Solving user priority in cloud computing using enhanced optimization algorithm in workflow scheduling

A Aggarwal, S Kumar, A Bhatt… - Computational …, 2022 - Wiley Online Library
Cloud computing is a procedure of stockpiling as well as retrieval of data or computer
services over the Internet that allows all its users to remotely access the data centers. Cloud …

Comparative study on energy-efficiency for Wireless Body area network using machine learning approach

M Sehgal, S Goyal, S Kumar - 2022 Seventh International …, 2022 - ieeexplore.ieee.org
Awareness of one's own health needs is a quickly spreading revolution in contemporary
living. Wireless Body Area Network (WBAN), that uses smart IoT devices for device …

Research on the application of LDPC code in chaotic sequence image encryption

Z Wang, Y Lou, W Wang, M Zhang, X Li - Cluster Computing, 2019 - Springer
Low density parity check code (LDPC) is a linear block code whose performance is close to
Shannon's limit. Compared with other decoding algorithms, it has low decoding complexity …

IoT Forensics

O Arshi, G Gupta, A Aggarwal - Advanced Techniques and …, 2025 - taylorfrancis.com
Internet of Things (IoT) forensics is the practice of inspecting IoT devices to investigate
crimes. Organisations or governmental agencies may employ specialists to gather and …

The future of healthcare security

A Bhatt, A Aggarwal - CyberMedics: Navigating AI and Security in …, 2025 - books.google.com
The healthcare industry is going through a radical change in the way medical services are
administered and provided in a time of fast technology advancement. Modern technology is …

Wireless Hacking

S Gupta, O Arshi, A Aggarwal - Perspectives on Ethical Hacking and …, 2023 - igi-global.com
The network has become portable as a result of digital modulation, adaptive modulation,
information compression, wireless access, and multiplexing. Wireless devices connected to …

Attacks on Web Applications

A Malik, S Gehlot, A Aggarwal - Perspectives on Ethical Hacking and …, 2023 - igi-global.com
Online applications hold sensitive data that is valuable, and hackers strive to identify
weaknesses and exploit them in order to steal data, pose as users, or disrupt the application …