Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
individual fulfillment for its locals, the close by called Hybrid Teaching and Learning Based
economy, transport, traffic the chiefs, condition, and Optimization (HTLBO). By then, we present medical
participation with the legislature. In light of the care specialist organizations for giving the full degree
congruity of shrewd metropolitan networks by of clinical administrations to people got together with
Ismagilova, Geerthik et al. [25] as data and IoT.
correspondence advancements are changing standard
metropolitan networks into shrewd metropolitan III. PROPOSED METHODOLOGY
regions, the IoT makes brilliant metropolitan regions
powerful and responsive. Taking everything into (i) Purpose of Healthcare for Smart Cities This
account, for clinical technologists to enter and application is sent for distantly checking the patient's
develop themselves in the new medical care industry, principal boundaries utilizing sensors, gadgets, and
it is essential that we look past regular kinds of things incorporating them. Brilliant contraptions in
mechanical advancements by Samad et al. [26]. medical services are used to store and regulate key
As to keen medical services inside savvy thought boundaries and to manage the came down
metropolitan zones, this part presents an examination with sickness information. Truth be told, for most
where an optoelectronic regulator chip was proposed cases, it may consolidate developed fixed sensors
to control the miniature light-radiating diode (LED) [52-58]. Nowadays, different exercises have been
structure used in the retinal prosthesis. An expected to help a more broad viewpoint on
independently addressable low force more modest prosperity and success consequently splendid
miniature LED group is arranged and the results are wearables devices like health tracker or wellbeing
represented. In all honesty, a remote sensor gatherings and in any event, prosperity assessment
framework is used to assemble clinical data, for applications in mobile phones have expanded
instance, major signs and individual data to send it to awesome thought among wellbeing fans. These
the parental figure. Consequently, the ensuring devices are sharp in the sense as they essentially
security and assurance of this fragile data are screen prosperity just as give plans if vital at the ideal
outstandingly fundamental by Palani et al. [27]. Data time. A case of SHC2 is graphically spoken to in
security is a relating movement between controlling figure 1 and this technique shaving some huge terms
admittance to information while allowing free and that are explained in the accompanying as.
basic admittance to people who need that (ii) Mobile Sensors: Sensors, being powerfully
information. Given the sensitive thought of progressively pleasing and less unmistakable, are
therapeutic administrations data, it is irreplaceable for reasonable for checking an individual's prosperity or
human administrations providers to have a solid and wellbeing without meddling with their step by step
reliable information security organization set up. The works out. The sensors can check a couple of
techniques to react and make sure about the social physiological signs/boundaries similarly as activity
protection data, yet additionally predict and hinder and advancement of an individual by putting them at
any assaults pushed by computerized gangsters. different territories of the body [59-60].
(iii) Engaging patients in Heath Monitoring:
Before long, the usage of this development is for all thusly the more seasoned or patients with constant
intents and purposes unexplored in medical care illnesses can benefit from therapy and clinical
circumstances, where potential applications observing in their condition without taking off to the
consolidate understanding observing, asset crisis facility sometimes. Authorities in the distant
perceptibility, and drug association frameworks, to worker center can screen the patient's prosperity
allude to a couple Rajagopal et al. [28]. The medical condition eagerly, and salvage them if an emergency
services data identified by the IoT sensor framework occurs and offer nonstop guidance to the patients'
is encoded by Lightweight SIMON block figure by recovery and long haul care [61-68]. The Healthcare
Mondragon et al. [29]. The decision of the customers framework is as appeared in Figure 1.
in IoHT is made by the metaheuristic calculation
[17] Venkatraman, S., & Kumar, P. A. R. (2019). Sonograms. Current Signal Transduction
Improving Adhoc wireless sensor networks Therapy, 11(2), 84-90.
security using distributed automaton. Cluster [28] Rajagopal, A., Ramachandran, A., Shankar,
Computing, 22(6), 14551-14557. K., Khari, M., Jha, S., Lee, Y., & Joshi, G. P.
[18] Lydia, E. L., Govindaswamy, P., (2020). Fine-tuned residual network-based
Lakshmanaprabu, S., &Ramya, D. (2018). features with latent variable support vector
Document clustering based on text mining K- machine-based optimal scene classification
means algorithm using euclidean distance model for unmanned aerial vehicles. IEEE
similarity. J. Adv. Res. Dyn. Control Access, 8, 118396-118404.
Syst.(JARDCS), 10(2), 208-214. [29] Mondragon, V. M., García-Díaz, V., Porcel,
[19] Ortin, F., Mendez, S., García‐Díaz, V., & C., & Crespo, R. G. (2018). Adaptive contents
Garcia, M. (2014). On the suitability of for interactive TV guided by machine learning
dynamic languages for hot‐reprogramming a based on predictive sentiment analysis of
robotics framework: a Python case data. Soft Computing, 22(8), 2731-2752.
study. Software: Practice and [30] Feng, Y., Yu, X., & Wang, G. G. (2019). A
Experience, 44(1), 77-104. Novel Monarch Butterfly Optimization with
[20] Krishnaraj, N., Ezhilarasu, P., & Gao, X. Z. Global Position Updating Operator for Large-
Hybrid Soft Computing Approach for Scale 0-1 Knapsack
Prediction of Cancer in Colon Using Problems. Mathematics, 7(11), 1056.
Microarray Gene Data. Current Signal [31] Mohammed, A. S., & Sivaram, P. (2018).
Transduction Therapy, 11(2). Securing the Sensor Networks Along With
[21] Le Nguyen, B., Lydia, E. L., Elhoseny, M., Secured Routing Protocols for Data Transfer
Pustokhina, I., Pustokhin, D. A., Selim, M. M., in Wireless Sensor Networks.
... & Shankar, K. (2020). Privacy Preserving [32] Geerthik, S., Venkatraman, S., & Gandhi, K.
Blockchain Technique to Achieve Secure and R. (2016, February). Reward rank: A novel
Reliable Sharing of IoT Data. CMC- approach for positioning user answers in
COMPUTERS MATERIALS & community question answering system.
CONTINUA, 65(1), 87-107. In 2016 International Conference on
[22] Chavhan, S., Gupta, D., Chandana, B. N., Information Communication and Embedded
Khanna, A., & Rodrigues, J. J. (2019). IoT- Systems (ICICES) (pp. 1-6). IEEE.
based Context-Aware Intelligent Public [33] Sivaram, M., Lydia, E. L., Pustokhina, I. V.,
Transport System in a metropolitan area. IEEE Pustokhin, D. A., Elhoseny, M., Joshi, G. P.,
Internet of Things Journal. & Shankar, K. (2020). An optimal least square
[23] Gu, Z. M., & Wang, G. G. (2020). Improving support vector machine based earnings
NSGA-III algorithms with information prediction of blockchain financial
feedback models for large-scale many- products. IEEE Access, 8, 120321-120330.
objective optimization. Future Generation [34] Ghantasala, G. P., &KrishnaRaj, N. Support
Computer Systems, 107, 49-69. Vector Machine Based Automatic
[24] Porkodi, V., Khan, J., Mohammed, A. S., Mammogram Classification Using Hybrid
Bhuvana, J., & Sivaram, M. OPTIMIZED Optimization Algorithm.
COOPERATIVE QOS ENHANCED [35] Sikkandar, M. Y., Alrasheadi, B. A., Prakash,
DISTRIBUTED MULTIPATH ROUTING N. B., Hemalakshmi, G. R., Mohanarathinam,
PROTOCOL. A., & Shankar, K. (2020). Deep learning based
[25] Geerthik, S., Venkatraman, S., & Gandhi, R. an automated skin lesion segmentation and
(2016). AnswerRank: Identifying Right intelligent classification model. Journal of
Answers in QA system. International Journal Ambient Intelligence and Humanized
of Electrical and Computer Engineering, 6(4), Computing, 1-11.
1889. [36] Zhang, Z., Wang, G. G., Zou, K., & Zhang, J.
[26] Samad, A., Salima, R., Lydia, E. L., & (2014). A solution quality assessment method
Shankar, K. (2020). Definition and Features of for swarm intelligence optimization
Rural Marketing Strategies for Encourage algorithms. The Scientific World
Development in Rural Areas. TEST Journal, 2014.
Engineering & Management, 82, 4983-4988. [37] Sivaram, Murugan et al. ‘Data Fusion Using
[27] Palani, E., Nagappan, K., &Alhadidi, B. Tabu Crossover Genetic Algorithm in
(2016). Segmentation and Texture Analysis for Information Retrieval’. 1 Jan. 2020 : 1 – 10.
Efficient Classification of Breast Tumors from
[38] Khamparia, A., Pandey, B., Tiwari, S., Gupta, physical environment. IEEE Latin America
D., Khanna, A., & Rodrigues, J. J. (2020). An Transactions, 13(2), 503-509.
integrated hybrid CNN–RNN model for visual [49] Kumar, R. S., Krishnaraj, N., &Keerthana, G.
description and generation of (2017). Assessment of Quality of Service in
captions. Circuits, Systems, and Signal Communication Network and Evaluating
Processing, 39(2), 776-788. Connectivity Among IP Networks. Asian
[39] Geerthik, S., Gandhi, K. R., &Venkatraman, S. Journal of Applied Science and Technology
(2016, December). Domain expert ranking for (AJAST), 1(3), 319-322.
finding domain authoritative users on [50] Elhoseny, M., Rajan, R. S., Hammoudeh, M.,
community question answering sites. In 2016 Shankar, K., &Aldabbas, O. (2020). Swarm
IEEE International Conference on intelligence–based energy efficient clustering
Computational Intelligence and Computing with multihop routing protocol for sustainable
Research (ICCIC) (pp. 1-5). IEEE. wireless sensor networks. International Journal
[40] Muruganantham, A., Nguyen, P. T., Lydia, E. of Distributed Sensor Networks, 16(9),
L., Shankar, K., Hashim, W., &Maseleno, A. 1550147720949133.
(2019). Big data analytics and intelligence: A [51] Chu, H. C., Wang, G. G., & Park, J. H. (2015).
perspective for health care. The digital fingerprinting analysis concerning
[41] Ramkumar, V., &Krishnaraj, N. Weight Based google calendar under ubiquitous mobile
LSA to Retrieve Information from Web Pages computing era. Symmetry, 7(2), 383-394.
Based On Document Score. [52] Manikandan, V., Sivaram, M., Mohammed, A.
[42] Balakiruthiga, B., Deepalakshmi, P., Mohanty, S., &Porkodi, V. (2020). Nature Inspired
S. N., Gupta, D., Kumar, P. P., & Shankar, K. Improved Firefly Algorithm for Node
(2020). Segment routing based energy aware Clustering in WSNs. CMC-COMPUTERS
routing for software defined data MATERIALS & CONTINUA, 64(2), 753-
center. Cognitive Systems Research. 776.
[43] Chu, H. C., Wang, G. G., & Deng, D. J. [53] Kuppusamy, P., Venkatraman, S.,
(2016). The social networking investigation of Rishikeshan, C. A., & Reddy, Y. P. (2020).
metadata of forensic artifacts of a typical Deep learning based energy efficient optimal
WeChat session under Windows. Security and timetable rescheduling model for intelligent
Communication Networks, 9(18), 5698-5709. metro transportation systems. Physical
[44] Sivaram, M., Yuvaraj, D., Mohammed, A. S., Communication, 101131.
Manikandan, V., Porkodi, V., &Yuvaraj, N. [54] Asih, E. S., Nguyen, P. T., Lydia, E. L.,
(2019). Improved Enhanced Dbtma with Shankar, K., Hashim, W., &Maseleno, A.
Contention-Aware Admission Control to (2019). Mobile E-commerce website for
Improve the Network Performance in Manets. technology-based buying selling
CMC-COMPUTERS MATERIALS & services. International Journal of Engineering
CONTINUA, 60(2), 435-454. and Advanced Technology, 8(6), 884-888.
[45] Gochhayat, S. P., Lal, C., Sharma, L., Sharma, [55] Lydia, E. L., &Swarup, M. B. (2015). Big data
D. P., Gupta, D., Saucedo, J. A. M., &Kose, U. analysis using hadoop components like flume,
(2019). Reliable and secure data transfer in mapreduce, pig and hive. International Journal
IoT networks. Wireless Networks, 1-14. of Science, Engineering and Computer
[46] Subbarayalu, V., Surendiran, B., &Arun Raj Technology, 5(11), 390.
Kumar, P. (2019). Hybrid Network Intrusion [56] Sengar, S. S., Hariharan, U., &Rajkumar, K.
Detection System for Smart Environments (2020, March). Multimodal Biometric
Based on Internet of Things. The Computer Authentication System using Deep Learning
Journal, 62(12), 1822-1839. Method. In 2020 International Conference on
[47] Rosa, A. T. R., Pustokhina, I. V., Lydia, E. L., Emerging Smart Computing and Informatics
Shankar, K., & Huda, M. (2019). Concept of (ESCI) (pp. 309-312). IEEE.
electronic document management system [57] Maseleno, A., Hashim, W., Perumal, E.,
(EDMS) as an efficient tool for storing Ilayaraja, M., & Shankar, K. (2020). Access
document. Journal of Critical Reviews, 6(5), control and classifier-based blockchain
85-90. technology in e-healthcare applications.
[48] Espada, J. P., Diaz, V. G., Crespo, R. G., In Intelligent Data Security Solutions for e-
Bustelo, B. C. P. G., &Lovelle, J. M. C. Health Applications (pp. 151-167). Academic
(2015). An intelligent Mobile Web Browser to Press.
adapt the mobile web as a function of the