A Review: Image Processing Techniques' Roles towards Energy-Efficient and Secure IoT

AM Al-Ghaili, H Kasim, Z Hassan, NM Al-Hada… - Applied Sciences, 2023 - mdpi.com
The goal of this review paper is to highlight the image processing techniques' role in the
Internet of Things (IoT), aiming to attain an energy-efficient and secure IoT. IoT-dependent …

Mastering chaos: A review

B Hamidouche, K Guesmi, N Essounbouli - Annual Reviews in Control, 2024 - Elsevier
Chaos control remains a crucial area of study in nonlinear dynamics due to its ability to
enhance system stability and efficiency in various applications. This review thoroughly …

Applications of information systems and data security in marketing management

A Naim, H Alqahtani, MA Muniasamy… - … , and Data Security for …, 2023 - igi-global.com
This chapter is an extended research work showing the role of applications of Information
Systems (IS) and importance of data security in Marketing Management. This research …

Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security

MY Shakor, MI Khaleel, M Safran, S Alfarhood… - IEEE …, 2024 - ieeexplore.ieee.org
In the rapidly evolving realm of cloud computing security, this paper introduces an innovative
solution to address persistent challenges. The proliferation of cloud technology has brought …

A novel approach to avoid road traffic accidents and develop safety rules for traffic using crash prediction model technique

SH Ahammad, M Sukesh, M Narender… - Micro-Electronics and …, 2023 - Springer
The expansion of nations and communities has resulted in a variety of externalities, such as
an increase in traffic accidents. Many attempts have been undertaken to minimize the …

Simplified Image Encryption Algorithm (SIEA) to enhance image security in cloud storage

M Lavanya, KJA Sundar, S Saravanan - Multimedia Tools and …, 2024 - Springer
Cloud computing is a domain that provides the on-demand availability of IT resources, which
can be accessed from a remote server over the internet. A widely used cloud service model …

De-centralized information flow control for cloud virtual machines with hybrid AES-ECC and improved meta-heuristic optimization based optimal key generation

YB Gurav, BM Patil - International journal of intelligent robotics and …, 2023 - Springer
Cloud computing is now used by many enterprises due to its increased computational
efficiency, economic effectiveness, as well as flexibility. However, security is currently the …

The role of analog signal processing in upcoming telecommunication systems: Concept, challenges, and outlook

MM Safari, J Pourrostam - Signal Processing, 2024 - Elsevier
With the increasing demands in modern communications, the concepts of energy-efficient
and low-cost processors have received a lot of attention from researchers in recent years …

DNA cryptography based security framework for health-cloud data

I Qiqieh, J Alzubi, O Alzubi - Computing, 2025 - Springer
Cloud Computing (CC)'s transformative capabilities have earned it a pivotal role in the
healthcare sector, known as the “health cloud". The remote data handling of CC raises …

Quantum encryption of healthcare images: Enhancing security and confidentiality in e‐health systems

AJ Kadhim, TS Atia - Security and Privacy, 2024 - Wiley Online Library
Ensuring the security and privacy of patient data in e‐healthcare systems that rely on cloud
computation is of utmost importance. Traditional encryption is no longer resistant to quantum …