An ontology-driven personalized food recommendation in IoT-based healthcare system

V Subramaniyaswamy, G Manogaran… - The Journal of …, 2019 - Springer
The recent developments of internet technology have created premium space for
recommender system (RS) to help users in their daily life. An effective personalized …

RETRACTED ARTICLE: E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption

V Vijayakumar, MK Priyan, G Ushadevi… - Mobile Networks and …, 2019 - Springer
In the present era of Information Technology, almost all big and small scale companies are
moving towards cloud to store and manage the data. Cloud computing is a routine of …

Feature extraction using LR-PCA hybridization on twitter data and classification accuracy using machine learning algorithms

NS Murugan, GU Devi - Cluster Computing, 2019 - Springer
Twitter, a social blogging site which became the tremendous topic in today's environment,
which made several organizations and public to develop their identity and overwhelming …

Secure user authentication and key agreement scheme for IoT device access control based smart home communications

S Uppuluri, G Lakshmeeswari - Wireless Networks, 2023 - Springer
The upcoming paradigm in Internet of Things (IoT) based applications is to afford effective
interactional communication strategies between the devices in the smart home system. With …

IoT based fall detection and ambient assisted system for the elderly

I Chandra, N Sivakumar, CB Gokulnath… - Cluster …, 2019 - Springer
Falls are considered as risky for the elderly people because it may affect the health of the
people. So, in the recent years many elderly fall detection methods has been developed. In …

Detecting streaming of Twitter spam using hybrid method

N Senthil Murugan, G Usha Devi - Wireless Personal Communications, 2018 - Springer
Twitter, the social network which evolving faster and regular usage by millions of people and
who become addicted to it. So spam playing a major role for Twitter users to distract them …

RETRACTED ARTICLE: Speech recognition with improved support vector machine using dual classifiers and cross fitness validation

B Kanisha, S Lokesh, PM Kumar… - Personal and ubiquitous …, 2018 - Springer
In this research, a new speech recognition method based on improved feature extraction
and improved support vector machine (ISVM) is developed. A Gaussian filter is used to …

Suppressed K-anonymity multi-factor authentication based Schmidt-Samoa cryptography for privacy preserved data access in cloud computing

KM Prabha, PV Saraswathi - Computer Communications, 2020 - Elsevier
Security and privacy-preservation is a significant problem to be solved in the cloud when
accessing data services. The existing authentication technique verifies the client identity …

PSDS–proficient security over distributed storage: a method for data transmission in cloud

F Shahid, H Ashraf, A Ghani, SAK Ghayyur… - IEEE …, 2020 - ieeexplore.ieee.org
Cloud Computing facilitates business by storing an enormous amount of data in the cloud
transmitted over the Internet with seamless access to the data and no hardware compatibility …

RETRACTED ARTICLE: Paillier homomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital …

S Priya, R Varatharajan, G Manogaran… - Personal and ubiquitous …, 2018 - Springer
Digital watermarking is a technique that provides security and authentication for digital
image transmission. In general, patient reports are stored in the form of a medical image. A …