An implementation of modified blowfish technique with honey bee behavior optimization for load balancing in cloud system environment

P Rani, PN Singh, S Verma, N Ali… - Wireless …, 2022 - Wiley Online Library
Cloud computing is a system that allows data to be saved in the cloud on a virtual worker.
Outsiders and virtual machines in the cloud worker supplier played a critical part in efficiently …

Cyber‐Internet Security Framework to Conquer Energy‐Related Attacks on the Internet of Things with Machine Learning Techniques

A Kumar, D Dhabliya, P Agarwal… - Computational …, 2022 - Wiley Online Library
The Internet of Things (IoT) ushers in a new era of communication that depends on a broad
range of things and many types of communication technologies to share information. This …

[PDF][PDF] Research Article Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques

A Kumar, D Dhabliya, P Agarwal, N Aneja, P Dadheech… - 2022 - academia.edu
Wireless sensor networks have attracted an extraordinary amount of attention from the
scientific community over the course of the last several years. A typical wireless sensor …

[PDF][PDF] New robust and secure alphabet pairing text steganography algorithm

SS Iyer, K Lakhtaria - International Journal of Current Trends in …, 2016 - researchgate.net
Steganography has been practiced since ancient times. Many Linguistic Steganography
(popularly known as Text based Steganography) algorithms have been proposed like Word …

An indoor airborne ultrasonic wireless communication network

W Jiang, WMD Wright - IEEE transactions on Ultrasonics …, 2018 - ieeexplore.ieee.org
There is an increasing interest in the use of modulated airborne ultrasound as a means of
indoor wireless communication. By using commercially available capacitive ultrasonic …

[PDF][PDF] Practical evaluation and comparative study of big data analytical tools

SS Iyer, KI Kamaljit - Int. J. Innov. Res. Comput. Commun. Eng, 2017 - researchgate.net
Practical Evaluation and Comparative Study of Big Data Analytical Tools Page 1 ISSN(Online) :
2320-9801 ISSN (Print) : 2320-9798 International Journal of Innovative Research in Computer …

[PDF][PDF] Simulation of the application layer in narrowband networks with conditional data injection XML scheme based on universal data generator

O Vondrous, P Macejko, Z Kocur - Advances in Electrical and …, 2017 - advances.utc.sk
Simulation of the Application Layer in NarrowBand Networks with Conditional Data Injection XML
Scheme Based on Universal Data Ge Page 1 INFORMATION AND COMMUNICATION …

[PDF][PDF] Research Article An Implementation of Modified Blowfish Technique with Honey Bee Behavior Optimization for Load Balancing in Cloud System Environment

P Rani, PN Singh, S Verma, N Ali, PK Shukla… - 2022 - academia.edu
Cloud computing is a system that allows data to be saved in the cloud on a virtual worker.
Outsiders and virtual machines in the cloud worker supplier played a critical part in efficiently …

A review of wireless and satellite-based M2M services in support of smart grids

K Sohraby, D Minoli, B Occhiogrosso - … on Smart Grid Assisted Internet of …, 2017 - eudl.eu
The Smart Grid (SG) is an evolution of the electricity network that integrates the activities of
power consumers, power generators, distribution grid, and devices connected to the grid …

e-Derma–a Novel Wireless Dermatoscopy System

B Dugonik, A Dugonik, D Horvat, B Žalik… - Journal of Medical …, 2017 - Springer
Cutaneous Melanoma (CM) is a malignant tumour, and is one of the most rapidly growing
cancers. Discovering a melanoma in the early stages of the disease is extremely difficult …