Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment

S Dalal, P Manoharan, UK Lilhore, B Seth… - Journal of Cloud …, 2023 - Springer
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive
approach is proposed in this assessment to deal with the problem of identifying new …

SG-PBFS: Shortest gap-priority based fair scheduling technique for job scheduling in cloud environment

SA Murad, ZRM Azmi, AJM Muzahid… - Future Generation …, 2024 - Elsevier
Job scheduling in cloud computing plays a crucial role in optimizing resource utilization and
ensuring efficient job allocation. But cloud resources may be wasted, or service performance …

Enhanced Machine learning algorithms Lightweight Ensemble Classification of Normal versus Leukemic Cel

K Sridhar, AR Yeruva, PN Renjith, A Dixit… - Journal of …, 2022 - pnrjournal.com
Leukemia is type of cancer in blood which impacts the lymphatic framework and the bone
marrow and also impacts white blood cells. Leukemia, in contrast to other types of cancer …

An efficient approach for object detection using deep learning

SM Patil, CM Raut, AP Pande, AR Yeruva… - Journal of …, 2022 - pnrjournal.com
Object identification is more significant application in Deep learning innovation which is
recognized by areas of strength for its element learning and component portrayal contrasted …

Task Scheduling in Cloud Environment—Techniques, Applications, and Tools: A Systematic Literature Review

OL Abraham, MA Ngadi, JM Sharif, MKM Sidik - IEEE Access, 2024 - ieeexplore.ieee.org
Cloud computing has become a revolutionary model for providing computational resources
and services via the internet. As the volume of tasks and the dynamic nature of cloud …

SCEHO-IPSO: A Nature-Inspired Meta Heuristic Optimization for Task-Scheduling Policy in Cloud Computing

KJ Rajashekar, Channakrishnaraju, PC Gowda… - Applied Sciences, 2023 - mdpi.com
Task scheduling is an emerging challenge in cloud platforms and is considered a critical
application utilized by the cloud service providers and end users. The main challenge faced …

Optimized LightGBM model for security and privacy issues in cyber‐physical systems

S Dalal, M Poongodi, UK Lilhore… - Transactions on …, 2023 - Wiley Online Library
Integrating physical, computational, and networking resources are the goal of cyber‐
physical systems, also known as smart‐embedded systems. By investing in a solid …

Cryptosystem in artificial neural network in Internet of Medical Things in Unmanned Aerial Vehicle

NJ Mohammed, MMU Hassan - Journal of Survey in …, 2023 - sifisheriessciences.com
Abstract The Internet of Medical Things (IoMT) has revolutionized the healthcare industry by
providing remote patient monitoring and real-time data analysis. Unmanned Aerial Vehicles …

Heart Disease Prediction using Ensemble ML

M Bajaj, P Rawat, C Bhatt, R Chauhan… - … Computing and Data …, 2023 - ieeexplore.ieee.org
Worldwide, heart disease is one of the main causes of mortality. Heart disease early
identification and prevention can significantly enhance patient outcomes and save …