Future data center energy-conservation and emission-reduction technologies in the context of smart and low-carbon city construction

H Zhu, D Zhang, HH Goh, S Wang, T Ahmad… - Sustainable Cities and …, 2023 - Elsevier
The energy consumption of data centers accounts for approximately 1% of that of the world,
the average power usage effectiveness is in the range of 1.4–1.6, and the associated carbon …

Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation

MA Khatun, SF Memon, C Eising, LL Dhirani - IEEE Access, 2023 - ieeexplore.ieee.org
The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-
driven infrastructure that highly relies on smart sensing devices (ie, blood pressure monitors …

A novel private encryption model in IoT under cloud computing domain

S Yadala, CSR Pundru, VK Solanki - The International Conference on …, 2023 - Springer
The presence of the Internet of Things (IoT) works with the assortment and diffusion of
metropolitan information data. In any case, it can release clients' very own security data in …

Soft computing in computer network security protection system with machine learning based on level protection in the cloud environment

M Thomas, MV Gupta, V Gokul Rajan, R Rajalakshmi… - Soft Computing, 2023 - Springer
Artificial neural networks (ANN), fuzzy inference systems, approximate reasoning, and
derivative-free optimization approaches like evolutionary computation, among others, are all …

Advancing reliability and efficiency of urban communication: Unmanned aerial vehicles, intelligent reflection surfaces, and deep learning techniques

C Li, X Qiang - Heliyon, 2024 - cell.com
Unmanned aerial vehicles (UAVs) have garnered attention for their potential to improve
wireless communication networks by establishing line-of-sight (LoS) connections. However …

Real Cyber Value at Risk: An Approach to Estimate Economic Impacts of Cyberattacks on Businesses

F Künzler - 2023 - zora.uzh.ch
To compete in today's digitized economy, companies rely on computer programs to manage
processes efficiently and bring their services directly to customers. However, these tools …

Study and investigation of cloud based security policies using machine learning techniques

V Joon, A De, N Mishra - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
In recent days, most organizations have started to use cloud environments and various
cloud services. To secure and secure the operations that an organization performs in the …

Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures

C Tamizshelvan, V Vijayalakshmi - Wireless Networks, 2024 - Springer
To address the concerns about security and privacy in cloud-based data storage, this study
proposes a unique approach to secure cloud-based data governance using hybrid machine …

Separation of Powers in India

D Sharma - Available at SSRN, 2023 - papers.ssrn.com
The underlying idea of the doctrine of separation of power is that the organs of the
government do not overlap or interchange the functions that are exercised by them …

AI-Driven Cloud Computing to Revolutionize Industries and Overcome Challenges

S Poonguzhali, A Revathi - Emerging Trends in Cloud Computing …, 2024 - igi-global.com
In recent years, the convergence of artificial intelligence (AI) and machine learning (ML) with
cloud computing has sparked a revolution in the way businesses process, analyze, and …