Simulation and emulation tools for fog computing

SP Singh, R Kumar, A Sharma… - Recent Advances in …, 2022 - ingentaconnect.com
Background: Fog computing paradigm has recently emerged and gained increasing
attention in the present era of the Internet of Things. The growth of a large number of devices …

[PDF][PDF] A searchable ciphertext retrieval method based on counting bloom filter over cloud encrypted data

K YueJuan, L Yong, L Ping - IAENG International Journal of Computer …, 2020 - iaeng.org
As we all known that it is difficult to retrieve the ciphertext on cloud environment, that the
existing searchable encryption schemes have low efficiency in time, and that the file retrieval …

Smart Factory Setting Awareness by Noise-Pattern Analysis

S Pradeep, YK Sharma, C Verma… - … on System Modeling …, 2022 - ieeexplore.ieee.org
Recently, to build a smart factory, research is being conducted to perform fault diagnosis and
defect detection based on vibration and noise signals generated when a mechanical system …

Forensics-as-a-service: A Review of Mobile Forensics

YK Sharma, SS Noval, A Jain… - 2022 5th International …, 2022 - ieeexplore.ieee.org
Digital forensics is the scientific acquisition, analysis, and preservation of data contained in
electronic media. It is the most intricate step of the cybercrime investigation process often …

[PDF][PDF] Efficient virtual machine placement in data center

KR Nath, G Sreeram, D Lavanya, U Kiran… - … Journal of Advanced …, 2019 - researchgate.net
Cloud computing provides many benefits by optimizing different parameters to reach the
challenging requirements. Some of challenges in cloud computing are resource utilization …

[PDF][PDF] Intrusion Detection for real time Network Dataset using PCA and Random Forest Algorithms

MS Narudkar, A Mahajan, P Agarkar - INTERNATIONAL JOURNAL, 2023 - ijasret.com
Ensuring robust network security is of utmost importance in the present era. To safeguard
the integrity of in-network systems, numerous architectural solutions have been suggested to …

Annihilate Unsighted Dots in Operating and Aviation Using Artificial Intelligence

PS Rajakumar, SP Sunkari, G Sreeram - Intelligent System Design …, 2021 - Springer
With the new trends in technology, artificial intelligence is playing a major role in the
advancement of machines and software's. Remote sensing, robot control, medical …

An Intrusion Detection System for Network Security Using Recurrent Neural Network

KP Jadhav, M Gangwar - 2021 - ebooks.iospress.nl
To maintain the security of vulnerable network is the most essential thing in network system;
for network protection or to eliminate unauthorized access of internal as well as external …

[PDF][PDF] An Advanced Secured Privacy Preserving Techniques for Cloud Using Numerical SQL Query's

KR Nath, G Sreeram, M Anvesh, G Tharun, L Hemanth - 2019 - researchgate.net
Agencies and people re-appropriate database to acknowledge exquisite and minimal
attempt applications and administrations. That allows you to supply ok usefulness to square …