2021
DOI: 10.1007/s11277-021-08744-1
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive Neuro-Fuzzy Inference System and Black Widow Optimization Approach for Optimal Resource Utilization and Task Scheduling in a Cloud Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
19
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(21 citation statements)
references
References 37 publications
0
19
0
Order By: Relevance
“…Healthcare organizations are developing a myriad of applications to handle all of these capabilities while also catering to the needs of their users' environments. Due to more advancement in technologies, there is generally a focus towards the process of expert medical systems to be adopted that supports diagnosis and treatment (Srinivasan andMadheswari 2017, 2018;Baulkani 2017, 2019a, b;Nanjappan and Albert 2019;Nanjappan et al 2021).…”
Section: Introductionmentioning
confidence: 99%
“…Healthcare organizations are developing a myriad of applications to handle all of these capabilities while also catering to the needs of their users' environments. Due to more advancement in technologies, there is generally a focus towards the process of expert medical systems to be adopted that supports diagnosis and treatment (Srinivasan andMadheswari 2017, 2018;Baulkani 2017, 2019a, b;Nanjappan and Albert 2019;Nanjappan et al 2021).…”
Section: Introductionmentioning
confidence: 99%
“…Digital forensics is a collection of procedures developed by scientific specialists to acquire traces from a crime scene, analyze them, and present the evidence discovered to aid in identifying the malicious actors, their motivation, and the method employed 7 . Digital forensics has been divided into specialties in recent years as a result of technical developments, such as network forensics, cloud forensics, mobile forensics, IoT forensics, data forensics, and memory forensics 8–15 …”
Section: Introductionmentioning
confidence: 99%
“…7 Digital forensics has been divided into specialties in recent years as a result of technical developments, such as network forensics, cloud forensics, mobile forensics, IoT forensics, data forensics, and memory forensics. [8][9][10][11][12][13][14][15] There has been countless research into DL methods; however, just a few studies that have played a significant impact are mentioned here.…”
mentioning
confidence: 99%
“…Artificial neural network, support vector machines, and deep learning are the widely used techniques for intrusion detection. [15][16][17] An IDS 18,19 mainly secures the system and alerts you in case of any malicious entry. There are two types of IDS: host-based IDS (HIDS) and network-based IDS (NIDS).…”
Section: Introductionmentioning
confidence: 99%
“…Anomaly detection mainly identifies malicious behavior by comparing the anomalous behavior with the normal data. Artificial neural network, support vector machines, and deep learning are the widely used techniques for intrusion detection 15–17 …”
Section: Introductionmentioning
confidence: 99%