Machine Learning, data mining for IOT-based systems

R Kashyap - Handbook of Research on Big Data and the IoT, 2019 - igi-global.com
This chapter will addresses challenges with the internet of things (IoT) and machine learning
(ML), how a bit of the trouble of machine learning executions are recorded here and should …

Applications of wireless sensor networks in healthcare

R Kashyap - IoT and WSN applications for modern agricultural …, 2020 - igi-global.com
Health is the key capability humans require to perceive, feel, and act effectively, and as
such, it represents a primary element in the development of the individual and the …

A survey on risc-v security: Hardware and architecture

T Lu - arXiv preprint arXiv:2107.04175, 2021 - arxiv.org
The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors
are the processing engines of smart IoT devices. For decades, these processors were …

Blockchain‐Based Decentralized Cloud Solutions for Data Transfer

R Nair, SN Zafrullah, P Vinayasree… - Computational …, 2022 - Wiley Online Library
Cloud computing has increased its service area and user experience above traditional
platforms through virtualization and resource integration, resulting in substantial economic …

Big Data Analytics challenges and solutions

R Kashyap - Big data analytics for intelligent healthcare …, 2019 - Elsevier
Abstract The field of Information Technology has seen a considerable measure of
advancement and notoriety in the areas of web application and correspondence. These …

Machine learning for internet of things

R Kashyap - Next-generation wireless networks meet advanced …, 2019 - igi-global.com
Fast advancements in equipment, programming, and correspondence advances have
permitted the rise of internet-associated tangible gadgets that give perception and …

Data-Driven Network Anomaly Detection with Cyber Attack and Defense Visualization

E Muhati, D Rawat - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
The exponential growth in data volumes, combined with the inherent complexity of network
algorithms, has drastically affected network security. Data activities are producing …

Artificial intelligence systems in aviation

R Kashyap - Cases on modern computer systems in aviation, 2019 - igi-global.com
The aim of this chapter is to research and fundamentally evaluate counterfeit shrewd
frameworks to recognize for outperforming human insight in the flights and its conceivable …

Security, reliability, and performance assessment for healthcare biometrics

R Kashyap - Design and Implementation of Healthcare Biometric …, 2019 - igi-global.com
A health system comprises, all things considered, individuals and activities whose essential
purpose is to advance, reestablish, or look after wellbeing. This incorporates endeavors to …

Biometric authentication techniques and E-learning

R Kashyap - Biometric Authentication in Online Learning …, 2019 - igi-global.com
The primary goal of this chapter is to answer online exam frameworks by utilizing face
acknowledgment to verify students for going to an online exam. A strategy in light of the …