Security and privacy in big data life cycle: a survey and open challenges

J Koo, G Kang, YG Kim - Sustainability, 2020 - mdpi.com
The use of big data in various fields has led to a rapid increase in a wide variety of data
resources, and various data analysis technologies such as standardized data mining and …

Diagnosis of Brain Tumor Using Light Weight Deep Learning Model with Fine‐Tuning Approach

T Shelatkar, Urvashi, M Shorfuzzaman… - … Methods in Medicine, 2022 - Wiley Online Library
Brain cancer is a rare and deadly disease with a slim chance of survival. One of the most
important tasks for neurologists and radiologists is to detect brain tumors early. Recent …

Auto encryption algorithm for uploading data on cloud storage

M Tajammul, R Parveen - International Journal of Information Technology, 2020 - Springer
Cloud computing is a scalable, reliable, and fast growing technology. It offers a no. of
services to the users on pay per use basis. These services includes: computation, storage …

Morphological transfer learning based brain tumor detection using YOLOv5

SK Pandey, AK Bhandari - Multimedia Tools and Applications, 2024 - Springer
Medical experts require an efficient tool that provides highly accurate diagnoses of patients
for early and precise detection of the severity of brain tumours using brain magnetic …

[PDF][PDF] Algorithm for document integrity testing pre-upload and post download from cloud storage

M Tajammul, R Parveen - International Journal of Recent Technology …, 2019 - academia.edu
This era is of business and marketing, those who have no proper equipments, they can also
proceed in this field. This is just because of cloud computing. Many organizations are still in …

Millimeter Wave All‐Around Antenna Based on Whispering Gallery Mode Dielectric Resonator for IoT‐Based Applications

A Kogut, G Annino, M El Bakkali… - Wireless …, 2022 - Wiley Online Library
This work is devoted to the study of the emitting properties of azimuthally inhomogeneous
segmental dielectric resonators excited by whispering gallery modes. Due to the diffraction …

[PDF][PDF] Two pass multidimensional key generation and encryption algorithm for data storage security in cloud computing

M Tajammul, R Parveen - International Journal of Recent Technology …, 2019 - academia.edu
Many companies which essentially required cloud computing services are still in
ambivalence whether to adopt it or not. In this research paper an attention has been drawn …

Many-to-one matching game towards secure virtual machines migration in cloud computing

A Azougaghe, OA Oualhaj, M Hedabou… - 2016 International …, 2016 - ieeexplore.ieee.org
Virtual machine migration represents a new topic of research last years. In this context, we
present a new system based on matching game theory to design efficient and practical …

A two-tier security solution for storing data across public cloud

K Sharma, F Rafiqui, P Attri… - Recent Patents on …, 2019 - ingentaconnect.com
Background: Data integrity protection in Cloud Computing becomes very challenging since
the user no longer has the possession of their own data. This makes cloud data storage …

Data security in cloud computing using a hybrid algorithm approach

KD Abel, S Misra, O Jonathan, A Agrawal… - … Intelligence in Machine …, 2022 - Springer
Cloud computing is a technology that provides users with computing resources and storage.
It removes the need for businesses and institutes to maintain expensive computing facilities …