Gaussian distribution-based machine learning scheme for anomaly detection in healthcare sensor cloud
Smart information systems are based on sensors that generate a huge amount of data. This
data can be stored in cloud for further processing and efficient utilization. Anomalous data …
data can be stored in cloud for further processing and efficient utilization. Anomalous data …
Simulation of IoT‐based Vehicular Ad Hoc Networks (VANETs) for Smart Traffic Management Systems
Nowadays, traffic congestion and increasing road accidents have become a major concern
for both developed and develo** countries. To overcome this challenge, an internet of …
for both developed and develo** countries. To overcome this challenge, an internet of …
A novel machine learning-based approach for outlier detection in smart healthcare sensor clouds
A smart healthcare sensor cloud is an amalgamation of the body sensor networks and the
cloud that facilitates the early diagnosis of diseases and the real-time monitoring of patients …
cloud that facilitates the early diagnosis of diseases and the real-time monitoring of patients …
Personal healthcare data records analysis and monitoring using the internet of things and cloud computing
This paper presents a proposed system for cloud-based and Internet o Things (IoT)-based
electronic health records (EHRs) that utilize wearable body biosensors to collect biometric …
electronic health records (EHRs) that utilize wearable body biosensors to collect biometric …
Density-based machine learning scheme for outlier detection in smart forest fire monitoring sensor cloud
Sensor Cloud is an integration of sensor networks with cloud where sensed data is stored
and processed in the cloud. The applications of sensor cloud can be seen in forest fire …
and processed in the cloud. The applications of sensor cloud can be seen in forest fire …
Delving into the Realm of Information-Theoretic Security Emerging Trends and Future Directions
QKD, ECC, PQC, SMPC, and biometric-based authentication are examined in this work as
essential information-theoretic security approaches. Each solution improves information …
essential information-theoretic security approaches. Each solution improves information …
[PDF][PDF] Strategizing IoT Network Layer Security Through Advanced Intrusion Detection Systems and AI-Driven Threat Analysis
This research introduces an algorithmic framework for enhancing the security of Internet of
Things (IoT) networks. The Enhanced Anomaly Detection (EAD) algorithm initiates the …
Things (IoT) networks. The Enhanced Anomaly Detection (EAD) algorithm initiates the …
Enhancing Healthcare Monitoring through the Integration of IoT Networks and Machine Learning.
AK Mishra - International Journal of Wireless & Ad Hoc …, 2023 - search.ebscohost.com
The technology that was developed during the fourth industrial revolution has contributed to
the recent surge of interest that has been seen in the field of medicine. In particular, the …
the recent surge of interest that has been seen in the field of medicine. In particular, the …
A Novel Approach for Minimizing Response Time in IoT using Adaptive Algorithm.
This research offers four work and computer tool setups. The dynamic Resource Allocation
Algorithm is crucial to the system. This lets you manage changing supply. Once the PWMA …
Algorithm is crucial to the system. This lets you manage changing supply. Once the PWMA …
Leveraging Blockchain Technology to Transform Traditional Marketing Strategies into Secure and Efficient Practices
A Nigam - Full Length Article, 2023 - americaspg.com
The suggested approach, dubbed Blockchain-Enabled Secure Marketing (BESM), utilizes
blockchain technology to usher in a new age in digital advertising. To solve the problems …
blockchain technology to usher in a new age in digital advertising. To solve the problems …