Skip to main content

and
  1. No Access

    Article

    Energy-aware ACO-DNN optimization model for intrusion detection of unmanned aerial vehicle (UAVs)

    In modern militaries the Unmanned Aerial Vehicles (UAVs) are used for war fighting and also for certain civilian applications such as law enforcement, content for news outlets, situational awareness for emerge...

    Jitendra Kumar Samriya, Mohit Kumar in Journal of Ambient Intelligence and Humani… (2023)

  2. No Access

    Article

    Fuzzy-EPO Optimization Technique for Optimised Resource Allocation and Minimum Energy Consumption with the Brownout Algorithm

    Cloud Computing is an eminent and reputable agenda which relies on large-scale distributed processing to provide access to their resources and services. In the cloud environment a rigorous management system is...

    Jitendra Kumar Samriya, Rajeev Tiwari in Wireless Personal Communications (2023)

  3. No Access

    Chapter and Conference Paper

    A Review on Deep Learning-Enabled Healthcare Prediction Technique: An Emerging Digital Governance Approach

    Heart disease is one among the critical human diseases as well as healthcare issue, that affects human very severely. It occurs when heart is unable to supply appropriate amount of blood to the parts of body. ...

    D. Anand, Venkateswarlu Tata in Soft Computing: Theories and Applications (2023)

  4. No Access

    Chapter

    Intelligent Fog-IoT Networks with 6G Endorsement: Foundations, Applications, Trends and Challenges

    The prolonged 5G network deployment includes the Internet of Things (IoT) as a technological advancement toward the expansion of wireless communication. The Internet of Everything (IoE), a superset of IoT, act...

    Syed Anas Ansar, Jitendra Kumar Samriya, Mohit Kumar in 6G Enabled Fog Computing in IoT (2023)

  5. No Access

    Book

    6G Enabled Fog Computing in IoT

    Applications and Opportunities

    Mohit Kumar, Sukhpal Singh Gill (2023)

  6. No Access

    Article

    An optimistic approach for task scheduling in cloud computing

    Cloud computing is gaining popularity around the globe over the last decade due to offering various types of services to end-users. Virtual machines (VM) Configuration is an imperative part of the Cloud which ...

    Mehak Sharma, Mohit Kumar in International Journal of Information Techn… (2022)

  7. No Access

    Article

    To improve scalability with Boolean matrix using efficient gossip failure detection and consensus algorithm for PeerSim simulator in IoT environment

    Recent years have seen a rise in interest in peer-to-peer applications because of their scalability, fault tolerance, and other noteworthy benefits. The main benefit of P2P technology is the reduction of centr...

    Surendra Kumar, Jitendra Kumar Samriya in International Journal of Information Techn… (2022)

  8. No Access

    Chapter and Conference Paper

    Alleviating the Issues of Recommendation System Through Deep Learning Techniques

    Social media and other online sources generate abundance of data which leads to the problem of information overload. Recommender systems have emerged as a solution to deal with this problem which suggest items...

    Bhupesh Rawat, Ankur Singh Bist in Second International Conference on Sustain… (2022)

  9. No Access

    Chapter and Conference Paper

    An Energy Aware Clustering Scheme for 5G-Enabled Edge Computing Based IoMT Framework

    5G networks offer novel communication infrastructure for Internet of Things applications, especially for healthcare applications. There, edge computing enabled Internet of Medical Things provides online patien...

    Jitendra Kumar Samriya, Mohit Kumar, Maria Ganzha in Computational Science – ICCS 2022 (2022)

  10. No Access

    Chapter and Conference Paper

    A Study on Challenges of Big Data and Their Approaches in Present Environment

    With the advent of the World Wide Web, big data has gained immense popularity among the research community. This data originates from various sources such as e-commerce sites, stock exchange data, social netwo...

    Bhupesh Rawat, Jitendra Kumar Samriya in Proceedings of Integrated Intelligence Ena… (2021)

  11. No Access

    Chapter and Conference Paper

    EAAP: Efficient Authentication Agreement Protocol Policy for Cloud Environment

    Cloud computing is emerging environment for computing and storing of data, where multiple users can use or share files (documents, image, video etc.) stored in server by web browser through several devices usi...

    Narander Kumar, Jitendra Kumar Samriya in Next Generation Computing Technologies on … (2019)