![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Dynamic service prioritization with predicted intervals for QoS-sensitive service migrations in MEC
Service migrations in Multi-access Edge Compute (MEC) infrastructure are complex due to the geographically distributed infrastructure, limited availability of resources at the edge and heterogenous application...
-
Chapter and Conference Paper
Enhanced Dynamic Vehicle Detection and Tracking to Improve the Quality of Image Processing Using Deep Learning
One of the most crucial duties in varied traffic scenarios is vehicle recognition and categorization. Vehicle detection is the first step in tracking and counting vehicles. This article uses a deep learning al...
-
Chapter and Conference Paper
Advanced Cyber Security Helpdesk Using Machine Learning Techniques
Numerous amounts of cybercrimes and attacks are happening over the globe even in every ten minutes. A major number of people are being affected by these cybercrimes and attacks across the world. Hence, the var...
-
Chapter and Conference Paper
Blockchain-Based Supply Chain Management System for Secure Vaccine Distribution
Vaccination is one of the best ways to stop or at least slow the spread of infectious illnesses. There are various logistical concerns raised by this medical technique. Millions of people worldwide participate...
-
Chapter and Conference Paper
Criminal Prevision with Weapon Identification and Forewarning Software in Military Base
Nowadays, it is especially important to give good concern toward security in all sectors, especially in military areas, bank sectors, airports, railway stations, etc. We need security for all sectors as the wo...
-
Chapter and Conference Paper
Advanced Persistent Threat Assessment
Cybersecurity in the health sector is a critical issue, as the healthcare industry increasingly relies on technology to store, process, and transmit sensitive patient information. This research paper examines ...
-
Chapter and Conference Paper
A Hybrid Post-Quantum Cryptography Driven Key Exchange Scheme for Cloud Computing Environments
In connection with Post-Quantum Cryptography (PQC), it is indispensable to upgrade cloud data security schemes and also key exchange schemes. The former is for data security while the latter is for secure key ...
-
Chapter and Conference Paper
A Virtual Machine Protection Framework Against Compromised Hypervisor in Cloud Computing
Virtualization in cloud computing enables efficient management of physical resources leading to affordable cloud services but has security vulnerabilities. The existing solutions are at a different level of pr...
-
Chapter and Conference Paper
Tool-Based Approach on Digital Vulnerability Management Hub (VMH) by Using TheHive Platform
Security of a system is a prime focus area for software development teams. Vulnerabilities are loopholes and flaws that enable anyone to exploit a system with ease. It has been a burden to perform security vul...
-
Chapter and Conference Paper
Deterrence Pointer for Distributed Denial-of-Service (DDoS) Attack by Utilizing Watchdog Timer and Hybrid Routing Protocol
Multiprocessor webwork is disciplined to an unrivaled amount and diversity of hacks, the preponderance of which is distributed denial of service. Throughout the time, there have been substantial studies of dis...
-
Article
QoS-Aware Service Migration in Multi-access Edge Compute Using Closed-Loop Adaptive Particle Swarm Optimization Algorithm
In the 5G network, hosting services in multi-access edge compute (MEC) infrastructure is a crucial enabler to achieving the high bandwidth and low latency targets for various applications. When MEC infrastruct...
-
Chapter and Conference Paper
Analysing and Identifying Harm Propagation of Cyber Threats in Autonomous Vehicles and Mitigation Through ANN
Connected and autonomous vehicle industry is fostering advancements in technologies such as artificial intelligence, machine learning, Internet of Things and Big data applications. Connected and autonomous veh...
-
Chapter and Conference Paper
Context-Aware Placement Applications of Industry 4.0 Using Connected Dominating Set in Fog Computing
The Fourth Industrial Revolution (Industry 4.0) is achieved by deploying Internet of Things (IoT) device over industrial area due to communication latency, and geographical distribution of cloud-centric IOT de...
-
Article
Water management using genetic algorithm-based machine learning
Water scarcity is the major problem presently being faced globally; it is to be managed in an efficient manner. The water management procedure is one of the techniques to condense necessary water. The objectiv...
-
Article
Computer vision algorithms for dominant contact lens feature extraction using fuzzy-logic-based classifications
Iris image recognition is an emerging approach for human identification but offers low reliability. An algorithm for dominant contact lens feature extraction based on an improved neighboring binary pattern (NB...
-
Article
Zadeh max–min composition fuzzy rule for dominated pixel values in iris localization
Iris detection fails at the iris localization stage pulling out of the sub-image from the original image; the objective of this paper is to realize the narrative approach for iris localization and to solve the...
-
Chapter and Conference Paper
Morphological-Based Localization of an Iris Image
Iris recognition is one of the reliable biometric techniques used for human identification purpose. It provides the unique information about a person with natural features such as both the left and right eye i...
-
Chapter
Implementation of Connected Dominating Set in Fog Computing Using Knowledge-Upgraded IoT Devices
Wireless sensor networks (WSNs) have a worldwide attraction because of its increasing popularity. The key enablers for the Internet of Things (IoT) are WSN, which plays an important role in future by collectin...
-
Chapter and Conference Paper
Implementation of Connected Dominating Set in Social Networks Using Mention Anomaly
Social network sites (SNS) are open platform that allows users to create an account in public sites. Social network site contains more active users, who share the posts, messages, or valuable information in re...