6 research outputs found

    Cloud Computing Services and Security Challenges: A Review

    Get PDF
    An architecture of computing that provides services over the internet on the demand and desires of users that pay for the accessible resources that are shared is refer as the cloud computing. These resources are shared over the cloud and users do not have to acquire them physically. Some of the shared resources are: software, hardware, networks, services, applications and servers. Almost every industry from hospitals to education is moving towards the cloud for storage of data because of managing the effective cost and time of organizing the resources physically on their space. Storage of data over the data centers provided in the form of clouds is the key service of the cloud computing. Users store their desired data on clouds that are publicly available over the internet and away from their boundaries in cost effective manner.  Therefore, techniques like encryption is used for obscuring the user’s information before uploading or storing to the shared cloud devices. The main aim of the techniques is to provide security to the data of users from unauthorized and malicious intrusions

    Cognitive Radio and Dynamic Spectrum Access Using Fuzzy Logic

    Get PDF
    Cognitive Radio is artificially intelligent radio. This research paper work presents an application of Cognitive Radio and Dynamic Spectrum Access with the help of fuzzy logic considering the inputs: radio and satellite frequency and outputs: adjust power and modulation. This research paper shows the real approach of comparing the simulation and design algorithm result and its successful use

    An Expert System Technique for Sentiment Analysis of Opinions

    Get PDF
    To help the users and the product owners it is quite necessary to extract aspects from the online reviews, their sentiment polarities, and associations between them. There is a great deal of work done in the field of sentiment analysis. Lexical and learning-based systems can be combined to separate the assessments from online opinions and reviews. In learning-based techniques, the Gaussian mixture model can be used for getting probabilistic results for polarities against aspects and naïve baize classifiers for the problem of spam comments which produced better and competitive results against previous techniques

    SmartBin: An Approach to Smart Living Community Using IoT Techniques and Tools

    Get PDF
    Nowadays, individuals are getting steadily dynamic in achieving the possible ways to clean their environment. The concerned teams have initiated other developments to build tidiness. Previously, prior data on filling the trash container was required, which cautions and sends cautioning messages to the city workers for cleaning the trash receptacle on schedule and protecting the city. In this framework, numerous dustbins through urban areas from various regions are associated with utilizing IoT innovation. This program can be used conveniently to verify the status of the dust bin, the garbage in the dust containers, clean the dust bin on time, and maintain the atmosphere's safety and prevent contamination from overflows from the dust containers. So, people don't have to test everyone's work manually, so they'll get a warning if the container is full. A sensor over the garbage container would be placed to detect the full amount of waste, and when it exceeds the excessive volume, a warning will be transmitted to the company office. The proposed framework based on Arduino IDE, cloud computing concept and Load Sensor will help clean any city. Load Sensors are utilized to distinguish the dimension of trash gathered in the containers. The application also gets Latitude and Longitude estimations of the territory where the Garbage Bins are put

    The Impacts of Ethical Hacking and its Security Mechanisms

    Get PDF
    Hacking is a typical method for breaching personal and confidential information. As a result, hacking is also known as infiltration. Intrusions, on the other hand, were not always recognized as theft and were employed for productive purposes. A person or corporation that does ethical hacking and receives incentives from a network or system owner for testing can enter an apparatus (system or network) to locate, repair, and expose network flaws. Most ethical hackers, also known as black hat hackers, test systems using different approaches, methodologies, and tools. Because today's life is lived in a digital world, we need to protect our privacy from cyber-attacks. The proposed paper discussed ethical hacking and its ramifications, in which black hackers "hack" networks. The proposed research emphasizes ethical hacking tactics. This research also examines the impact of ethical hacking on business, education, health, society, the workplace, technology, sensitive information, and human life. Finally, a brief survey based on certain questions is better to grasp the public's understanding of ethical hacking. In summary, this research offers the user fascinating and helpful information when working on ethical hacking

    E-Healthcare Using Block Chain Technology and Cryptographic Techniques: A Review

    Get PDF
    The potential of information technology has influenced the efficiency and quality of healthcare worldwide. Currently, several republics are incorporating electronic health records (EHRs). Due to reluctance of technological adaptation & implementational complexities, electronic health record systems are not in practice. Due to the emphasis on achieving general compatibility, users may perceive systems as being imposed and providing insufficient customizability, which may exacerbate issues in a setting of national implementation. EHS improves patient safety and confidentiality and ensures operative, effective, well-timed, reasonable, and patient-centred care, all of which substantially impact healthcare quality. Blockchain technology has been used by the EHS system, which supports web-based accessibility and availability. The difficulties of exchanging medical data can now be overcome by consumers using an infrastructure based on cloud computing. A variety of cryptographic approaches have been employed to encrypt and safeguard the data. This review paper aims to highlight the role and impact of blockchain in EHR. The proposed research describes cryptography methods, their classifications, and the challenges associated with EHR to identify gaps and countermeasures
    corecore