A COMBINATION OF OPTIMIZATION-BASED MACHINE LEARNING AND BLOCKCHAIN MODEL FOR ENHANCING SECURITY AND PRIVACY IN THE MEDICAL SYS-TEM
The intellectual team of IJMRA comprises of professionals across the world serving this academy in
various positions as Chief Advisors, Technical Advisors, International Editorial Board, Editorial Advisory
Board, Associate Editors, Reviewers, Conference Organizers etc..
Reference
1. Chandra, Ajay. International Journals of Multidisciplinary Research. IJMRA. [Online] March 01, 2024.
[Cited: March 01, 2024.] https://www.ijmra.us/2024ijesr_march.php.
A GREY WOLF OPTIMIZATION-BASED FEED-FORWARD NEURAL NETWORK FOR DETECTING INTRUSIONS IN INDUSTRIAL IOT
IJMRA is set up on a very strong scientific foundation and is one of the leading open-access, on-line journals in the World. This Academy boasts of hosting five major international journals under its wings, namely:
Reference
Dr. K Soumya, D. B. (2024, April). HANDWRITTEN TEXT RECOGNITION USING
PYTESSERACT. (IJMRA) Retrieved from IJMRA:
https://www.ijmra.us/2024ijmie_april.php
MK, A. C. (2024, April). A GREY WOLF OPTIMIZATION-BASED FEED-FORWARD
NEURAL NETWORK FOR DETECTING INTRUSIONS IN INDUSTRIAL IOT. Retrieved
from IJMRA: https://www.ijmra.us/2024ijmie_april.php
Panwar, V. (2024, April). Balancing Innovation and Transparency. (IJMRA )
Retrieved from A GREY WOLF OPTIMIZATION-BASED FEED-FORWARD NEURAL
NETWORK FOR DETECTING INTRUSIONS IN INDUSTRIAL IOT:
https://www.ijmra.us/2024ijmie_april.php
Fortifying Patient Privacy: A Cloud-Based IoT Data Security Architecture in Healthcare
Concerns regarding patient privacy and security have been raised by the explosion in data
generated by the growing use of IoT devices in healthcare settings. The absence of strong
processes for authenticating individuals.
Reference
( MK, A. C. (2024, April). Fortifying Patient Privacy: A Cloud-Based IoT Data Security Architecture in Healthcare. Retrieved from International Journal of Research in IT and Management (IJRIM: https://euroasiapub.org/wp-con....tent/uploads/IJRIM2A
The procedure of identifying and reacting to unauthorized or malicious behaviours
within the IOT system, is called IOT attack detection. There are some several advantages and
challenges associated with implementing and maintaining the detection systems. Some of the
limitations are Complexity, false positive and negative and scalability. To defeat these
restrictions, we suggested a deep-learning based classification model (INTE).
Reference
MK, A. C. (2024, April). Association of Academic Researchers and Faculties (AARF) . Retrieved
from International Research Journal of Mathematics, Engineering and IT:
https://www.aarf.asia/current/....2024/Apr/jzi4t181CRR