Sandesh Achar
YOU?
Author Swipe
A STUDY OF EVOLVING CLOUD COMPUTING DATA SECURITY: A MACHINE LEARNING PERSPECTIVE Open
Objective: The objective of this study is to investigate the application of machine learning (ML) techniques in enhancing cloud security, with the aim of improving threat detection and mitigation strategies for cloud-based systems. Theoret…
BankNet: Real-Time Big Data Analytics for Secure Internet Banking Open
The rapid growth of Internet banking has necessitated advanced systems for secure, real-time decision making. This paper introduces BankNet, a predictive analytics framework integrating big data tools and a BiLSTM neural network to deliver…
Edge-Cloud Synergy for AI-Enhanced Sensor Network Data: A Real-Time Predictive Maintenance Framework Open
Sensor networks generate vast amounts of data in real-time, which challenges existing predictive maintenance frameworks due to high latency, energy consumption, and bandwidth requirements. This research addresses these limitations by propo…
RAP-Optimizer: Resource-Aware Predictive Model for Cost Optimization of Cloud AIaaS Applications Open
Artificial Intelligence (AI) applications are rapidly growing, and more applications are joining the market competition. As a result, the AI-as-a-service (AIaaS) model is experiencing rapid growth. Many of these AIaaS-based applications ar…
Cloud IaaS Optimization Using Machine Vision at the IoT Edge and the Grid Sensing Algorithm Open
Security grids consisting of High-Definition (HD) Internet of Things (IoT) cameras are gaining popularity for organizational perimeter surveillance and security monitoring. Transmitting HD video data to cloud infrastructure requires high b…
RAP-Optimizer: Resource-Aware Predictive Model for Cost Optimization of Cloud AIaaS Applications Open
AI-driven applications are rapidly growing, and more applications are joining the market competition. As a result, the AI-as-a-Service (AIaaS) model is experiencing rapid growth. Many of these AIaas-based applications are not properly opti…
Cyber-Physical System Security Based on Human Activity Recognition through IoT Cloud Computing Open
Cyber-physical security is vital for protecting key computing infrastructure against cyber attacks. Individuals, corporations, and society can all suffer considerable digital asset losses due to cyber attacks, including data loss, theft, f…
Human Activity Recognition-based Cyber-Physical System Security Through IoT-Cloud Computing Open
Cyber-physical security is vital for protecting key computing infrastructure against cyber attacks. Individuals, corporations, and society can all suffer considerable digital asset losses due to cyber attacks, including Data loss, theft, f…
Adopting Cloud-Based Techniques to Reduce Energy Consumption: Toward a Greener Cloud Open
The cloud computing industry has set new goals for better service delivery and deployment, so anyone can access services such as computation, application, and storage anytime. Cloud computing promises new possibilities for approaching sust…
Neural-Hill: A Novel Algorithm for Efficient Scheduling IoT-Cloud Resource to Maintain Scalability Open
The age of the Fourth Industrial Revolution (4IR) is the era of smart technologies and services. The Internet of Things (IoT) is at the heart of these smart services. The IoTs are resource-constrain devices. They act as middleware in intel…
Confimizer: A Novel Algorithm to Optimize Cloud Resource by Confidentiality-Cost Trade-Off Using BiLSTM Network Open
The world is expiring a 23% annual data growth rate and is projected to have a total surplus volume of 175 Zettabytes by 2025. It imposes significant challenges for small to medium-sized businesses to allocate funds for large-size data sto…
Business Trends in Digital Era: A Review Open
The business has a unique function in sustainable economic growth since it not only helps realize creative potential but also generates dispersed employment opportunities and additional funding for budgets at various levels. The use of var…
Adopting Artificial Intelligence and Deep Learning Techniques in Cloud Computing for Operational Efficiency Open
Artificial intelligence (AI) is being increasingly incorporated into many applications across various sectors such as health, education, security, and agriculture. Recently, there has been rapid development in cloud computing technology, r…
PRACTICES AND LIMITATIONS OF PUBLIC CLOUD CONTRACTS Open
The use of computer services provided by a third party has become common, both privately and professionally.Some are even pre-installed on our mobile phones when purchased, and sometimes very comfortable to use.Utilize.However, data confid…
Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in our Modern Threat Landscape Open
Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, includ…
Network Security Framework, Techniques, and Design for Hybrid Cloud Open
Network security is a framework that deals with issuing procedures and policies that will be used to establish and maintain security protocols in a particular organization. The functions related to the network security framework are orient…
A Comprehensive Study of Current and Future Trends in Cloud Forensics Open
Organizations are increasingly turning to cloud computing, which offers convenience and provides services based on virtualization technology. Some benefits of cloud computing include accessibility, availability, flexibility, vast storage c…
An Overview of Environmental Scalability and Security in Hybrid Cloud Infrastructure Designs Open
The practice of using IT resources via the internet with pay-as-you-go pricing is known as cloud computing. The cloud computing market has grown dramatically in the last few years. Most companies are transmitting from on-premises data cent…
Enterprise SaaS Workloads on New-Generation Infrastructure-as-Code (IaC) on Multi-Cloud Platforms Open
Cloud Computing has become the primary model used by DevOps practitioners and researchers to provision infrastructure in minimal time. But recently, the traditional method of using a single cloud provider has fallen out of favor due to sev…
Influence of IoT Technology on Environmental Monitoring Open
The newly connected globe has the potential to become a more environmentally friendly and sustainable place if more efficiencies can be brought to various industries. We will look at examples of how the Internet of Things technology is hel…
Maximizing the Potential of Artificial Intelligence to Perform Evaluations in Ungauged Washbowls Open
Long short-term memory networks (LSTM) offer precision in the prediction that has never been seen before in ungauged basins. Using k-fold validation, we trained and evaluated several LSTMs in this study on 531 basins from the CAMELS data s…
Cloud and HPC Headway for Next-Generation Management of Projects and Technologies Open
In the last decade, cloud computing has changed dramatically. More providers and administration contributions have entered the market, and cloud infrastructure, once limited to single-provider data centers, is expanding. This article discu…
A Review of Hosting Enterprise SaaS with IaC on Multi-cloud Platforms Open
This paper explores the concepts of Enterprise Software as a Service (SaaS), the reasons for hosting a SaaS solution on a multi-cloud platform, and the benefit of using Infrastructure as Code (IaC) on a multi-cloud for quick provisioning. …
Early Consequences Regarding the Impact of Artificial Intelligence on International Trade Open
The consequences of this new technology for international trade have recently garnered much attention, thanks to the growing interest in AI's effects on the economy and society. Given the current reevaluation of the advantages of globaliza…
Behavioral And Perceptual Models for Secure Data Analysis and Management Open
The ability to monitor and forecast citizen behavior on a large scale developed to be a top target for governments subject to security and intelligence that are collective in the current worldwide culture where the web has become the prima…
Data Privacy-Preservation: A Method of Machine Learning Open
The privacy-preservation field in cyber security tends to affiliate with the protection measure related to the use of data and its sharing via third parties for activities such as data analysis. The paper's main objective for this research…
Asthma Patients' Cloud-Based Health Tracking and Monitoring System in Designed Flashpoint Open
Asthma is a chronic illness that causes improper respiratory organ function and breathing problems. Three hundred fifty million people worldwide have bronchial asthma, or one in 12 adults. Self-monitoring is the first step in managing chro…
Software as a Service (SaaS) as Cloud Computing: Security and Risk vs. Technological Complexity Open
The software delivery model known as Software as a service (SaaS) has evolved from cutting-edge innovation to an essential technology for many companies. However, due to the extensive range of cloud services that companies offer as part of…