Sei sulla pagina 1di 7

International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

RESEARCH ARTICLE OPEN ACCESS

IDEAL CONFIDENTIAL MECHANISMS BASED


SECURE HEALTHCARE MODEL FOR SMART CITY
Akshat Agrawal
Department of Computer Science & Engineering Amity University
Haryana, Manesar – Haryana
Abstract:
Smart City healthcare (SHC2) is a system used to monitor the patient in the home by expecting and reacting to their
needs and conceding their freedom. Thus, IoT is a path for thought. It is trusted that IoT-based healthcare devices
will almost certainly give the early recognition of potential intensifications and advise patients and medical experts
to such an extent that they can be dealt with instantly. This paper examined the SHC2 security through Light Weight
Cipher (LWC) with the Optimal S-Box model in PRESENT cipher, this procedure to sub bytes change and the
single function connected to several byte information to upgrade the security level by Swam optimization. Nonlinear
layer single 4-bit S box for round configuration, after verifying the SHC2 information constrained by Mutual
Authentication (MA). Security worries in healthcare information systems and presumes that what is required is a
methodology that immovably concretes the establishments for a practical and effective healthcare framework
dependent on solidarity and worked to adapt to the developing threats. Healthcare service providers for giving the
full extent of medical services to individuals joined up with IoT. From the implementation, analysis to demonstrate
the security levels of our proposed model interims time and access policies. From the implementation results, our
proposed SHC2 analyzed by encryption time, decryption time, access time and response time in minimum range.
Then the level of the and throughput is analyzed by maximum value like 50Mbps/sec and 95.56% for PRESENT-
Authorization cipher for smart city security process.
Keywords: Light Weight Cipher, Smart City healthcare, Optimal S-Box model encryption time and decryption
time.

I. INTRODUCTION 28]. The main troubles for creating just as evolved


countries, using distant medical care advancement
As a result of the significance of shrewd metropolitan may allow the decline in an enormous segment of the
regions to various accomplices and the focal points organization of persistent sicknesses and may in like
and troubles related with its utilization, the thought manner add to the improvement of elderly people's
has been attracting basic thought from experts inside fulfillment [6, 7].
different kind assessments, including Internet of Utilizing far off sensor networks in medical services
Things (IoT), Information Systems (IS) and more frameworks involves a creating field for legitimate
standard programming designing and planning assessment especially. In all honesty, present-day
controls [1]. Different metropolitan networks have medical services will require pervasive observing of
now begun advancing toward grasping this thought. wellbeing with less correspondence among experts
There are four zones around the possibility of and patients [8]. Ground-breaking just as solid
reasonability that were directed by Amsterdam and cryptography limits are basic for working up a
these join versatility, working, open space, and living secured application as distant sensor frameworks for
[2-15]. Medical services (HC) IoT can in like manner Smart Cities Heath care (SC-HC) change sensitive
uphold quiet duty and satisfaction by empowering physiological and individual data [30-42]. To
them to contribute more energy partner with their overhaul the security of the Infrastructure needed for
primary care physicians [3, 4, 28]. distant medical services is picked up from various
The blend of the recognizing gadgets and the traders. Medical care data is Reliable and secure trade
customer equipment development which is an over the nearby organization and through the quite a
important application will help in observing the while in the past framework like the Internet to the
patient's wellbeing consistently in the medical care an medical services worker [10,22].
area. These including assistive conditions don't need
any correspondence or wearables concerning the II. RELATED WORKS
customer yet need to vanquish the expected
challenges of observing different people at once [15- Keen metropolitan zones use data and
correspondence advancements to improve: the

ISSN: 2347-8578 www.ijcstjournal.org Page 32


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

individual fulfillment for its locals, the close by called Hybrid Teaching and Learning Based
economy, transport, traffic the chiefs, condition, and Optimization (HTLBO). By then, we present medical
participation with the legislature. In light of the care specialist organizations for giving the full degree
congruity of shrewd metropolitan networks by of clinical administrations to people got together with
Ismagilova, Geerthik et al. [25] as data and IoT.
correspondence advancements are changing standard
metropolitan networks into shrewd metropolitan III. PROPOSED METHODOLOGY
regions, the IoT makes brilliant metropolitan regions
powerful and responsive. Taking everything into (i) Purpose of Healthcare for Smart Cities This
account, for clinical technologists to enter and application is sent for distantly checking the patient's
develop themselves in the new medical care industry, principal boundaries utilizing sensors, gadgets, and
it is essential that we look past regular kinds of things incorporating them. Brilliant contraptions in
mechanical advancements by Samad et al. [26]. medical services are used to store and regulate key
As to keen medical services inside savvy thought boundaries and to manage the came down
metropolitan zones, this part presents an examination with sickness information. Truth be told, for most
where an optoelectronic regulator chip was proposed cases, it may consolidate developed fixed sensors
to control the miniature light-radiating diode (LED) [52-58]. Nowadays, different exercises have been
structure used in the retinal prosthesis. An expected to help a more broad viewpoint on
independently addressable low force more modest prosperity and success consequently splendid
miniature LED group is arranged and the results are wearables devices like health tracker or wellbeing
represented. In all honesty, a remote sensor gatherings and in any event, prosperity assessment
framework is used to assemble clinical data, for applications in mobile phones have expanded
instance, major signs and individual data to send it to awesome thought among wellbeing fans. These
the parental figure. Consequently, the ensuring devices are sharp in the sense as they essentially
security and assurance of this fragile data are screen prosperity just as give plans if vital at the ideal
outstandingly fundamental by Palani et al. [27]. Data time. A case of SHC2 is graphically spoken to in
security is a relating movement between controlling figure 1 and this technique shaving some huge terms
admittance to information while allowing free and that are explained in the accompanying as.
basic admittance to people who need that (ii) Mobile Sensors: Sensors, being powerfully
information. Given the sensitive thought of progressively pleasing and less unmistakable, are
therapeutic administrations data, it is irreplaceable for reasonable for checking an individual's prosperity or
human administrations providers to have a solid and wellbeing without meddling with their step by step
reliable information security organization set up. The works out. The sensors can check a couple of
techniques to react and make sure about the social physiological signs/boundaries similarly as activity
protection data, yet additionally predict and hinder and advancement of an individual by putting them at
any assaults pushed by computerized gangsters. different territories of the body [59-60].
(iii) Engaging patients in Heath Monitoring:
Before long, the usage of this development is for all thusly the more seasoned or patients with constant
intents and purposes unexplored in medical care illnesses can benefit from therapy and clinical
circumstances, where potential applications observing in their condition without taking off to the
consolidate understanding observing, asset crisis facility sometimes. Authorities in the distant
perceptibility, and drug association frameworks, to worker center can screen the patient's prosperity
allude to a couple Rajagopal et al. [28]. The medical condition eagerly, and salvage them if an emergency
services data identified by the IoT sensor framework occurs and offer nonstop guidance to the patients'
is encoded by Lightweight SIMON block figure by recovery and long haul care [61-68]. The Healthcare
Mondragon et al. [29]. The decision of the customers framework is as appeared in Figure 1.
in IoHT is made by the metaheuristic calculation

ISSN: 2347-8578 www.ijcstjournal.org Page 33


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

Figure 1: Healthcare system


current framework, here existing as SIMON with the
IV. RESULT AND DISCUSSION: TLBO model. Proposed security so it needs less
encryption time for data encryption than caution net,
Medical services data assurances the execution yet due to the use of outside keys, SHC2-requires a
model, the assembled data is changed over to bundles more noteworthy number of cycles to deliver
arranged to send from sensors. Our proposed ideal S- subjective keys than the proposed approach. So
Box with PRESENT code has the least encryption likewise for figure 5, that is access time and response
and interpreting season of security in brilliant time in figure 6, access time contrasts with the
metropolitan zones demonstrates through outcomes. amount of SHC2ciphertexts. The response time is
This assessment is subject to the Access course of 1345ms s in ideal PRESENT Cipher and 2348 access
action versus the hour of medical care data. For time accomplishes 40 of code data in ideal S-Box.
example, if the entrance strategy is 60, the hour of The Level of Security in SHC2 is as appeared in
encryption and unscrambling is 300ms and 1874ms Figure 2.
of our proposed appeared differently in relation to the

Figure 2: Level of Security in SHC2

ISSN: 2347-8578 www.ijcstjournal.org Page 34


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

V. CONCLUSION (2019, February). Advanced expert system


using particle swarm optimization based
This PRESENT Cipher plays out the key booking adaptive network based fuzzy inference
two unmistakable assessed key was picked and system to diagnose the physical constitution of
planned the 80bit and 128bit keys. By then, it tends human body. In International Conference on
to be considered with other cryptography calculations Emerging Technologies in Computer
to improve the security of a half and half calculation Engineering (pp. 349-362). Springer,
for more data. The fate of security in distant medical Singapore.
care frameworks, which demands dynamically quiet [9] Jiménez, A. C., García-Díaz, V., González-
determined and customizable security arrangements, Crespo, R., &Bolaños, S. (2018).
is taken a gander at with different challenges. In Decentralized Online Simultaneous
addition, consolidate the more than block codes to Localization and Mapping for Multi-Agent
expanding the security level of the medical services Systems. Sensors, 18(8), 2612.
data. [10] Venkatraman, S., Surendiran, B., & Kumar, P.
A. R. (2020). Spam e-mail classification for
REFERENCES the Internet of Things environment using
[1] Feng, Y., Yi, J. H., & Wang, G. G. (2019). semantic similarity approach. The Journal of
Enhanced Moth Search Algorithm for the Set- Supercomputing, 76(2), 756-776.
Union Knapsack Problems. IEEE Access, 7, [11] Lydia, E. L., Raj, J. S., PandiSelvam, R.,
173774-173785. Elhoseny, M., & Shankar, K. (2019).
[2] Sivaram, M., Batri, K., Amin Salih, M., Application of discrete transforms with
&Porkodi, V. (2019). Exploiting the Local selective coefficients for blind image
Optima in Genetic Algorithm using Tabu watermarking. Transactions on Emerging
Search. Indian Journal of Science and Telecommunications Technologies, e3771.
Technology, 12(1), 1-13. [12] Ezhilarasu, P., Prakash, J., Krishnaraj, N.,
[3] Venkatraman, S., &Surendiran, B. (2020). Kumar, D. S., Babu, K. S., &Parthasarathy, C.
Adaptive hybrid intrusion detection system for (2015). A Novel Approach to Design the
crowd sourced multimedia internet of things Finite Automata to Accept the Palindrome
systems. Multimedia Tools and with the Three Input Characters. Indian
Applications, 79(5), 3993-4010. Journal of Science and Technology, 8(28).
[4] Sujitha, B., Parvathy, V. S., Lydia, E. L., Rani, [13] Devaraj, A. F. S., Elhoseny, M.,
P., Polkowski, Z., & Shankar, K. (2020). Dhanasekaran, S., Lydia, E. L., & Shankar, K.
Optimal deep learning based image (2020). Hybridization of firefly and Improved
compression technique for data transmission Multi-Objective Particle Swarm Optimization
on industrial Internet of things algorithm for energy efficient load balancing
applications. Transactions on Emerging in Cloud Computing environments. Journal of
Telecommunications Technologies, e3976. Parallel and Distributed Computing.
[5] Ezhilarasu, P., Krishnaraj, N., &Dhiyanesh, B. [14] Zou, D., Wang, G. G., Sangaiah, A. K., &
(2015). Arithmetic Coding for Lossless Data Kong, X. (2017). A memory-based simulated
Compression–A Review. International Journal annealing algorithm and a new auxiliary
of Computer Science Trends and function for the fixed-outline floorplanning
Technology, 3(3). with soft blocks. Journal of Ambient
[6] Porkodi, V., Singh, A. R., Sait, A. R. W., Intelligence a+nd Humanized Computing, 1-
Shankar, K., Yang, E., Seo, C., & Joshi, G. P. 12.
(2020). Resource Provisioning for Cyber– [15] Kumar, A., Ahuja, H., Singh, N. K., Gupta, D.,
Physical–Social System in Cloud-Fog-Edge Khanna, A., & Rodrigues, J. J. (2018).
Computing Using Optimal Flower Pollination Supported matrix factorization using
Algorithm. IEEE Access, 8, 105311-105319. distributed representations for personalised
[7] Gao, D., Wang, G. G., &Pedrycz, W. (2020). recommendations on twitter. Computers &
Solving fuzzy job-shop scheduling problem Electrical Engineering, 71, 569-577.
using DE algorithm improved by a selection [16] Sivaram, M., Porkodi, V., Mohammed, A. S.,
mechanism. IEEE Transactions on Fuzzy Manikandan, V., &Yuvaraj, N. (2019).
Systems. Retransmission DBTMA protocol with fast
[8] Sivaram, M., Mohammed, A. S., Yuvaraj, D., retransmission strategy to improve the
Porkodi, V., Manikandan, V., &Yuvaraj, N. performance of MANETs. IEEE Access, 7,
85098-85109.

ISSN: 2347-8578 www.ijcstjournal.org Page 35


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

[17] Venkatraman, S., & Kumar, P. A. R. (2019). Sonograms. Current Signal Transduction
Improving Adhoc wireless sensor networks Therapy, 11(2), 84-90.
security using distributed automaton. Cluster [28] Rajagopal, A., Ramachandran, A., Shankar,
Computing, 22(6), 14551-14557. K., Khari, M., Jha, S., Lee, Y., & Joshi, G. P.
[18] Lydia, E. L., Govindaswamy, P., (2020). Fine-tuned residual network-based
Lakshmanaprabu, S., &Ramya, D. (2018). features with latent variable support vector
Document clustering based on text mining K- machine-based optimal scene classification
means algorithm using euclidean distance model for unmanned aerial vehicles. IEEE
similarity. J. Adv. Res. Dyn. Control Access, 8, 118396-118404.
Syst.(JARDCS), 10(2), 208-214. [29] Mondragon, V. M., García-Díaz, V., Porcel,
[19] Ortin, F., Mendez, S., García‐Díaz, V., & C., & Crespo, R. G. (2018). Adaptive contents
Garcia, M. (2014). On the suitability of for interactive TV guided by machine learning
dynamic languages for hot‐reprogramming a based on predictive sentiment analysis of
robotics framework: a Python case data. Soft Computing, 22(8), 2731-2752.
study. Software: Practice and [30] Feng, Y., Yu, X., & Wang, G. G. (2019). A
Experience, 44(1), 77-104. Novel Monarch Butterfly Optimization with
[20] Krishnaraj, N., Ezhilarasu, P., & Gao, X. Z. Global Position Updating Operator for Large-
Hybrid Soft Computing Approach for Scale 0-1 Knapsack
Prediction of Cancer in Colon Using Problems. Mathematics, 7(11), 1056.
Microarray Gene Data. Current Signal [31] Mohammed, A. S., & Sivaram, P. (2018).
Transduction Therapy, 11(2). Securing the Sensor Networks Along With
[21] Le Nguyen, B., Lydia, E. L., Elhoseny, M., Secured Routing Protocols for Data Transfer
Pustokhina, I., Pustokhin, D. A., Selim, M. M., in Wireless Sensor Networks.
... & Shankar, K. (2020). Privacy Preserving [32] Geerthik, S., Venkatraman, S., & Gandhi, K.
Blockchain Technique to Achieve Secure and R. (2016, February). Reward rank: A novel
Reliable Sharing of IoT Data. CMC- approach for positioning user answers in
COMPUTERS MATERIALS & community question answering system.
CONTINUA, 65(1), 87-107. In 2016 International Conference on
[22] Chavhan, S., Gupta, D., Chandana, B. N., Information Communication and Embedded
Khanna, A., & Rodrigues, J. J. (2019). IoT- Systems (ICICES) (pp. 1-6). IEEE.
based Context-Aware Intelligent Public [33] Sivaram, M., Lydia, E. L., Pustokhina, I. V.,
Transport System in a metropolitan area. IEEE Pustokhin, D. A., Elhoseny, M., Joshi, G. P.,
Internet of Things Journal. & Shankar, K. (2020). An optimal least square
[23] Gu, Z. M., & Wang, G. G. (2020). Improving support vector machine based earnings
NSGA-III algorithms with information prediction of blockchain financial
feedback models for large-scale many- products. IEEE Access, 8, 120321-120330.
objective optimization. Future Generation [34] Ghantasala, G. P., &KrishnaRaj, N. Support
Computer Systems, 107, 49-69. Vector Machine Based Automatic
[24] Porkodi, V., Khan, J., Mohammed, A. S., Mammogram Classification Using Hybrid
Bhuvana, J., & Sivaram, M. OPTIMIZED Optimization Algorithm.
COOPERATIVE QOS ENHANCED [35] Sikkandar, M. Y., Alrasheadi, B. A., Prakash,
DISTRIBUTED MULTIPATH ROUTING N. B., Hemalakshmi, G. R., Mohanarathinam,
PROTOCOL. A., & Shankar, K. (2020). Deep learning based
[25] Geerthik, S., Venkatraman, S., & Gandhi, R. an automated skin lesion segmentation and
(2016). AnswerRank: Identifying Right intelligent classification model. Journal of
Answers in QA system. International Journal Ambient Intelligence and Humanized
of Electrical and Computer Engineering, 6(4), Computing, 1-11.
1889. [36] Zhang, Z., Wang, G. G., Zou, K., & Zhang, J.
[26] Samad, A., Salima, R., Lydia, E. L., & (2014). A solution quality assessment method
Shankar, K. (2020). Definition and Features of for swarm intelligence optimization
Rural Marketing Strategies for Encourage algorithms. The Scientific World
Development in Rural Areas. TEST Journal, 2014.
Engineering & Management, 82, 4983-4988. [37] Sivaram, Murugan et al. ‘Data Fusion Using
[27] Palani, E., Nagappan, K., &Alhadidi, B. Tabu Crossover Genetic Algorithm in
(2016). Segmentation and Texture Analysis for Information Retrieval’. 1 Jan. 2020 : 1 – 10.
Efficient Classification of Breast Tumors from

ISSN: 2347-8578 www.ijcstjournal.org Page 36


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

[38] Khamparia, A., Pandey, B., Tiwari, S., Gupta, physical environment. IEEE Latin America
D., Khanna, A., & Rodrigues, J. J. (2020). An Transactions, 13(2), 503-509.
integrated hybrid CNN–RNN model for visual [49] Kumar, R. S., Krishnaraj, N., &Keerthana, G.
description and generation of (2017). Assessment of Quality of Service in
captions. Circuits, Systems, and Signal Communication Network and Evaluating
Processing, 39(2), 776-788. Connectivity Among IP Networks. Asian
[39] Geerthik, S., Gandhi, K. R., &Venkatraman, S. Journal of Applied Science and Technology
(2016, December). Domain expert ranking for (AJAST), 1(3), 319-322.
finding domain authoritative users on [50] Elhoseny, M., Rajan, R. S., Hammoudeh, M.,
community question answering sites. In 2016 Shankar, K., &Aldabbas, O. (2020). Swarm
IEEE International Conference on intelligence–based energy efficient clustering
Computational Intelligence and Computing with multihop routing protocol for sustainable
Research (ICCIC) (pp. 1-5). IEEE. wireless sensor networks. International Journal
[40] Muruganantham, A., Nguyen, P. T., Lydia, E. of Distributed Sensor Networks, 16(9),
L., Shankar, K., Hashim, W., &Maseleno, A. 1550147720949133.
(2019). Big data analytics and intelligence: A [51] Chu, H. C., Wang, G. G., & Park, J. H. (2015).
perspective for health care. The digital fingerprinting analysis concerning
[41] Ramkumar, V., &Krishnaraj, N. Weight Based google calendar under ubiquitous mobile
LSA to Retrieve Information from Web Pages computing era. Symmetry, 7(2), 383-394.
Based On Document Score. [52] Manikandan, V., Sivaram, M., Mohammed, A.
[42] Balakiruthiga, B., Deepalakshmi, P., Mohanty, S., &Porkodi, V. (2020). Nature Inspired
S. N., Gupta, D., Kumar, P. P., & Shankar, K. Improved Firefly Algorithm for Node
(2020). Segment routing based energy aware Clustering in WSNs. CMC-COMPUTERS
routing for software defined data MATERIALS & CONTINUA, 64(2), 753-
center. Cognitive Systems Research. 776.
[43] Chu, H. C., Wang, G. G., & Deng, D. J. [53] Kuppusamy, P., Venkatraman, S.,
(2016). The social networking investigation of Rishikeshan, C. A., & Reddy, Y. P. (2020).
metadata of forensic artifacts of a typical Deep learning based energy efficient optimal
WeChat session under Windows. Security and timetable rescheduling model for intelligent
Communication Networks, 9(18), 5698-5709. metro transportation systems. Physical
[44] Sivaram, M., Yuvaraj, D., Mohammed, A. S., Communication, 101131.
Manikandan, V., Porkodi, V., &Yuvaraj, N. [54] Asih, E. S., Nguyen, P. T., Lydia, E. L.,
(2019). Improved Enhanced Dbtma with Shankar, K., Hashim, W., &Maseleno, A.
Contention-Aware Admission Control to (2019). Mobile E-commerce website for
Improve the Network Performance in Manets. technology-based buying selling
CMC-COMPUTERS MATERIALS & services. International Journal of Engineering
CONTINUA, 60(2), 435-454. and Advanced Technology, 8(6), 884-888.
[45] Gochhayat, S. P., Lal, C., Sharma, L., Sharma, [55] Lydia, E. L., &Swarup, M. B. (2015). Big data
D. P., Gupta, D., Saucedo, J. A. M., &Kose, U. analysis using hadoop components like flume,
(2019). Reliable and secure data transfer in mapreduce, pig and hive. International Journal
IoT networks. Wireless Networks, 1-14. of Science, Engineering and Computer
[46] Subbarayalu, V., Surendiran, B., &Arun Raj Technology, 5(11), 390.
Kumar, P. (2019). Hybrid Network Intrusion [56] Sengar, S. S., Hariharan, U., &Rajkumar, K.
Detection System for Smart Environments (2020, March). Multimodal Biometric
Based on Internet of Things. The Computer Authentication System using Deep Learning
Journal, 62(12), 1822-1839. Method. In 2020 International Conference on
[47] Rosa, A. T. R., Pustokhina, I. V., Lydia, E. L., Emerging Smart Computing and Informatics
Shankar, K., & Huda, M. (2019). Concept of (ESCI) (pp. 309-312). IEEE.
electronic document management system [57] Maseleno, A., Hashim, W., Perumal, E.,
(EDMS) as an efficient tool for storing Ilayaraja, M., & Shankar, K. (2020). Access
document. Journal of Critical Reviews, 6(5), control and classifier-based blockchain
85-90. technology in e-healthcare applications.
[48] Espada, J. P., Diaz, V. G., Crespo, R. G., In Intelligent Data Security Solutions for e-
Bustelo, B. C. P. G., &Lovelle, J. M. C. Health Applications (pp. 151-167). Academic
(2015). An intelligent Mobile Web Browser to Press.
adapt the mobile web as a function of the

ISSN: 2347-8578 www.ijcstjournal.org Page 37


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

[58] Li, J., Lei, H., Alavi, A. H., & Wang, G. G.


(2020). Elephant Herding Optimization:
Variants, Hybrids, and
Applications. Mathematics, 8(9), 1415.
[59] Mohammed, A. S., Kareem, S. W., Al Azzawi,
A. K., & Sivaram, M. (2018). Time series
prediction using SRE-NAR and SRE-
ADALINE. Journal of Advanced Research in
Dynamical and Control Systems, Pages, 1716-
1726.
[60] Shankar, K., Elhoseny, M., Chelvi, E. D.,
Lakshmanaprabu, S. K., & Wu, W. (2018). An
efficient optimal key based chaos function for
medical image security. IEEE Access, 6,
77145-77154.
[61] Geerthik, S., Gandhi, R., &Venkatraman, S.
(2006). CATEGORY BASED EXPERT
RANKING: A NOVEL APPROACH FOR
EXPERT IDENTIFICATION IN
COMMUNITY QUESTION ANSWERING.
[62] Laxmi, C. V., &Somasundaram, K. (2014).
Application Level Scheduling (AppLeS) in
Grid with Quality of Service
(QoS). International Journal of Grid
Computing & Applications, 5(2), 1.
[63] Kumar, R. S., Krishnaraj, N., &Keerthana, G.
Highly Energy Efficient and Scalable
Distributed Clustering Procedure for Dense
Wireless Sensor Networks.
[64] Krishnaraj, N., Kumar, K. A., & Kumar, P. K.
(2018). DESIGN OF ADAPTIVE
SCHEDULER TO IMPROVE
PERFORMANCE OF COMPUTATIONAL
GRIDS. International Journal of Pure and
Applied Mathematics, 119(18), 1741-1751.
[65] Shankar, K., & Eswaran, P. (2016, January). A
new k out of n secret image sharing scheme in
visual cryptography. In 2016 10th
International Conference on Intelligent
Systems and Control (ISCO) (pp. 1-6). IEEE.
[66] Wei, C. L., & Wang, G. G. (2020). Hybrid
Annealing Krill Herd and Quantum-Behaved
Particle Swarm
Optimization. Mathematics, 8(9), 1403.
[67] Sivaram, M., Yuvaraj, D., Mohammed, A. S.,
&Porkodi, V. Estimating the Secret Message
in the Digital Image. International Journal of
Computer Applications, 975, 8887.
[68] Nieto, Y., Gacía-Díaz, V., Montenegro, C.,
González, C. C., & Crespo, R. G. (2019).
Usage of machine learning for strategic
decision making at higher educational
institutions. IEEE Access, 7, 75007-75017.

ISSN: 2347-8578 www.ijcstjournal.org Page 38

Potrebbero piacerti anche