[HTML][HTML] Security in product lifecycle of IoT devices: A survey

N Yousefnezhad, A Malhi, K Främling - Journal of Network and Computer …, 2020 - Elsevier
Abstract The Internet of Things (IoT) paradigm is considerably impacted by security
challenges, which has lately demanded substantial consideration. Accordingly, certain …

An automatic tamil speech recognition system by using bidirectional recurrent neural network with self-organizing map

S Lokesh, P Malarvizhi Kumar, M Ramya Devi… - Neural Computing and …, 2019 - Springer
Speech recognition is one of the entrancing fields in the zone of computer science.
Exactness of speech recognition framework may decrease because of the nearness of noise …

Security and privacy issues in fog computing

A Ali, M Ahmed, M Imran… - Fog computing: Theory …, 2020 - Wiley Online Library
Fog computing is now becoming prominent among users due to its on‐demand services and
dynamic resource allocations. Resource allocation and scheduling is a critical task in cloud …

Classifying streaming of Twitter data based on sentiment analysis using hybridization.

SM Nagarajan, UD Gandhi - Neural computing & …, 2019 - search.ebscohost.com
Twitter is a social media that developed rapidly in today's modern world. As millions of
Twitter messages are sent day by day, the value and importance of developing a new …

An efficient approach for sentiment analysis using machine learning algorithm

A Naresh, P Venkata Krishna - Evolutionary intelligence, 2021 - Springer
Sentimental analysis determines the views of the user from the social media. It is used to
classify the content of the text into neutral, negative and positive classes. Various …

[PDF][PDF] A prototype for IoT based car parking management system for smart cities

BMK Gandhi, MK Rao - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
Background: Present day's car parking has become a major issue in urban areas with lack of
parking facilities and increased amount of vehicles, due to this drivers who are searching for …

Detecting streaming of Twitter spam using hybrid method

N Senthil Murugan, G Usha Devi - Wireless Personal Communications, 2018 - Springer
Twitter, the social network which evolving faster and regular usage by millions of people and
who become addicted to it. So spam playing a major role for Twitter users to distract them …

RETRACTED ARTICLE: Speech recognition with improved support vector machine using dual classifiers and cross fitness validation

B Kanisha, S Lokesh, PM Kumar… - Personal and ubiquitous …, 2018 - Springer
In this research, a new speech recognition method based on improved feature extraction
and improved support vector machine (ISVM) is developed. A Gaussian filter is used to …

Bibliometric analysis and scientific mapping of IoT

H Özköse - Journal of Computer Information Systems, 2023 - Taylor & Francis
ABSTRACT Internet of Things (IoT) studies to facilitate human life are increasing day by day.
There are more than 100.0000 academic studies related to the IoT in the Web of Science …

[PDF][PDF] A smart device integrated with an android for alerting a person's health condition: Internet of Things

M Prakash, U Gowshika… - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
Objective: The main objective is to develop a smart device, which is integrated in order to
help the aged people during the time of medical emergency situations using Internet of …