A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption
An organization can be created through the Industrial Internet of Things (IIoT), which can
transform an existing bound structure. The Industrial Internet of Things (IIoT) and its remote …
transform an existing bound structure. The Industrial Internet of Things (IIoT) and its remote …
[HTML][HTML] Sales-Based Models for Resource Management and Scheduling in Artificial Intelligence Systems
D Dudeja, SM Sabharwal, Y Ganganwar… - Engineering …, 2023 - mdpi.com
Recent trends have shown a greatly increasing number of users in the digital world, so there
is a need for a large number of resources. To handle these resources, there is the need to …
is a need for a large number of resources. To handle these resources, there is the need to …
High-Availability Encryption-Based Cloud Resource Provisioning System
RS Koppaiyan, AS Pallivalappil, P Singh… - Proceedings of the 4th …, 2022 - dl.acm.org
Cryptosystems are getting fascination because of numerous regular likenesses between
these two-region disorder hypothesis and cryptography. In symmetric cryptosystems, the …
these two-region disorder hypothesis and cryptography. In symmetric cryptosystems, the …
[HTML][HTML] Intelligent Machine Learning Based Internet of Things (IoT) Resource Allocation
The Internet of Things (IoT) and machine learning provide insights that would otherwise be
hidden in data for quicker, automated responses and improved decision-making. By …
hidden in data for quicker, automated responses and improved decision-making. By …
[HTML][HTML] Resource Management Techniques for the Internet of Things, Edge, and Fog Computing Environments
K Chakraborty, M Sharma, K Kommuri… - Engineering …, 2023 - mdpi.com
A speculative exhibit for distributed computing organizations is implied as a haze of mists
joining different parceled mists into a solitary fluid mass for on-request tasks. Fundamentally …
joining different parceled mists into a solitary fluid mass for on-request tasks. Fundamentally …
[HTML][HTML] A Futuristic Approach to Security in Cloud Data Centers Using a Hybrid Algorithm
D Chatterjee, MMM Hassan, N Islam, A Ray… - Engineering …, 2023 - mdpi.com
All associations use on-premises data focus. An on-premises data focus suggests that an
association maintains all locally required IT systems. An on-premises data focus …
association maintains all locally required IT systems. An on-premises data focus …
[HTML][HTML] Market-Inspired Framework for Securing Internet of Things Computing Environment
IoT security, also known as Internet of Things security, is an innovation component that
focuses on protecting connected devices and systems on the Internet of Things (IoT). There …
focuses on protecting connected devices and systems on the Internet of Things (IoT). There …
Multilevel Cloud resource Scheduling approach based on imagebased signature system
Cloud computing is arising with developing fame in work process booking, particularly for
logical work process. During resource allotment, the cloud computing climate might …
logical work process. During resource allotment, the cloud computing climate might …
[HTML][HTML] Cloud Service Broker Using Ontology-Based System
Cloud computing offers more advantages to clients and associations regarding capital uses
and working cost investment funds. This study gives an ontological model of the cloud …
and working cost investment funds. This study gives an ontological model of the cloud …
Original Research Article Designing heuristic driven hybrid optimization algorithms for efficient workflow scheduling in IaaS cloud
S Kumar, A Jain, A Pareek - Journal of Autonomous Intelligence, 2024 - jai.front-sci.com
Each one of the real resources or hardware like workstations, work ranges, joins, switches,
switches, server ranches, and capacity contraptions are fundamental for the establishment …
switches, server ranches, and capacity contraptions are fundamental for the establishment …