Analysis of Blockchain technology: pros, cons and SWOT

M Niranjanamurthy, BN Nithya, S Jagannatha - Cluster Computing, 2019 - Springer
Any online transaction that involves digital money is a bit of a challenge these days with the
rising threats of hackers trying to steal bank details posted online. This leads to the invention …

An ontology-driven personalized food recommendation in IoT-based healthcare system

V Subramaniyaswamy, G Manogaran… - The Journal of …, 2019 - Springer
The recent developments of internet technology have created premium space for
recommender system (RS) to help users in their daily life. An effective personalized …

Resource provisioning using workload clustering in cloud computing environment: a hybrid approach

A Shahidinejad, M Ghobaei-Arani, M Masdari - Cluster Computing, 2021 - Springer
In recent years, cloud computing paradigm has emerged as an internet-based technology to
realize the utility model of computing for serving compute-intensive applications. In the cloud …

Host load prediction in cloud computing with discrete wavelet transformation (dwt) and bidirectional gated recurrent unit (bigru) network

J Dogani, F Khunjush, M Seydali - Computer Communications, 2023 - Elsevier
Providing pay-as-you-go storage and computing services have contributed to the
widespread adoption of cloud computing. Using virtualization technology, cloud service …

Optimization using artificial bee colony based clustering approach for big data

SS Ilango, S Vimal, M Kaliappan, P Subbulakshmi - Cluster Computing, 2019 - Springer
As one of the major problems is that the time taken for executing the traditional algorithm is
larger and that it is very difficult for processing large amount of data. Clusters possess high …

HIoTPOT: surveillance on IoT devices against recent threats

UD Gandhi, PM Kumar, R Varatharajan… - Wireless personal …, 2018 - Springer
Abstract Honeypot Internet of Things (IoT)(HIoTPOT) keep a secret eye on IoT devices and
analyzes the various recent threats which are dangerous to IoT devices. In this paper …

RETRACTED ARTICLE: E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption

V Vijayakumar, MK Priyan, G Ushadevi… - Mobile Networks and …, 2019 - Springer
In the present era of Information Technology, almost all big and small scale companies are
moving towards cloud to store and manage the data. Cloud computing is a routine of …

Computer-aided diagnosis applied to MRI images of brain tumor using cognition based modified level set and optimized ANN classifier

Virupakshappa, B Amarapur - Multimedia Tools and Applications, 2020 - Springer
MRI image segmentation and classification is one of the important tasks in medical image
analysis and visualization, despite occurrence of noise makes it tough to segment the region …

Minimum connected dominating set based RSU allocation for smartCloud vehicles in VANET

A Chinnasamy, B Sivakumar, P Selvakumari… - Cluster Computing, 2019 - Springer
Nodes (smartCloud vehicles) of minimum connected dominating set form a virtual backbone
in a wireless vehicular ad hoc network. A minimum connected dominating set is a minimum …

An energy efficient robust resource provisioning based on improved PSO-ANN

A Srivastava, N Kumar - International Journal of Information Technology, 2023 - Springer
High-performance cloud computing has revolutionized computing. Resource provisioning
has become an indispensable barrier in serving the high-end service facilitating computing …