A survey on design and analysis of robust IoT architecture

B Dhanalaxmi, GA Naidu - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
The IoT technology creates revolutionary changes in data exchange and device control in
different applications. As the IoT network grows it tosses different challenges to engineers …

Evolution and prediction of radical multi-dimensional e-learning system with cluster based data mining techniques

NVK Rao, N Mangathayaru… - … Conference on Trends in …, 2017 - ieeexplore.ieee.org
In most of the educational institutions, the main concern is with the student performance. If
the student performance can be evaluated or predictable miracles can be done in education …

Classification and detection of ovarian cysts in ultrasound images

G Vasavi, S Jyothi - … Conference on Trends in Electronics and …, 2017 - ieeexplore.ieee.org
Ovarian cancer must be diagnosed properly to analyse the type of tumours and malignant
cysts in the body. Appropriate diagnosed tool will direct a physician to take correct treatment …

A comprehensive study on workloads in cloud computing

K Mallikharjuna Rao, A Rama Satish - Advanced Computing and …, 2022 - Springer
The outstanding burden is a measure of work performed or it tends to be proficient to
perform inside a particular timeframe. In cloud computing, the term outstanding burden …

Design and analysis for improving reliability and accuracy of big-data based peripheral control through IoT

MS Rani, B Geetavani - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
In recent years, Big Data analytics has become a popular research in computer science and
other related data mining areas. It is very important research area in new trends and also …

[PDF][PDF] Analysis of interoperability services of various DRM schemes and associations with Marlin scheme

TS Srinivas, VB Narasimha… - Indian Journal …, 2017 - sciresol.s3.us-east-2.amazonaws …
Objectives: The flaws in software create hackers to cross the security thread. The security
can be provided with different schemes of DRM. In this paper numerous DRM schemes are …

[引用][C] Studies and Analysis of Performance Evaluation of Different Student Models with Data Mining Techniques

M Sridhar, PVS Srinivas, M Seetha