Refine your search
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Bharathi, B.
- Incidence of Bacterial and Fungal Co-infections in some HIV Infected Indian Population
Abstract Views :456 |
PDF Views:108
Authors
Affiliations
1 Dept. of Microbiology, PRIST University, Thanjavur - 614 904, Tamil Nadu, IN
1 Dept. of Microbiology, PRIST University, Thanjavur - 614 904, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 3, No 2 (2010), Pagination: 199-203Abstract
HIV/AIDS continues to spread globally and remains a worldwide pandemic. In the present study, a total number of 100 biosamples were collected from the HIV positive patients attending the Social Welfare Organizations and HIV Counseling and Testing Centers of Teaching hospital of Trichy in India were enrolled and screened. Bacterial pneumonia and bacteremia occur at a higher frequency among HIV infected patients. Opportunistic infections (OI) are most common in immunocompromised patients which are the leading cause of death in HIV-infected patients. To create awareness among HIV patients for taking control or preventive measures against the opportunistic bacterial and fungal infections, an analysis was done in this present study. Appropriate use of antibiotics against these OI may be one of the strategies to extend the life span of the AIDS patients.Keywords
HIV, AIDS, Immunocompromised Patients, Opportunistic InfectionsReferences
- AIDS Epidemic Update (2004) Joint United Nations Programme on HIV/AIDS (UNAIDS) and World Health Organization (WHO).
- Breton G, Adle-Biassette H, Therby A, Ramanoelina J, Choudat L and Bissuel F (2006) Immune reconstitution inflammatory syndrome in HIV-infected patients with disseminated histoplasmosis. AIDS. 20,
- -121. 3. Graden JD, Timpone JG and Schnittman SM (1992) Emergence of unusual opportunistic pathogenesis. AIDS- A review Clin. Infect. Dis. 15, 134-157.
- Omenaca C, Turett G, Yarrish R, Astiz M, Lin R and Kislak JW (1999) Bacteremia in HIV-infected patients: short-term predictors of mortality. J. Acq. Im. Def. Syn. 22, 155–160.
- Rolston KVI, Uribe-Botero G and Mansell PWA (1994) Bacterial infections in adult patients with AIDS and AIDS related complex. Am. J. Med. 83, 604-605.
- Viviani M, Cogliati M, Esposto M, Lemmer K, Tintelnot K and Valiente M (2006) Molecular analysis of 311 Cryptococcus neoformans isolates from a 30- month ECMM survey of cryptococcosis in Europe. FEMS Yeast Res. 614-619.
- Whelan C, Horsburgh CR, Horn D, Lahart C, Simberkoff M and Elmer J (1990) Accelerated course of human immuno deficiency virus infection after tuberculosis. Am. J. Respir. Critical Care Medical. 151(1),129.
- Whimbey E, Gold JWM and Polsky B (2005) Bacteremia and Fungemia in Patients with the acquired immunodeficiency syndrome. Ann. Intl. Med. 104, 511-514.
- Woitas RP, Rockstroh JK,Theisen A, Leutner C, Sauerbruch T and Spengler U (1998) Changing role of invasive aspergillosis in AIDS-a case control study. J. Infect. 37,116-122.
- Yang YL, Lo HJ, Hung CC and Li Y (2006) Effect of prolonged HAART on oral colonization with Histoplasma and candida. BMC Infect Dis. 20, 6-8.
- A Simple Method for Deriving LQN-models from Software-models Represented as UML Diagrams
Abstract Views :444 |
PDF Views:103
Authors
Affiliations
1 Sathyabama University, Chennai-119
2 National Institute of Technical Teacher's Training and Research (NITTTR), Chennai-113
1 Sathyabama University, Chennai-119
2 National Institute of Technical Teacher's Training and Research (NITTTR), Chennai-113
Source
Indian Journal of Science and Technology, Vol 5, No 2 (2012), Pagination: 2148-2154Abstract
The evaluation and performance analysis of software architecture at the design level increases the quality of the software and also reduces the cost of rework during the later stages of the product. The derivation of performance results of a software product, during the early stages of the software life cycle can be achieved by quantitatively evaluating the software performance model. There has been lot of research identifying the methods of evaluating software (Booch, 2001). The evaluation process starts by analyzing the performance model which is derived from the software model annotated with suitable usage profiles. This paper provides a simple approach to convert the software models represented as Unified Modeling Language (UML) diagrams using the profile for Schedulability, Performance and Time specifications (SPT) into Layered Queuing Network (LQN) performance models. The paper mainly illustrates the conversion process from UML to LQN, and also substantiates the method by a simple example.Keywords
Usage Profiles, Unified Modeling Language, Performance Model, Model Driven DevelopmentReferences
- Bharathi B and Kulanthaivel G (2011) A tool for architectural design evaluations – a simplistic approach. Special issue of IJCA online, January 2011.
- Smith CU (1990) Performance engineering of software systems. Addison-Wesley. MA.
- Petriu DC and Shen H (2002) Applying the UML performance profile: Graph grammar based derivation of LQN models from UML specifications in Computer Performance Evaluation – modeling techniques and tools, LNCS Springer 2002. 2324,159-179.
- Doria C Petriu, Jinhua Zheng Go and Hui Shen (2003) Performance analysis based UML SPT profile.LNCS 2003, Vol 294/2003, 87-98.
- Gu GP and Petriu DC (2003) Early evaluation of software performance based on the UML performance profile. Proce. 13th Annual IBM Centers for Advanced Studies Conf., CASCON, Toronto,Canada. pp: 214-227.
- Grady Booch (2001) A guide to unified modeling language. Addison – Wesley.
- http:Object Management Group (2005) UML profile for schedulability. Performance & Time Version 1.1,2005.
- Kahkipuro P (2001) UML based performance modeling framework for component based distribution systems in R.Dumke et al., Performance Engg., LNCS, Springer 2001, 2047, 167-184.
- Lyod G Williams and Connie U Smith (2008) Performance evaluation of software architectures. Proce. First Int. Workshop on software & Performance WOSP'98.
- Muhammad Ali Babar and Ian Gorton (2004) Comparison of scenario based software architecture evaluation methods. Proce. 11th Asia pacific softwareEngg. Conf., APSEC'04.
- Socio - Economic Profiles of Bank Customers among Rural Communities : A Study in Chikkaballapur District
Abstract Views :272 |
PDF Views:0
Authors
Affiliations
1 Integrated Farming System Development Project, Hebbal Karnataka, IN
2 Department of Agricultural Marketing, Co-operation and Agribusiness Management, University of Agricultural Sciences (GKVK) Bangaluru Karnataka, IN
1 Integrated Farming System Development Project, Hebbal Karnataka, IN
2 Department of Agricultural Marketing, Co-operation and Agribusiness Management, University of Agricultural Sciences (GKVK) Bangaluru Karnataka, IN
Source
Agriculture Update, Vol 9, No 2 (2014), Pagination: 161-165Abstract
The study was conducted in the Chikkaballapur district of Karnataka to know the socio-economic status, utilization and perception of bank account holders. The study was conducted based on both primary and secondary data, the primary data were collected from 200 bank customers and secondary data were collected from different sources of information. The results indicated that the women account holders were very meagre and vast majority of the respondents were male. The respondents were not only young but also educated. More than twothird of respondents were pursuing agriculture as their main occupation in that majority of them was pursuing plantation crops. The membership in political parties was the single largest institutional participation.Keywords
Profile, Agricultural Banking, Customers, Services- A Simple Method to Identify Requirement Changes for Improvement in Software Design
Abstract Views :154 |
PDF Views:2
Authors
Affiliations
1 Sathyabama University, Chennai, IN
2 Department of Electronics and Communication, NITTTR, Chennai, IN
1 Sathyabama University, Chennai, IN
2 Department of Electronics and Communication, NITTTR, Chennai, IN
Source
Software Engineering, Vol 3, No 4 (2011), Pagination: 158-161Abstract
The evaluation and performance analysis of software architecture at the design level increases the quality of the software and also reduces the cost of rework during the later stages of the product. There has been a lot of research in the area of software architecture and software design evaluations. When the design is to be improved based on the evaluation results, we lack in a feedback mechanism addressing the issues to be concentrated for design improvement. The paper aims at bringing out inter relationships among the various performance attributes, thereby identifying the specific changes that have to be brought about in design to satisfy customer requirements. The paper addresses a simple methodology using ranking and Karl Pearson method to find the critical areas to be updated for design improvements.Keywords
Karl Pearson Method, Performance Attributes, Software Design, Correlation Coefficients.- Need for Social Media Approach in Software Development
Abstract Views :164 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, Sathyabama University, Chennai – 600119, Tamil Nadu, IN
1 Department of CSE, Sathyabama University, Chennai – 600119, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 21 (2016), Pagination:Abstract
Objective: This paper discusses the need for social media approach in various software development processes to make it more collaborative which will result in increased productivity and better quality of software delivered. Methods/Analysis: To achieve more collaboration in software development, social interface methods are to be used. Usage of Social media methods like tagging, posting and commenting improves the communication among the team members. Findings: Software development typically is carried out by different teams working in different geographic locations and so the need for higher collaboration among teams is important for success of a project. Traditional ways of documenting the requirements, creating test cases, defect tracking have not been modified to leverage the enhanced connectivity that the current generation has. There is a need to create a new method to perform the software engineering tasks in a more interactive way. This will help in leveraging current social media techniques to implement the efficient practices from existing software development methodologies. Applications/Improvements: Collaborative platform can be used in software development, project management and also to evaluate the productivity and performance of a team member.Keywords
Collaborative Software Development, Software Development, SDLC using Social Media Techniques.- An Examination of Influence of Higher Education Service Quality on Students’ Satisfaction:An Indian Perspective
Abstract Views :228 |
PDF Views:86
Authors
Affiliations
1 Department of Management Studies, Kongu Engineering College, Perundurai, Erode–638052, IN
2 Kongu Engineering College, Perundurai, Erode–638052, IN
1 Department of Management Studies, Kongu Engineering College, Perundurai, Erode–638052, IN
2 Kongu Engineering College, Perundurai, Erode–638052, IN
Source
Indira Management Review, Vol 10, No 2 (2016), Pagination: 95-102Abstract
The objective of the research is to understand the dimensions of higher education service quality. The scope of this study is confined only to the Tamil Nadu students' perception on higher education service quality. The researchers used questionnaire method for collecting data from the students and snowball sampling method has been administered. This study identified five important dimensions of higher education service quality. These are: curriculum aspects, infrastructure aspects, competency of faculty, academic activities and teaching methods. Furthermore, this study proved that student satisfaction is impacted by teaching methods, curriculum and competency of staff. The findings of the study would enable the policy makers to benchmark their services with other universities.Keywords
Curriculum, Infrastructure, Competency, Academic Activities, Teaching Methods.References
- Arambewela, R. and Hall, J. (2006), “A Comparative Analysis of International Education Satisfaction using SERVQUAL”, Journal of Services Research, Vol. 6, pp. 141–163.
- Cheng, M. (2011), “Transforming the Learner Versus Passing the Exam: Understanding the Gap Between Academic and Student Definitions of Quality”, Quality in Higher Education, Vol. 17, No. 1, pp. 3–17.
- Cherubini, S. (1996), Marketing Dei Servizi, Franco Angeli, Milano.
- Clemes, M.D., Cohen, D.A. and Wang, Y. (2013), “Understanding Chinese University Students Experiences: An Empirical Analysis”, Asia Pacific Journal of Marketing and Logistics, Vol. 25, No. 3, pp. 391–427.
- Cronback, L.J. (1951), “Coefficient Alpha and the Internal Structure of Tests”, Psychometrika, Vol. 16, pp. 297–334.
- Cuthbert, P.F. (1996), “Managing Service Quality in HE: is SERVQUAL the Answer? Part 2”, Managing Service Quality, Vol. 6, No. 3, pp. 31–35.
- Dehghan, A., Dugger, J., Dobrzykowski, D. and Balazs, A. (2014), “The Antecedents of Student Loyalty in Online Programs”, International Journal of Educational Management, Vol. 28, No. 1, pp. 55–35.
- Halai, N. (2013), “Quality for Private Universities in Pakistan: An Analysis of Higher Education Commission Rankings 2012”, International Journal of Educational Management, Vol. 27, No. 7, pp. 775–786.
- Harvey, L. and Green, D. (1993), “Defining Quality”, Assessment and Education in Higher Education, Vol. 18, No. 1, pp. 9–34.
- Harvey, L. and Williams, J. (2010), “Fifteen Years of Quality in Higher Education (Part two)”, Quality in Higher Education, Vol. 16, No. 2, pp. 37–41.
- Hill, F.M. (1995), “Managing Service Quality in Higher Education: The Role of the Student as Primary Consumer”, Quality Assurance in Education, Vol. 3, No. 3, pp. 10–21.
- IVY, J. (2001), “Higher Education Institution Image: A Correspondence Analysis Approach”, International Journal of Educational Management, Vol. 15(6), pp. 276–282.
- Leblance and Nguyen, N. (1997), “Searching for Excellence in Business Education: An Exploratory Study of Customer Impressions of Service Quality”, International Journal of Educational Management, Vol. 11, No. 2, pp.72–79.
- Lomas, L. (2007), “Zen, Motorcycle Maintenance and Quality in Higher Education”, Quality Assurance in Education, Vol. 15, No. 4, pp. 402–412.
- O’Neill, M.A. and Palmer, A. (2004), “Importance Performance Analysis: a Useful Tool for Directing Continuous Improvement in Higher Education”, Quality Assurance in Education, Vol. 12(1), pp. 39–52.
- Parasuraman, A., Zeithaml, V.A. and Berry, L.L. (1988), “SERVQUAL: A Multiple Item Scale for Measuring Consumer Perceptions of Service Quality”, Journal of Retailing, Vol. 64, No. 1, pp. 12–40.
- Parasuraman, A., Zeithaml, V.A. and Berry, L.L. (1988), “SERVQUAL: A Multiple Item Scale for Measuring Consumer Perceptions of Service Quality”, Journal of Retailing, Vol. 64, No. 1, pp. 12–40.
- Parasuraman, A., Zeithaml, V.A. and Berry, L.L. (1994), “Alternative Scales for Measuring Service Quality: Comparative Assessment based on Psychometric and Diagnostic Criteria”, Journal of Retailing, Vol. 70, No. 3, pp. 193–194.
- Parasuraman, A., Zeithaml, V. and Berry, L. (1988), “SERVQUAL: A Multiple Item Scale for Measuring Consumer Perceptions of Service Quality”, Journal of Retailing, Vol. 64, No. 1, pp. 12–40.
- Pariseau, S.E. and Mcdaniel, J.R. (1997), “Assessing Service Quality in Schools of Business”, International Journal of Quality & Reliability Management, Vol. 14, No. 3, pp. 204–218.
- Pariseau, S.E. and Mcdanie, J.R. (1997), “Assessing Service Quality in Schools of Business”, International Journal of Quality & Reliability Management, Vol. 14, No. 3, pp. 204–218.
- Pellicelli, G. (1997), Marketing Deiservizi, Utet, Torino.
- Quinn, A., Lemay, G., Larsen, P. and Johnson, D.M. (2009), “Service Quality in Higher Education” Total Quality Management, Vol. 20, No. 2, pp. 139–152.
- Rowley, J. (1997), “Beyond Service Quality Dimensions in Higher Education and Towards a Service Contract”, Quality Assurance in Education, Vol. 5, No. 1, pp. 7–14.
- Rowley, J. (2003), “Retention: Rhetoric of Realistic Agendas for the Future of Higher Education”, International Journal of Educational Management, Vol. 17(6), pp. 248–253.
- Soutar, G. and MCNeil, M. (1996), “Measuring Service Quality in a Tertiary Institiution”, Journal of Educational Administration, Vol. 34, No. 1, pp. 72–82.
- Soutar, G. and McNeil, M. (1996), “Measuring Service Quality in a Tertiary Institution”, Journal of Educational Administration, Vol. 34, No. 1, pp. 72–82.
- Sultan, P. and Wong, H. (2010), “Performance based Service Quality Model: An Empirical Study on Japanese Universities?”, Quality Assurance in Education, Vol. 18, No. 2, pp. 126–143
- Tam, M. (2001), “Measuring Quality and Performance in Higher Education”, Quality in Higher Education, Vol. 7, No. 1, pp. 47–54.
- Trivellas, P. and Dargenidou, D. (2009), “Leadership and Service Quality in Higher Education: The Case of the Technological Educational Institude of Larissa”, International Journal of Quality and Service Sciences, Vol. 1, No. 3, pp. 294–310.
- Watty, K. (2005), “Quality in Accounting Education: What Say the Academics?”, Quality Assurance in Education, Vol. 13, No. 2, pp. 120–131.
- Wong, K. Tunku, U. and Rahman, A. (2012), “Constructing a Survey Questionnaire to Collect Data on Service Quality of Business Academics”, European Journal of Social Sciences, Vol. 29, No. 2, pp. 209–221.
- Wong, K. Tunku, U. and Rahman, A. (2012), “Constructing a Survey Questionnaire to Collect Data on Service Quality of Business Academics”, European Journal of Social Sciences, Vol. 29, pp. 209–221.
- Yeo, R.K. (2009), “Service Quality Ideals in a Competitive Tertiary Environment”, International Journal of Educational Research, Vol. 48, pp. 62–76.
- Zachariah, S. (2007), “Managing Quality in Higher Education: A Stakeholder Perspective”, Ph.D. thesis, University of Leicester.
- A Novel Trust Negotiation Protocol for Analysing and Approving IoT Edge Computing Devices Using Machine Learning Algorithm
Abstract Views :162 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science Engineering, Sathyabama Institute of Science and Technology, Jeppiaar Nagar, Chennai, Tamil Nadu,, IN
2 Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Jeppiaar Nagar, Chennai, Tamil Nadu,, IN
1 Department of Computer Science Engineering, Sathyabama Institute of Science and Technology, Jeppiaar Nagar, Chennai, Tamil Nadu,, IN
2 Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Jeppiaar Nagar, Chennai, Tamil Nadu,, IN
Source
International Journal of Computer Networks and Applications, Vol 9, No 6 (2022), Pagination: 712-723Abstract
In this paper, we come up with an effective approach for the management of security using machine learning, and we derive a solution for problems with privacy and security in Internet of Things devices. Recent apps' connections to numerous IoT devices, use of edge computing, and use of fog computing cause numerous DDoS attacks to be launched against the servers of the dynamic network. For computing on the edge of the Internet of Things, the upgraded Trust Negotiation Protocol is used, making use of better period data. The application of security management is used to maintain the automation, minimize the risk level, and reduce the complexity of the system. The fundamental objective of this system is to enable user-level security in all edge computing devices related to the Internet of Things. Using Machine Learning techniques, a proposed model is utilized to develop a secure environment for E2E IoT security at the user level. A low-cost solution is obtained using machine-learning-based security management techniques. The Enhanced Trust Negotiation Protocol is simulated, and the experiment results demonstrate that the suggested model is superior to the current one in terms of the efficiency with which security management approaches may be implemented.Keywords
Secured IoT, IoT Network, Security Algorithm, Trust Protocol, Edge Computing, MLA (Machine Learning Algorithm).References
- Tawalbeh L, Muheidat F, Tawalbeh M, Quwaider M. IoT Privacy and Security: Challenges and Solutions. Applied Sciences. 2020; 10(12):4102. https://doi.org/10.3390/app10124102.
- Carsten Maple (2017) Security and privacy in the Internet of things, Journal of Cyber Policy, 2:2, 155- 184, DOI: 10.1080/23738871.2017.1366536.
- Mouha, R. (2021) Internet of Things (IoT). Journal of Data Analysis and Information Processing, 9, 77-101. doi: 10.4236/jdaip.2021.92006.
- A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M.Ayyash, “Internet of Things: A survey on enabling technologies, protocols, and applications,'' IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2347_2376, 4th Quart., 2015.
- Khvoynitskaya, S. The History and Future of the Internet of Things. 2020. Available online: https://www.itransition.com/:https://www.itransition.com/blog/iothistory (accessed on 25 March 2020).
- Conti, M.; Dehghantanha, A.; Franke, K.; Watson, S. Internet of Things security and forensics: Challengesand opportunities. Future Gener. Comput. Syst. 2018, 78, 544–546. [CrossRef]
- Monther, A.A.; Tawalbeh, L. Security techniques for intelligent spam sensing and anomaly detection in online social platforms. Int. J. Electr. Comput. Eng. 2020, 10, 2088–8708.
- Makhdoom, I.; Abolhasan, M.; Lipman, J.; Liu, R.P.; Ni, W. Anatomy of threats to the Internet of things.IEEECommun. Surv. Tutor. 2018, 21, 1636–1675. [CrossRef]
- Meng, Y.; Zhang, W.; Zhu, H.; Shen, X.S. Securing consumer IoT in the smart home: Architecture, challenges,and countermeasures. IEEE Wirel. Commun. 2018, 25, 53–59. [CrossRef]
- Siby, S.; Maiti, R.R.; Tippenhauer, N.O. Iotscanner: Detecting privacy threats in IoT neighborhoods. In Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, Abu Dhabi United Arab Emirates, 2 April 2017; pp. 23–30.
- Hassan, W.H. Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 2019, 148, 283–294.
- Balamurugan, S., Ayyasamy, A., Suresh Joseph, K., (2021), IoTBlockchain driven traceability techniques for improved safety measures in food supply chain. International journal of information technology, https://doi.org/10.1007/s41870-020-0058.].
- Liu, X.; Zhao, M.; Li, S.; Zhang, F.; Trappe, W. A security framework for the internet of things in the future internet architecture. Future Internet 2017, 9, 27. [CrossRef]
- Ali, S.; Bosche, A.; Ford, F. Cybersecurity Is the Key to Unlocking Demand in the Internet of Things; Bain and Company: Boston, MA, USA, 2018.
- Antos, M.A., Munoz, R., Olivares, R., RebouçasFilho, P. P., Del Ser, J. and de Albuquerque, V.H.C. (2020). Online heart monitoring systems on the internet of health things environments: A survey, a reference model and an outlook. Information Fusion 53, 222–239.
- Culbert, D. Personal Data Breaches and Securing IoT Devices. 2020. Available online: https://betanews.com/ 2019/08/13/securing-iotdevices/ (accessed on 15 September 2019).
- Gemalto. Securing the IoT-Building Trust in IoT Devices and Data. 2020. Available online: https://www.gemalto.com/:https://www.gemalto.com/iot/iot-security. (accessed on 17 February 2020).
- He, H.; Maple, C.; Watson, T.; Tiwari, A.; Mehnen, J.; Jin, Y.; Gabrys, B. The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In Proceedings of the Evolutionary Computation (CEC), Vancouver, BC, Canada, 24–29 July 2016; pp. 1015–1021.
- Boursianis, A.D., Papadopoulou, M.S. and Diamantoulakisetal, P. (2020), Internet of Things (IoT) and Agricultural Unmanned Aerial Vehicles (UAVs) in smart farming: A comprehensive review, Internet of Things, https://doi.org/10.1016/j.iot.2020.100187.
- Estrada, D.; Tawalbeh, L.; Vinaja, R. How Secure Having IoT Devices in Our Home. J. Inf. Secur. 2020, 11. [CrossRef]
- Sun, Y.; Song, H.; Jara, A.J.; Bie, R. Internet of Things and Big Data Analytics for Smart and Connected Communities. 2016. Available online:https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=740 6686(accessed on 4 April 2020).
- Tawalbeh, M.; Quwaider, M.; Tawalbeh, L.A. Authorization Model for IoT Healthcare Systems: Case Study. In Proceedings of the 2020 11th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, 7–9 April 2020; pp. 337–342. [CrossRef]
- Balamurugan, S., Ayyasamy, A., Suresh Joseph, K., (2020), Enhanced Petri Nets for Traceability of Food Management using Internet of Things, Peer-to-Peer Networking and Applications..
- Wei, X., Zhipeng, Z., Hongxun, W., Yang, Y. and Yanpeng, Z. (2020), Optimization of monitoring network system for Eco safety on Internet of Things platform and environmental food supply chain, Computer Communications, Volume 151, 2020, Pages 320-330, ISSN 0140- 3664, https://doi.org/10.1016/j.comcom.2019.12.033.
- The HIPAA Privacy Rule. Available online: https://www.hhs.gov/hipaa/for-professionals/privacy/index.html (accessed on 19 October 2019).
- https://docs.aws.amazon.com/iot/latest/developerguide/what-is-awsiot.html (accessed on 17 March 2020) [27] Xiao, L, X. Wan, X. Lu, Y. Zhang and D. Wu, 2018. IoT security techniques based on machine learning. Cryptography Secur. 1: 1-20.
- Chen, F., P. Deng, J. Wan, D. Zhang and A. V. Vasilakos et al., 2015. Data mining for the internet of things: Literature review and challenges. Intl. J. Distrib. Sens. Networks, 2015: 1-14.
- M. Trebar, A. Grah, A. A. Melcon, and A. Parreno, “Towards RFID traceability systems of farmed fish supply chain,” in Proceedings of the 19th International Conference on Software, Telecommunications and Computer Networks (SoftCOM’11), pp. 6–11, Hvar, Croatia, September 2011.
- T. T. L. Tran, L. Peng, Y. Diao, A. McGregor, and A. Liu, “CLARO: modeling and processing uncertain data streams,” VLDB Journal, vol. 21, no. 5, pp. 651–676, 2012