A Novel Approach to Human Iris Recognition And Verification Framework Using Machine Learning Algorithm

S Davuluri, S Kilaru, V Boppana… - … and Informatics (IC3I …, 2023 - ieeexplore.ieee.org
The component of a computer system that is in responsibility of user security is one of the
most important modules. It was demonstrated that simple logins and passwords are easy for …

UAVC: Unmanned Aerial Vehicle Communication Using a Coot Optimization-Based Energy Efficient Routing Protocol

ESRR Kumar, SB Chandolu, KPV Kumar… - … on Recent Advances …, 2023 - ieeexplore.ieee.org
Because of their ability to be deployed in open environments with a high degree of flexibility
and mobility, Unmanned Aerial Vehicles (UAVs) have garnered a considerable amount of …

Improving Network Security Using Intelligent Ensemble Techniques: An Integrated System for Detecting and Managing Intrusions in Computer Networks

SS Vellela, NR Vullum, R Thommandru… - … on Advances in …, 2024 - ieeexplore.ieee.org
Increasing security measures to prevent data breaches and network invasions has grown
more crucial due to the Internet's and networks' exponential growth. Since regular and …

A Secured Cloud Architecture for Storing Image Data using Steganography

AS Rao, L Dalavai, V Tata, SS Vellela… - … and Control (IC4), 2024 - ieeexplore.ieee.org
The safe storing of sensitive data, particularly image data, is crucial in the current digital
world. Image data may not be sufficiently protected from sophisticated cyber threats by using …

An Exploration of Federated Learning for Privacy-Preserving Machine Learning

KK Kumar, TS Rao, N Vullam, SS Vellela… - … on Innovative Trends …, 2024 - ieeexplore.ieee.org
Lately, privacy concerns have turned into a basic test for firms attempting to safeguard
financial models and meet with end-client assumptions. In any case, by definition, no PC …

[PDF][PDF] SmartIris ML: Harnessing Machine Learning for Enhanced Multi-Biometric Authentication

SP Praveen, SS Vellela… - Journal of Next …, 2024 - researchgate.net
As the demand for robust and secure biometric authentication systems continues to rise, this
research presents" SmartIris ML," a cutting-edge approach that harnesses the power of …

Identifying cloud internet of things requirements in healthcare: a Delphi-based study

L Gholamhosseini, F Sadoughi, S Rezayi… - The Journal of …, 2024 - Springer
Abstract The Internet of Things (IoT) and cloud computing are emerging technologies whose
use has been proven in various fields of medicine and healthcare. The positive impact of …

Smart Patient Monitoring Module Using Intelligent Technologies-Supported Wireless Application

RK Kanna - Fostering Cross-Industry Sustainability With Intelligent …, 2024 - igi-global.com
The study focuses on creating an IoT gateway-backed WSN architecture for healthcare
monitoring application. The intended users are elderly persons living alone at home and …

Detection of DDoS Attack in IoT Networks Using Sample elected RNN-ELM

V Reddy, KB Sk, D Roja, NMR Purimetla… - … on Recent Advances …, 2023 - ieeexplore.ieee.org
IoT, a global technology paradigm, allows a variety of devices to be online at any time and
from any location. But the widespread use of IoT devices has made them vulnerable to risks …

A Cloud-based Auto-Scaling System for Virtual Resources to Back Ubiquitous, Mobile, Real-Time Healthcare Applications

SK Basha, NMR Purimetla, D Roja… - 2023 3rd …, 2023 - ieeexplore.ieee.org
The utilisation of virtualization technologies in conjunction with cloud computing has
emerged as a significant and influential trend within the Information Technology (IT) sector …