Cyspace Labs

121.00 Dollar US$
April 23, 2024 United States, Delaware, Middletown 9

Description



A COMBINATION OF OPTIMIZATION-BASED MACHINE LEARNING AND BLOCKCHAIN MODEL FOR ENHANCING SECURITY AND PRIVACY IN THE MEDICAL SYS-TEM


The intellectual team of IJMRA comprises of professionals across the world serving this academy in
various positions as Chief Advisors, Technical Advisors, International Editorial Board, Editorial Advisory
Board, Associate Editors, Reviewers, Conference Organizers etc..


Reference
1. Chandra, Ajay. International Journals of Multidisciplinary Research. IJMRA. [Online] March 01, 2024.
[Cited: March 01, 2024.] https://www.ijmra.us/2024ijesr_march.php.



A GREY WOLF OPTIMIZATION-BASED FEED-FORWARD NEURAL NETWORK FOR DETECTING INTRUSIONS IN INDUSTRIAL IOT

IJMRA is set up on a very strong scientific foundation and is one of the leading open-access, on-line journals in the World. This Academy boasts of hosting five major international journals under its wings, namely:



Reference
Dr. K Soumya, D. B. (2024, April). HANDWRITTEN TEXT RECOGNITION USING
PYTESSERACT. (IJMRA) Retrieved from IJMRA:
https://www.ijmra.us/2024ijmie_april.php
MK, A. C. (2024, April). A GREY WOLF OPTIMIZATION-BASED FEED-FORWARD
NEURAL NETWORK FOR DETECTING INTRUSIONS IN INDUSTRIAL IOT. Retrieved
from IJMRA: https://www.ijmra.us/2024ijmie_april.php

Panwar, V. (2024, April). Balancing Innovation and Transparency. (IJMRA )
Retrieved from A GREY WOLF OPTIMIZATION-BASED FEED-FORWARD NEURAL
NETWORK FOR DETECTING INTRUSIONS IN INDUSTRIAL IOT:
https://www.ijmra.us/2024ijmie_april.php


Fortifying Patient Privacy: A Cloud-Based IoT Data Security Architecture in Healthcare

Concerns regarding patient privacy and security have been raised by the explosion in data
generated by the growing use of IoT devices in healthcare settings. The absence of strong
processes for authenticating individuals.


Reference
 ( MK, A. C. (2024, April). Fortifying Patient Privacy: A Cloud-Based IoT Data Security Architecture in Healthcare. Retrieved from International Journal of Research in IT and Management (IJRIM: https://euroasiapub.org/wp-content/uploads/IJRIM2April24-A-CM.pdf



The procedure of identifying and reacting to unauthorized or malicious behaviours
within the IOT system, is called IOT attack detection. There are some several advantages and
challenges associated with implementing and maintaining the detection systems. Some of the
limitations are Complexity, false positive and negative and scalability. To defeat these
restrictions, we suggested a deep-learning based classification model (INTE).

Reference
MK, A. C. (2024, April). Association of Academic Researchers and Faculties (AARF) . Retrieved
from International Research Journal of Mathematics, Engineering and IT:
https://www.aarf.asia/current/2024/Apr/jzi4t181CRRyU43.pdf



Share by emailShare on FacebookShare on TwitterShare on Google+Share on LinkedInPin on Pinterest