Yazar "Pandey, S." seçeneğine göre listele
Listeleniyor 1 - 2 / 2
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Automated and Optimised Machine Learning Algorithms for Healthcare Informatics(Springer Science and Business Media Deutschland GmbH, 2024) Juyal, A.; Bhushan, B.; Hameed, A.A.; Jamil, A.; Pandey, S.Healthcare is a rapidly expanding field with a substantial amount of heterogeneous data driving innumerable health-related tasks. Various healthcare service providers still rely on manual procedures, which can be time-consuming and require significant effort. To automate such manual operations, recent technological advances have emerged in the domain of Machine Learning (ML). ML falls under the subject of Artificial Intelligence (AI), and it gets combined with ‘big data’ to draw meaningful insights. The integration of ML in the healthcare sector has optimized decision-making and predictive analysis. This paper discusses the various application areas of ML in healthcare. Additionally, several ML algorithms used by other researchers in healthcare-related experiments are summarized. A brief review is provided regarding the experiments. This paper delineates the challenges associated with using ML in healthcare. Finally, the paper offers insights into future research directions. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.Öğe Implementation of Homomorphic Encryption Schemes in Fog Computing(Springer Science and Business Media Deutschland GmbH, 2024) Pandey, S.; Bhushan, B.; Hameed, A.A.; Jamil, A.; Juyal, A.In today's date, fog computing is on the rise due to its characteristics. Its ability to provide smart devices with close-by computing capabilities offers a drastic reduction in cloud traffic and more efficient data transfer. However, data security in fog computing devices is a major concern. Homomorphic Encryption (HME) Scheme is a technique that protects private data from various threats, and to improve efficiency and reduce time, it offers modification of original data after encryption without decrypting it. In this paper, we explore the various homomorphic encryption schemes that can be implemented in fog computing to protect the data and provide data security. We present a detailed architecture and various characteristics of fog computing to better visualize the use of homomorphic encryption in different areas. Further, we present the applications of homomorphic encryption in different sectors and discuss future research directions. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.