Cyspace Labs

Author : Free Advice | Published On : 26 Apr 2024

A COMBINATION OF OPTIMIZATION-BASED MACHINE LEARNING AND BLOCKCHAIN MODEL FOR ENHANCING SECURITY AND PRIVACY IN THE MEDICAL SYS-TEM

The intellectual team of IJMRA comprises of professionals across the world serving this academy in

various positions as Chief Advisors, Technical Advisors, International Editorial Board, Editorial Advisory

Board, Associate Editors, Reviewers, Conference Organizers etc..

Reference

1. Chandra, Ajay. International Journals of Multidisciplinary Research. IJMRA. [Online] March 01, 2024.

[Cited: March 01, 2024.] https://www.ijmra.us/2024ijesr_march.php.

A GREY WOLF OPTIMIZATION-BASED FEED-FORWARD NEURAL NETWORK FOR DETECTING INTRUSIONS IN INDUSTRIAL IOT

IJMRA is set up on a very strong scientific foundation and is one of the leading open-access, on-line journals in the World. This Academy boasts of hosting five major international journals under its wings, namely:

Reference

Dr. K Soumya, D. B. (2024, April). HANDWRITTEN TEXT RECOGNITION USING

PYTESSERACT. (IJMRA) Retrieved from IJMRA:

https://www.ijmra.us/2024ijmie_april.php

MK, A. C. (2024, April). A GREY WOLF OPTIMIZATION-BASED FEED-FORWARD

NEURAL NETWORK FOR DETECTING INTRUSIONS IN INDUSTRIAL IOT. Retrieved

from IJMRA: https://www.ijmra.us/2024ijmie_april.php

Panwar, V. (2024, April). Balancing Innovation and Transparency. (IJMRA )

Retrieved from A GREY WOLF OPTIMIZATION-BASED FEED-FORWARD NEURAL

NETWORK FOR DETECTING INTRUSIONS IN INDUSTRIAL IOT:

https://www.ijmra.us/2024ijmie_april.php

Fortifying Patient Privacy: A Cloud-Based IoT Data Security Architecture in Healthcare

Concerns regarding patient privacy and security have been raised by the explosion in data

generated by the growing use of IoT devices in healthcare settings. The absence of strong

processes for authenticating individuals.

Reference

( MK, A. C. (2024, April). Fortifying Patient Privacy: A Cloud-Based IoT Data Security Architecture in Healthcare. Retrieved from International Journal of Research in IT and Management (IJRIM: https://euroasiapub.org/wp-content/uploads/IJRIM2April24-A-CM.pdf

The procedure of identifying and reacting to unauthorized or malicious behaviours

within the IOT system, is called IOT attack detection. There are some several advantages and

challenges associated with implementing and maintaining the detection systems. Some of the

limitations are Complexity, false positive and negative and scalability. To defeat these

restrictions, we suggested a deep-learning based classification model (INTE).

Reference

MK, A. C. (2024, April). Association of Academic Researchers and Faculties (AARF) . Retrieved

from International Research Journal of Mathematics, Engineering and IT:

https://www.aarf.asia/current/2024/Apr/jzi4t181CRRyU43.pdf