[PDF][PDF] Study Analysis of Cloud Security Chanllenges and Issues in Cloud Computing Technologies

JR Arunkumar - Journal of Science, Computing and Engineering …, 2023 - jscer.org
Cloud computing describes effective computing services provided by a third-party
organization known as cloud service provider for organizations to perform different tasks …

[PDF][PDF] Stacking Dilated CNN Authorized Secured Protocol for IoT Security

DR Anusuya - Journal of Science, Computing and Engineering …, 2022 - jscer.org
In IoT arrange is the technique for transferring new code or modifying the reasonableness of
existing code. For security reasons, each code update ought to be authenticated to ignore …

[PDF][PDF] Monitoring Ketinggian Air dan Curah Hujan Dalam Early Warning System Bencana Banjir Berbasis IoT

IA Wandi, A Ashari - IJEIS (Indonesian Journal of Electronics and …, 2023 - core.ac.uk
Banjir merupakan bencana alam dimana terdapat volume air yang berlebihan sehingga
merendam daratan. Jika dibiarkan banjir dapat membawa penyakit, menyebabkan …

[PDF][PDF] Design and Study Analysis Automated Recognition system of Fake Currency Notes

SR Krishna Veni, R Anusuya - Journal of Science, Computing and …, 2023 - jscer.org
Fake Currency has always been a drag which has created plenty of problems within the
market. The increasing technological advancements have made the likelihood for creating …

Real time spam detection system using LGBM classifier over the countvectorizer machine learning algorithms

B Sekhar, MS Saravanan - AIP Conference Proceedings, 2024 - pubs.aip.org
This study's main aim is to recognize the Spam messages that are prevalent on the majority
of competing websites and blog sites. The suggested predictions algorithms' trained as well …

A Novel Cost-Effective Pressure Sensor Based Flood Monitoring System with IoT

AC Dublin, M Arce, E Ortiz, LM Wong… - ASEAN Engineering …, 2024 - journals.utm.my
Floods are one of the most frequent and destructive natural hazards in the world. Early
warning and flood monitoring is beneficial in the response and preparedness for this hazard …

Behavioral Analysis of Dog using Machine Learning

G Gomathy, P Kalaiselvi, C Esther… - … and Control for …, 2023 - ieeexplore.ieee.org
Machine learning is a dynamic field enabling computers to learn from historical data via
diverse algorithms, applicable in image recognition, voice ID, email filtering, and more. In …

[HTML][HTML] Flood Vulnerability Mapping: A Case Study of Okoko Basin, Osogbo

TB Adedoja, OS Popoola, TA Alaga… - Journal of Geographic …, 2023 - scirp.org
This study employed Geographic Information System (GIS) and remote sensing approach to
analyze the flood vulnerability areas in the Okoko basin area of Osogbo in Osun state …

The Development of Early Flood Monitoring and a WhatsApp-Based Alert System for Timely Disaster Preparedness and Response in Vulnerable Communities

P Kavitha, A Anand, S Sreenivasan… - Engineering …, 2024 - mdpi.com
Although many innovations have been achieved and natural disasters are well known to be
extremely detrimental to persons and property, there is still no 100% assurance that alerts …

An Efficient Allocation of Resources in wireless Communications IoT Network for Numerous Users

SM Basha, R Dhanalakshmi… - … and Smart Electrical …, 2023 - ieeexplore.ieee.org
Wireless-powered communication (WPC) emerges as a highly promising technological
avenue for a diverse range of intelligent network applications spanning the industrial …