Iot and data mining techniques to detect and regulating of solar power system

KSR Kumar, RR Solanke, G Laxmaiah… - 2023 International …, 2023 - ieeexplore.ieee.org
As a result of its practical and long-term benefits, renewable energy sources are the subject
of intensive study. For instance, solar power stations are among the renewable energy …

Node based Label Propagation for Bitcoin Transaction Pattern Identification Over Similar Community

M Manwal, AM Alvi, NK Turaga, A Mittal… - 2023 International …, 2023 - ieeexplore.ieee.org
People have conducted decentralized transfer transactions through Bitcoin addresses ever
since the Bitcoin system launched online, drastically improving the convenience of …

IoT Security, Future Challenges, and Open Issues

N Tariq, T Saboor, M Ashraf, R Butt… - … Measures for Logistics …, 2024 - igi-global.com
The internet of things (IoT) refers to the network of connected devices embedded in
everyday objects that enable digital transformation. The rapid proliferation of IoT devices has …

An adaptive multistage intrusion detection and prevention system in software defined networking environment

N Maheswaran, S Bose, B Natarajan - Automatika, 2024 - Taylor & Francis
The advancements made in Software-Defined Networking (SDN) technology seem quite
promising, with potential wide application in managing and controlling the latest network …

Classification of Credit Card Transactions Using Machine Learning

GA Senthil, R Prabha, RM Priya… - … on Computer, Power …, 2022 - ieeexplore.ieee.org
In the finance domain the main difficulty faced by the customers is the fraudulency in
crediting the amount. Since the evolution of credit cards increased, the frauds on the other …

Societal Elements that Impact the Performance of Women Entrepreneurs in Tier-II Cities: A Study of Rohilkhand Region of Uttar Pradesh

D Grover, S Sharma, P Kaur, A MIttal… - 2024 Zooming …, 2024 - ieeexplore.ieee.org
Globally women entrepreneurship is being increasingly accepted as one of the most laten
and underestimated source of economic growth. Research on women entrepreneurs has …

DDoS Attacks Detection in IoT Networks using Naive Bayes and Random Forest

A Srivastava, S Tiwari, BS Rawat… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
The proliferation of Internet of Things (IoT) devices has resulted in numerous benefits,
including streamlined tasks and improved connectivity but has also raised concerns …

IoT-Enabled Smart Manhole Management System for Real-time Status, Water Level, and Gas Detection

MA Imran, SMMR Swapno, G Chhabra… - 2024 International …, 2024 - ieeexplore.ieee.org
Regular monitoring of the maintenance manhole system is imperative to uphold the city's
health and cleanliness standards. Our study offers an intelligent manhole that monitors the …

Finding of DDoS Attack in IoT-Based Networks Using Ensemble Technique

A Srivastava, S Tiwari, D Kumar… - … Conference on Intelligent …, 2024 - ieeexplore.ieee.org
Ensemble techniques could find DDoS attacks more quickly in IoT. A more dependable and
precise detection system can be achieved by integrating the most advantageous attributes of …

Evaluating the Security of Encryption Protocols Used in Information Security Models for Networked Applications

V Agarwal, MZ AN - 2023 2nd International Conference on …, 2023 - ieeexplore.ieee.org
This paper explores the safety of encryption protocols used in data safety models for
networked programs. Whilst encryption protocols are designed to shield records from …