of society, the world has entered a moderate stage of aging. Not surprisingly, the aging problem in the world is getting more intense, resulting in the increasing demand for higher-quality and well-organized medical and elderly care services. To cope with that, many researchers have dedicated themselves to advancing the medical care system based on data or platforms. However, they have ignored the life cycle, health service and management and the inevitable shift of living scenarios for the elderly. Therefore, the study aims to improve health conditions and enhance senior citizens' life quality and happiness index. In this paper, we build a unified body for people in their old age, bridging the disconnection between medical care and elderly care and constructing the "five-in-one" comprehensive medical care framework. It should be mentioned that the system takes the human life cycle as its axis, relies on the supply side and supply chain management, integrates medicine, industry, literature and science as methods, and takes health service management as a requirement. Furthermore, a case study on upper limb rehabilitation is elaborated along the "five-in-one" comprehensive medical care framework to confirm the effectiveness of the novel system.
Collapse
Affiliation(s)
- Jiayu Fu
- Department of Mathematical Health Science, Graduate School of Medicine, Osaka University, Osaka 5650871, Japan
| | - Haiyan Wang
- Ma'anshan University, Ma'anshan 243000, China
| | - Risu Na
- Department of Mathematical Health Science, Graduate School of Medicine, Osaka University, Osaka 5650871, Japan
- Shanghai Jian Qiao University, Shanhai 201315, China
| | - A Jisaihan
- Department of Mathematical Health Science, Graduate School of Medicine, Osaka University, Osaka 5650871, Japan
| | - Zhixiong Wang
- Department of Mathematical Health Science, Graduate School of Medicine, Osaka University, Osaka 5650871, Japan
- Ma'anshan University, Ma'anshan 243000, China
| | - Yuko Ohno
- Department of Mathematical Health Science, Graduate School of Medicine, Osaka University, Osaka 5650871, Japan
| |
Collapse
|
5
|
Tarannum S, Jabin S. Prioritizing severity level of COVID-19 using correlation coefficient and intuitionistic fuzzy logic. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY 2022; 14:2469-2475. [PMID: 35669982 PMCID: PMC9152827 DOI: 10.1007/s41870-022-00971-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/03/2022] [Accepted: 04/23/2022] [Indexed: 11/26/2022]
Affiliation(s)
- Shahla Tarannum
- Department of Computer Science, Faculty of Natural Sciences, Jamia Millia Islamia, New Delhi, India
| | - Suraiya Jabin
- Department of Computer Science, Faculty of Natural Sciences, Jamia Millia Islamia, New Delhi, India
| |
Collapse
|
6
|
Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues. APPLIED SCIENCES-BASEL 2022. [DOI: 10.3390/app12157487] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/10/2022]
Abstract
The Internet of Medical Things (IoMT) has revolutionized the world of healthcare by remotely connecting patients to healthcare providers through medical devices connected over the Internet. IoMT devices collect patients’ medical data and share them with healthcare providers, who analyze it for early control of diseases. The security of patients’ data is of prime importance in IoMT. Authentication of users and devices is the first layer of security in IoMT. However, because of diverse and resource-constrained devices, authentication in IoMT is a challenging task. Several authentication schemes for IoMT have been proposed in the literature. However, each of them has its own pros and cons. To identify, evaluate and summarize the current literature on authentication in IoMT, we conducted a systematic review of 118 articles published between 2016 and 2021. We also established a taxonomy of authentication schemes in IoMT from seven different perspectives. We observed that most of the authentication schemes use a distributed architecture and public key infrastructure. It was also observed that hybrid cryptography approaches have become popular to overcome the shortcomings of single cryptographic approaches. Authentication schemes in IoMT need to support end-to-end, cross-layer, and cross-domain authentication. Finally, we discuss some open issues and future directions.
Collapse
|
7
|
IoT Solution for AI-Enabled PRIVACY-PREServing with Big Data Transferring: An Application for Healthcare Using Blockchain. ENERGIES 2021. [DOI: 10.3390/en14175364] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
Internet of Things (IoT) performs a vital role in providing connectivity between computing devices, processes, and things. It significantly increases the communication facilities and giving up-to-date information to distributed networks. On the other hand, the techniques of artificial intelligence offer numerous and valuable services in emerging fields. An IoT-based healthcare solution facilitates patients, hospitals, and professionals to observe real-time and critical data. In the literature, most of the solution suffers from data intermission, high ethical standards, and trustworthiness communication. Moreover, network interruption with recurrent expose of sensitive and personal health data decreases the reliance on network systems. Therefore, this paper intends to propose an IoT solution for AI-enabled privacy-preserving with big data transferring using blockchain. Firstly, the proposed algorithm uses a graph-modeling to develop a scalable and reliable system for gathering and transmitting data. In addition, it extracts the subset of nodes using the artificial intelligence approach and achieves efficient services for the healthcare system. Secondly, symmetric-based digital certificates are utilized to offer authentic and confidential transmission with communication resources using blockchain. The proposed algorithm is explored with existing solutions through multiple simulations and proved improvement in terms of realistic parameters.
Collapse
|
8
|
Javaid M, Khan IH. Internet of Things (IoT) enabled healthcare helps to take the challenges of COVID-19 Pandemic. J Oral Biol Craniofac Res 2021; 11:209-214. [PMID: 33665069 PMCID: PMC7897999 DOI: 10.1016/j.jobcr.2021.01.015] [Citation(s) in RCA: 53] [Impact Index Per Article: 17.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/25/2020] [Accepted: 01/23/2021] [Indexed: 02/06/2023] Open
Abstract
BACKGROUND/OBJECTIVES The Internet of Things (IoT) can create disruptive innovation in healthcare. Thus, during COVID-19 Pandemic, there is a need to study different applications of IoT enabled healthcare. For this, a brief study is required for research directions. METHODS Research papers on IoT in healthcare and COVID-19 Pandemic are studied to identify this technology's capabilities. This literature-based study may guide professionals in envisaging solutions to related problems and fighting against the COVID-19 type pandemic. RESULTS Briefly studied the significant achievements of IoT with the help of a process chart. Then identifies seven major technologies of IoT that seem helpful for healthcare during COVID-19 Pandemic. Finally, the study identifies sixteen basic IoT applications for the medical field during the COVID-19 Pandemic with a brief description of them. CONCLUSIONS In the current scenario, advanced information technologies have opened a new door to innovation in our daily lives. Out of these information technologies, the Internet of Things is an emerging technology that provides enhancement and better solutions in the medical field, like proper medical record-keeping, sampling, integration of devices, and causes of diseases. IoT's sensor-based technology provides an excellent capability to reduce the risk of surgery during complicated cases and helpful for COVID-19 type pandemic. In the medical field, IoT's focus is to help perform the treatment of different COVID-19 cases precisely. It makes the surgeon job easier by minimising risks and increasing the overall performance. By using this technology, doctors can easily detect changes in critical parameters of the COVID-19 patient. This information-based service opens up new healthcare opportunities as it moves towards the best way of an information system to adapt world-class results as it enables improvement of treatment systems in the hospital. Medical students can now be better trained for disease detection and well guided for the future course of action. IoT's proper usage can help correctly resolve different medical challenges like speed, price, and complexity. It can easily be customised to monitor calorific intake and treatment like asthma, diabetes, and arthritis of the COVID-19 patient. This digitally controlled health management system can improve the overall performance of healthcare during COVID-19 pandemic days.
Collapse
Affiliation(s)
- Mohd Javaid
- Department of Mechanical Engineering, Jamia Millia Islamia, New Delhi, India
| | - Ibrahim Haleem Khan
- School of Engineering Sciences and Technology, Jamia Hamdard, New Delhi, India
| |
Collapse
|
9
|
Chen J, Huang Z, Zhou Y, Zou F, Chen C, Wu JM, Wu T. Efficient certificate‐based aggregate signature scheme for vehicular
ad hoc
networks. IET NETWORKS 2020. [DOI: 10.1049/iet-net.2020.0019] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
Affiliation(s)
- Jian‐Neng Chen
- Key Laboratory of Data Science and Intelligence ApplicationZhangzhou363000People's Republic of China
- Lab of Granular ComputingMinnan Normal UniversityZhangzhou363000People's Republic of China
| | - Zhen‐Jie Huang
- Key Laboratory of Data Science and Intelligence ApplicationZhangzhou363000People's Republic of China
- Lab of Granular ComputingMinnan Normal UniversityZhangzhou363000People's Republic of China
| | - Yu‐Ping Zhou
- Key Laboratory of Data Science and Intelligence ApplicationZhangzhou363000People's Republic of China
- Lab of Granular ComputingMinnan Normal UniversityZhangzhou363000People's Republic of China
| | - Fu‐Min Zou
- Fujian Key Laboratory of Automotive Electronics and Electric DriveFuzhou350008People's Republic of China
- Fujian Provincial Key Laboratory of Big Data Mining and ApplicationsFujian University of TechnologyNo. 3, Xueyuan Road, University TownMinhouPeople's Republic of China
- National Demonstration Center for Experimental Electronic Information and Electrical Technology EducationFujian University of TechnologyFuzhou350008People's Republic of China
| | - Chien‐Ming Chen
- College of Computer Science and EngineeringShandong University of Science and TechnologyQingdao266590People's Republic of China
| | - Jimmy Ming‐Tai Wu
- College of Computer Science and EngineeringShandong University of Science and TechnologyQingdao266590People's Republic of China
| | - Tsu‐Yang Wu
- College of Computer Science and EngineeringShandong University of Science and TechnologyQingdao266590People's Republic of China
| |
Collapse
|
10
|
Peng C, Chen J, Zhou L, Raymond Choo KK, He D. CsiIBS: A post-quantum identity-based signature scheme based on isogenies. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2020. [DOI: 10.1016/j.jisa.2020.102504] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
11
|
Human Body Heat Based Thermoelectric Harvester with Ultra-Low Input Power Management System for Wireless Sensors Powering. ENERGIES 2019. [DOI: 10.3390/en12203942] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Energy harvesting (EH) technique has been proposed as a favorable solution for addressing the power supply exhaustion in a wireless sensor node and prolong the operating time for a wireless sensor network. Thermoelectric energy generator (TEG) is a valuable device converting the waste heat into electricity which can be collected and stored for electronics. In this paper, the thermal energy from human body is captured and converted to the low electrical energy by means of thermoelectric energy harvester. The aim of presented work is utilizing the converted electricity to power the related electronic device and to extend the working life of a sensor node. Considering the related characteristics of TEG used for human, a type of a novel power management system is designed and presented to harvest generated electricity. The proposed circuit is developed based on off-the-shelf commercial chips, LTC3108 and BQ25504. It can accept the lowest input voltage of 20 mV, which is more suitable for human thermoelectric energy harvesting. Through experiments, developed energy harvesting system can effectively power the sensor to intermittently transmit the data as well as perform the converted energy storage. Compared to the independent commercial chips applications and other microcontroller-based energy harvesting systems, the designed thermoelectric energy harvester system presents the advantages not only in high energy storage utilization rate but also the ultra-low input voltage characteristic. Since the heat from human body is harvested, therefore, the system can possibly be used to power the sensor placed on human body and has practical applications such as physiological parameter monitoring.
Collapse
|
12
|
Sparse coding-based feature extraction for biometric remote authentication in Internet of Things. SN APPLIED SCIENCES 2019. [DOI: 10.1007/s42452-019-1135-7] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/26/2022] Open
|
13
|
Kavitha S, Alphonse PJA, Reddy YV. An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System. J Med Syst 2019; 43:260. [PMID: 31267216 DOI: 10.1007/s10916-019-1378-2] [Citation(s) in RCA: 22] [Impact Index Per Article: 4.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/02/2019] [Accepted: 06/05/2019] [Indexed: 11/27/2022]
Abstract
Due to tremendous development in the network technologies forms an Internet of Things (IoT) based Health Care System (HCS) is an essential application in day-today life. In HCS, constitute a group communication among doctors, patient, caretaker, ambulance, and hospital, which intern's devices transfer personal information from one to many group members. Providing security on the personal health information is the most critical issue, because malicious access on this information may leads to life threads. Concurrently, traditional cryptographic framework has unsuccessful to protection to the HCS over lightweight communications network. So, the proposed framework deals the security flaws through hyper elliptic curve based public key cryptosystem, which combines Digital Signature algorithm, Elgamal approaches that ensure the entity authentication and secure group communication. The performance of the proposed work analyzed using efficient security measures and compared with related schemes.
Collapse
Affiliation(s)
- S Kavitha
- Department of Computer Applications, National Institute of Technology, Tiruchirapalli, Tamilnadu, India.
| | - P J A Alphonse
- Department of Computer Applications, National Institute of Technology, Tiruchirapalli, Tamilnadu, India
| | | |
Collapse
|
14
|
Li CT, Shih DH, Wang CC. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE 2018; 157:191-203. [PMID: 29477428 DOI: 10.1016/j.cmpb.2018.02.002] [Citation(s) in RCA: 15] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/12/2017] [Revised: 01/25/2018] [Accepted: 02/02/2018] [Indexed: 06/08/2023]
Abstract
BACKGROUND AND OBJECTIVE With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated. METHODS Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks. RESULTS The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS. CONCLUSIONS We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features for privacy preservation and effectively cope with cloud-assisted TMIS with better efficiency.
Collapse
Affiliation(s)
- Chun-Ta Li
- Department of Information Management, Tainan University of Technology, 529 Zhongzheng Road, Tainan City 71002, Taiwan, ROC.
| | - Dong-Her Shih
- Department of Information Management, National Yunlin University of Science and Technology, 123 University Road, Yunlin 64002, Taiwan, ROC.
| | - Chun-Cheng Wang
- Department of Information Management, National Yunlin University of Science and Technology, 123 University Road, Yunlin 64002, Taiwan, ROC
| |
Collapse
|