-
Chapter and Conference Paper
Optimal Resource Sharing Amongst Device-to-Device Communication Using Particle Swarm Algorithm
Device-to-Device Communication (D2D) has been described as one of the important innovations in the development of 5G networks. This form of D2D networking has its own benefits of improved network capacity and ...
-
Chapter and Conference Paper
Binomial Logistic Regression Resource Optimized Routing in MANET
MANETs consist of the node that moves continuously in a random direction. In MANET architecture, devices can move in any direction. They have recently confined imperativeness, enlisting power and memory. The h...
-
Chapter and Conference Paper
A Quick Survey of Security and Privacy Issues in Cloud and a Proposed Data-Centric Security Model for Data Security
Cloud is being utilized by the majority of Internet users. Businesses storing their critical information in the cloud have increased over the ages due to simplistic and attractive features the cloud possesses....
-
Chapter and Conference Paper
Improved Logistic Map Based Algorithm for Biometric Image Encryption
Tumultuous maps are ordinarily favored for the age of arbitrary numbers in encryption calculations because of high arbitrariness, capriciousness, aperiodic, and affectability. These calculations are completely...
-
Chapter and Conference Paper
Accuracy Analysis of Similarity Measures in Surprise Framework
Recommender Systems (RS) are growing technologies, which can be very useful for consumers in finding items of their interest on the web. Collaborative filtering(CF), a popular approach of Recommender Systems, ...
-
Chapter and Conference Paper
Hybrid Method in Identifying the Fraud Detection in the Credit Card
As the world is rapidly moving towards digitalization and money transactions are becoming cashless, the utilization of credit cards has rapidly heightened. The fraud activities associated with it have also bee...
-
Chapter and Conference Paper
A Lightweight Effective Randomized Caesar Cipher Algorithm for Security of Data
In any kind of organization in the present scenario, raw data or meaningful data needs to be shared among different personnel; therefore, the chances of frauds or treachery are more that creates vulnerability ...
-
Chapter and Conference Paper
Learning Platform and Smart Assistant for Students
Students and knowledge have always been abstract entities. Earlier, students found it tough to find the source of knowledge and now they find it difficult to gather, curate and utilise the immense amount of kn...
-
Chapter and Conference Paper
Digital Signature Authentication Using Asymmetric Key Cryptography with Different Byte Number
Nowadays, each and every system needs proper security. Only proper security can save important documents. There are different types of security systems that people use for safety. Digital Signature is one kind...
-
Chapter and Conference Paper
Foot Ulcer and Acute Respiratory Distress Detection System for Diabetic Patients
Health care and wellness management for a diabetic are one of the most promising information technology in the field of medical science. A healthcare monitoring system is necessary to constantly monitor diabet...
-
Chapter and Conference Paper
Decoy Technique for Preserving the Privacy in Fog Computing
Fog computing is a process which computes and stores the data, which facilities network services between computing information centers and end devices. Fog computing is additionally fogging or edge computing. ...
-
Chapter and Conference Paper
Comparative Analysis of MCT Load Balancing Approach in Cloud Computing Environment
The efficient working of cloud computing is based on the most important aspect, which is load balancing. This paper gives a comparison and analysis of the load balancing algorithms in a cloud computing environ...
-
Chapter and Conference Paper
A Memetic Evolutionary Algorithm-Based Optimization for Competitive Bid Data Analysis
One of the most difficult decision-making problems for buyers is to identify which suppliers to provide contracts to of the biddable items for a competitive event after considering several conditions. This is ...
-
Chapter and Conference Paper
A Survey on Partially Occluded Faces
Over the past decade, partially occluded face recognition has been an urgent challenge to computer visionaries due to conditions, which appear unconstrained. The main aim of the facial recognition system is t...
-
Chapter and Conference Paper
Review of Python for Solar Photovoltaic Systems
In recent years, the usage of solar energy as a source to produce power has increased exponentially as it provides a clean and efficient alternative to depleting non-renewable resources. The normal working per...
-
Chapter and Conference Paper
Data Formats and Its Research Challenges in IoT: A Survey
In the current context, the increase in data generated by the heterogeneous IoT sensors results in several challenges to the IoT applications’ developers. One of the significant problems is handling nonstandar...
-
Chapter and Conference Paper
Survey Paper on Smart Veggie Billing System
The purpose of this paper is to automate the process of the billing system of vegetables. Raspberry PI is the heart of this project which monitors all the components in the system. Initially, we capture the di...
-
Chapter and Conference Paper
Methodology for Implementation of Building Management System Using IoT
In recent times the need for automation has grown many folds. The need of the hour is to control and display the working of systems utilized in everyday life with a click of a button. This paper presents the d...
-
Chapter and Conference Paper
An Optimized Hardware Neural Network Design Using Dynamic Analytic Regulated Configuration
Due to the inherent parallelism offered by the Artificial Neural Networks (ANNs) and the rapid growth of Field Programmable Gate Array (FPGA) technology, the implementation of ANNs in hardware (known as Hardw...
-
Chapter and Conference Paper
A Comprehensive Survey on Federated Cloud Computing and its Future Research Directions
cloud computing paradigm is popular due to its pay-as-you-go model. Due to its increasing demand for service, the user has a huge advantage in paying for the service currently needed. In a federated cloud e...