Triboelectric nanogenerators enabled internet of things: A survey

J Li, C Wu, I Dharmasena, X Ni, Z Wang… - Intelligent and …, 2020 - ieeexplore.ieee.org
As pioneering information technology, the Internet of Things (loT) targets at building an
infrastructure of embedded devices and networks of connected objects, to offer omnipresent …

Secure machine learning scenario from big data in cloud computing via internet of things network

CL Stergiou, AP Plageras, KE Psannis… - Handbook of Computer …, 2020 - Springer
Abstract The Cloud Computing (CC) technology refers to an infrastructure in which both data
storage and data processing take place outside the mobile device. Furthermore, another …

Internet of things (IoT) security challenges and solutions: A systematic literature review

RF Ali, A Muneer, PDD Dominic, SM Taib… - Advances in Cyber …, 2021 - Springer
Abstract The Internet of Things (IoT), often known as the Internet of Everything, is a new
technological paradigm visualized as a worldwide network of interconnected machines. IoT …

The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective

B Zolfaghari, A Yazdinejad, A Dehghantanha… - arxiv preprint arxiv …, 2022 - arxiv.org
In recent years, the existence of a significant cross-impact between Cloud computing and
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …

Software complexity analysis using halstead metrics

T Hariprasad, G Vidhyagaran, K Seenu… - … on Trends in …, 2017 - ieeexplore.ieee.org
Software Complexity influences inward connections. Higher the multifaceted nature, bigger
the deformities. Programming complexity for any product or a program is hard to discover …

Heuristic prediction of rainfall using machine learning techniques

C Thirumalai, KS Harsha, ML Deepak… - … on Trends in …, 2017 - ieeexplore.ieee.org
This paper is carried on the heuristic prediction of rainfall using machine learning
techniques. As we know agriculture was the predominant of our country and economy. While …

Modified RSA-based algorithm: A double secure approach

I Al_Barazanchi, SA Shawkat… - TELKOMNIKA …, 2019 - telkomnika.uad.ac.id
Security algorithms like RSA are becoming increasingly important for communications to
provide companies, organizations, and users around the world, secure applications who rely …

Data analysis using Box and Whisker plot for Lung Cancer

C Thirumalai, M Vignesh… - 2017 Innovations in Power …, 2017 - ieeexplore.ieee.org
In statistical analysis, we have a collection of data, with the use of these data, we have to do
analysis based on our requirements. With the collection of data using Statistical analysis, we …

Blockchain-based authentication in IoT networks

CH Lau, KHY Alan, F Yan - 2018 IEEE conference on …, 2018 - ieeexplore.ieee.org
IoT networks are designed to connect as many devices as possible. Since any device can
be connected to an IoT network, it faces an authentication issue, which may be exploited by …

Data analysis using box plot on electricity consumption

C Thirumalai, R Kanimozhi… - … conference of Electronics …, 2017 - ieeexplore.ieee.org
Based on the spearman similarity measure the attribute are analyzed using boxplot. In this
real-time data of Australian energy market operator, data dashboard in national electricity …