Secure and smart healthcare system using IoT and deep learning models

A Rana, A Reddy, A Shrivastava… - 2022 2nd …, 2022 - ieeexplore.ieee.org
Patients of Smart Healthcare Systems have access to their medical records through an
online portal. Due to the fact that patients do not want their names made public, maintaining …

A smart healthcare monitoring system based on fog computing architecture

AR Yeruva, CSLV Durga… - 2022 2nd …, 2022 - ieeexplore.ieee.org
Access to adequate medical care can be difficult in many countries, particularly in
economically developing countries. There aren't enough medical professionals, such as …

A Proficient and secure way of Transmission using Cryptography and Steganography

GD Reddy, YVU Kiran, P Singh… - 2022 2nd …, 2022 - ieeexplore.ieee.org
People are concerned about the security of their data over the internet. The data can be
protected in many ways to keep unauthorized individuals from accessing it. To secure data …

An Empirical Study and Simulation Analysis of the MAC Layer Model Using the AWGN Channel on WiMAX Technology

M Patidar, G Bhardwaj, A Jain, B Pant… - 2022 2nd …, 2022 - ieeexplore.ieee.org
The IEEE 802.16 specification defines WiMAX, a wireless broadband data transmission
technology. It enables high-speed data transmission over a wide range and remains …

Customer-Churn Prediction Using Machine Learning

V Agarwal, S Taware, SA Yadav… - 2022 2nd …, 2022 - ieeexplore.ieee.org
The gradual but consistent decrease in the number of customers retained over time is
referred to as “customer churn,” and it is a word that is frequently used in the business and …

Breast Cancer Screening Using Machine Learning Models

G Singh, P Chaturvedi, A Shrivastava… - 2022 3rd International …, 2022 - ieeexplore.ieee.org
The main objective of this paper is the development of an Algorithm for Boolean Breast
Cancer Classification based on 116 patients with results by testing blood along with physical …

Energy Optimization in Wireless Sensor Networks

A Chaturvedi, TV Kumar, AP Srivastava… - 2022 2nd …, 2022 - ieeexplore.ieee.org
Data collection from sensitive places must be done remotely due to laborious
communication protocols. In this paper, the deployment of wireless sensor networks is …

Comparative analysis of routing protocols in wireless body area network (wban)

S Sharma, MM Tripathi… - 2022 2nd International …, 2022 - ieeexplore.ieee.org
Various multi-hop routing protocols like SIMPLE, ATTEMPT, LEACH has been discussed
and their performance metrics in terms of network lifetime, stability period, and throughput …

Federated Learning Strategies for Privacy-Preserving Machine Learning Models in Cloud Computing Environments

SS Tiwari, G Dhasmana, HM Al-Jawahry… - 2024 International …, 2024 - ieeexplore.ieee.org
Federated learning presents a promising approach for preparing machine learning models
while protecting information protection in cloud computing situations. This investigation …

Visualization and Prediction of Rainfall Using Deep Learning and Machine Learning Techniques

T Aruna, P Naresh, A Rajeshwari… - 2022 2nd …, 2022 - ieeexplore.ieee.org
The sheer quantity of big information has created tremendous prospects for forecasts and
study. Infographic is a normal sight in everyday life. Several trend lines explain the …