Hybrid gradient descent golden eagle optimization (HGDGEO) algorithm-based efficient heterogeneous resource scheduling for big data processing on clouds

N Jagadish Kumar, C Balasubramanian - Wireless Personal …, 2023 - Springer
Resource scheduling is indispensable for enhancing the system performance during big
data processing on clouds. It is highly useful for attaining significant utilization of computing …

ModChain: a hybridized secure and scaling blockchain framework for IoT environment

P Pabitha, JC Priya, R Praveen… - International Journal of …, 2023 - Springer
Abstract Internet-of-Things (IoT) has become much more ubiquitous in the present era as
numerous novel applications employing it with technical units are being adapted to interact …

Improved Gentry–Halevi's fully homomorphic encryption‐based lightweight privacy preserving scheme for securing medical Internet of Things

R Praveen, P Pabitha - Transactions on Emerging …, 2023 - Wiley Online Library
Abstract Internet of Medical Things (IoMT) solutions have proliferated rapidly in the COVID‐
19 pandemic era. The smart medical sensors capture real‐time data from remote patients …

A comparative study of deep learning models for ecg signal-based user classification

P Pabitha, R Praveen, KCJ Chandana… - 2023 12th …, 2023 - ieeexplore.ieee.org
In recent years, Deep Learning (DL) has gained significant attention and has been
extensively studied across various fields, including healthcare. In the context of healthcare …

A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications

R Praveen, P Pabitha - Journal of Intelligent & Fuzzy Systems, 2023 - content.iospress.com
Abstract The Internet of Medical Things (IoMT) is a network of medical devices, hardware
infrastructure, and software that allows healthcare information technology to be …

Pythagorean Fuzzy Sets-based VIKOR and TOPSIS-based multi-criteria decision-making model for mitigating resource deletion attacks in WSNs

S Madhavi, NC Santhosh, S Rajkumar… - Journal of Intelligent …, 2023 - content.iospress.com
Abstract In Wireless Sensor Networks (WSNs), resource depletion attacks that focusses on
the compromization of routing protocol layer is identified to facilitate a major influence over …

Ask-ram-imot: Autonomous shared keys based remote authentication method for internet of medical things applications

P Ramalingam, P Pabitha - Wireless Personal Communications, 2023 - Springer
Recent developments in the Internet of Things have led to the notion of the Internet of
Medical Things (IoMT) designed to enhance the standard of healthcare for user-specific …

Breast cancer diagnosis using orca predation optimization algorithm

P Kaladevi, VV Punitha… - Journal of Intelligent …, 2023 - content.iospress.com
Early detection and classification of breast cancer can be facilitated to initiate the most
effective treatment. As the second leading cause of death among women, early breast …

Parameter Investigation Study On Task Scheduling in Cloud Computing

MS Kumar, GR Karri - 2023 12th International Conference on …, 2023 - ieeexplore.ieee.org
The term parameter investigation study is to describe the process of examining different
factors that have an effect on the efficiency of work scheduling algorithms in cloud …

Cryptanalysis of biometric based secure user authentication protocol for iot applications

P Ramalingam, P Pabitha - 2022 3rd International Conference …, 2022 - ieeexplore.ieee.org
In the 21st century various Biometric based user authentication schemes for Internet of
Things network applications are evolving. As a part, Vinoth et al. proposed an Biometric …