Fog big data analysis for IoT sensor application using fusion deep learning

AS Rajawat, P Bedi, SB Goyal… - Mathematical …, 2021 - Wiley Online Library
The IoT sensor applications have grown in extreme numbers, generating a large amount of
data, and it requires very effective data analysis procedures. However, the different IoT …

Cloud cryptography for cloud data analytics in IoT

N Jayashri, K Kalaiselvi - … Approach for Cloud Data Analytics in …, 2021 - Wiley Online Library
Summary The potential Internet of Things (IoT) will have a profoundly prudent business and
social impact on our lives. A hub of interest in IoT systems is typically an asset obligation …

Handover evaluation of UMTS-WiMAX networks

SA Abdulhussein… - … Electronics and Control), 2021 - telkomnika.uad.ac.id
Recently, data traffic movement through a wireless channel is assisted by suggesting and
implementing many mechanisms, to achieve the speedy increasing importunity and …

Adopting explicit and implicit social relations by SVD++ for recommendation system improvement

MH Hussein, AA Alsakaa… - … Electronics and Control), 2021 - telkomnika.uad.ac.id
Recommender systems suffer a set of drawbacks such as sparsity. Social relations provide a
useful source to overcome the sparsity problem. Previous studies have utilized social …

Information Security Accountability in the Cloud Computing Context—A Comprehensive Review

ZA Al-Rashdi, M Dick, RA Al-Rashdi… - Challenges in the IoT and …, 2021 - Springer
Accountability is a main concern for information security within cloud computing; it
represents the trust in service relationships between clients and cloud service providers …

Next generation cloud security: State of the art machine learning model

SN Mohanty, GB Mohammad, S Potluri… - Cloud Security …, 2021 - degruyter.com
Recent days have seen an obvious shift in computing platforms and environments with the
arrival of cloud computing. Most of the organizations moving towards cloud technology to …

Secure intelligent framework for VANET: cloud based transportation model

S Potluri, GB Mohammad, SN Mohanty… - Cloud Security …, 2021 - degruyter.com
Vehicular cloud computing has a prodigious impact on information technology solutions.
According to VCC the unexploited computing resources are parking vehicles, vehicles stuck …

Prototype of the MPSO (Modified Dimension Particle Swarm Optimization) Algorithm Method in Searching for Computer Equipment Data inventory

N Sany, A Asmawati… - JURNAL SISFOTEK …, 2023 - journal.global.ac.id
Abstract cIn the development of information technology and computerization today, it
encourages humans to create systems that can help their lives. Especially in the case of …

Internet of Cloud: Secure and Privacy Preserving Cloud Model with IoT Enabled Service

I Indrani, SVB Revanth, SA Durga, S Potluri… - Cloud Security …, 2021 - degruyter.com
Security and safety are among the critical difficulties of Internet of Things (IoT). Updating
inappropriate gadgets, the lack of productive and powerful security meetings, customer …

Intelligent Reclamation of Plantae Affliction Disease

R Banu, GFA Ahammed… - … Learning Approach for …, 2021 - Wiley Online Library
Summary Identification of Plantae Diseases is emerging as a developing field in India, as
agriculture sector plays an important role in socio‐economic life. In the early days, irrational …