Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

International Journal of Computer Science Trends and Technology (IJCST) – Volume 10 Issue 3, May-Jun 2022

RESEARCH ARTICLE OPEN ACCESS

A Brief Study of Recent Resource Scheduling Approaches


in Cloud Environment
RANJITHKUMAR
GOVERNMENT ARTS COLLEGE - KUMBAKONAM

ABSTRACT
Resource scheduling is the important problem in cloud computing because of speedy development of on
heterogeneous nature and demand request of cloud sources. Cloud offers uncertainty, dynamism, and elasticity-
related services to end-users in pay-as-you-go method in the internet. Scheduling method optimizes the main
performance indicator variables such as availability , energy utilization , response time, makespan time, cost,
resource consumption and so on. For fulfilling the above goals, numerous advanced scheduling methods was
suggested depends on meta-heuristic and hybrid, heuristic, stated in the publication. This study offers the orderly
evaluation and classification of presented scheduling methods with its merits and demerits. It is believed that
methodical and complete review leads to a stepping stone for novel researchers in the cloud computing domain
and it becomes useful for further growth of scheduling method.
Keywords: Virtual machine, Cloud computing, Metaheuristic, Cloud service, Grid computing

I. INTRODUCTION with greater expense. A hybrid cloud is a mix of


public and private cloud that is utilized for various
The assortment of interconnected PCs that comprises purposes in view of authoritative prerequisites. A
of more than one joined computing asset is known as people group cloud comprises of a typical framework
the Cloud. As of late, the headway of cloud utilized by numerous associations that have shared
computing (CC) has recreated the fast course of information and the board [21-25].
action of between associated server farms that are
topographically scattered for offering great and CC can be classified in two ways: in light of area or
reliable services [1-3]. Nowadays, CC has services advertised. In light of area, a cloud can be
transformed into an effective worldview to offer public, private, hybrid, or local area [26]. Public
computational capacities on a ''payper-use'' premise cloud services are accessible to anybody and the
[4]. CC acquires the congruity and change the IT framework is situated in the vicinity of a service-
business. With its creating application and giving organization. Public clouds are generally
advancement, CC offers gigantic entryways, as well defenseless against different assaults, yet they are
as faces numerous challenges in the headway of generally savvy. A private cloud is only accessible to
conventional IT [5, 6]. It can coordinate admittance a particular client or association. It gives the most
to a common pool of configurable resources on- elevated security and control level to the client with
demand, which can be quickly given and released greater expense [27-33]. A hybrid cloud is a mix of
almost no organization or cloud supplier participation public and private cloud that is utilized for various
[7-10]. Due to this development, many benefits, for purposes in view of authoritative prerequisites. A
example, further developed benefits in the people group cloud comprises of a typical framework
commercial center concerning time, cost, stack utilized by numerous associations that have shared
changing, and capacity can be understood. With this information and the board [34].
development, everything applications can continue to
Asset provisioning is the strategy to empower the
run on a virtual stage and all of the assets is dispersed
virtualized assets for portion to clients. At the point
among the virtual machines (VMs) [11-15]. Each and
when cloud service supplier acknowledges the
every application is unmistakable and autonomous.
solicitation for assets from the clients, it makes
CC can be classified in two ways: in light of area or suitable number of VMs and dispenses them to
services advertised. In light of area, a cloud can be clients according to the interest [35, 36]. Asset
public, private, hybrid, or local area [16]. Public provisioning is likewise dependable to address the
cloud services are accessible to anybody and the client's issue in view of the QoS, SLA dealings and
framework is situated in the vicinity of a service- match the assets to the impending jobs. Furthermore,
giving organization. Public clouds are generally assuming the quantity of clients utilizing the cloud
defenseless against different assaults, yet they are increments, booking turns out to be very troublesome
generally savvy. A private cloud is only accessible to and a fitting planning calculation should be used [37-
a particular client or association [17-20]. It gives the 42]. In the beginning phase, a portion of the planning
most elevated security and control level to the client calculations were created with regards to grid

ISSN: 2347-8578 www.ijcstjournal.org Page 55


International Journal of Computer Science Trends and Technology (IJCST) – Volume 10 Issue 3, May-Jun 2022

computing and in light of their exhibition many were numerous critical components of an adaptability
adjusted for disseminated computing. In CC, clients program, analysts introduced quantifiable
might use hundreds or thousands of virtualized assets applications subordinate instrument technique instead
and it is unimaginable for everybody to physically of qualifiable proficiency module. Specialists
dispense each errand [43]. generally focused on applications bury conditions to
pragmatic planning.
This study offers the orderly evaluation and
classification of presented scheduling methods with [65] presented RA instrument contingent on GA and
its merits and demerits. It is believed that methodical SVR. Specialists arranged the Application service
and complete review leads to a stepping stone for assumption module with SVR for assessing the
novel researchers in the cloud computing domain and amount of resource utilization in light of SLA of each
it becomes useful for further growth of scheduling and every communication. By then, scientists
method. arranged worldwide RA model involving GA for
reworking the resources of cloud clients. [66]
II. RELATED WORKS intended to accomplish 2 points green computing and
over-burden evasion to dynamic RA by means of
[44] introduced VM base system to a versatile virtualized developments. Contingent on unique
overseeing of virtual resources in CC. Specialists modifying needs of cloud clients arranged as well as
likewise arranged a resources administrator called done system multiplex virtualization to actual asset. It
Adaptable Controller which enthusiastically modifies is made by Usher structure. Scientists arranged a
numerous virtual resource uses for accomplishing heap assumption procedure to predict future resource
SLO applications using [45-47]. A MIMO resource utilization with no located to VMs.
controller oversees memory, CPU scheduler, and
Input or result chiefs relying on criticism technique. [67] introduced a procedure for scheduler named
[48] made sense of that live VM plays out a Haizea for RAS, for example, moment, ideal effort,
significant part in dynamic resource controlling of cutoff time delicate, and inventive reservation. It is a
CC. The analysts generally revolved around powerful resources lease controller which uses resources rents
resource utilization in non-top periods to restrict for RA reflection and executes this rent by means of
utilization of resources. For achieving goals like LB, sharing VM. The analyst's point is to restrict
laborer affiliation, and area of interest alteration. [49] resources excusal rate and improve expenses to give
presented a module, called RBRAM that oversees each previously mentioned RA course of action.
useful resource utilization in MPS Matrix module. Scientist's used 2 thoughts called refilling and trading
Specialists said RA should be higher rates contrasted to cutoff time delicate RAS.
with resource request rates. Significant pieces of
system incorporate cloud needs controller, RA, III. CONCLUSION
virtualized model overseer, and eventual outcome
grouping. For examining the effectiveness of the This study offers the orderly evaluation and
cloud structure scientists contemplated the cloud classification of presented scheduling methods with
execution factors. Be that as it may, specialists its merits and demerits. It is believed that methodical
perceived various factors of Cloud Scheme for and complete review leads to a stepping stone for
impending undertakings [50, 51]. novel researchers in the cloud computing domain and
it becomes useful for further growth of scheduling
[52] introduced a technique called MILP to resource method.
arrangement for upgraded service in cloud
environment. Scientists indicated that various offices REFERENCES
furnish in IaaS are joined with cloud providers to [1] Dutta, A. K., Elhoseny, M., Dahiya, V., &
offer refined sorts of help for cloud clients [53-57]. In Shankar, K. (2020). An efficient hierarchical
2 genuine offices, appropriated data save and multi- clustering protocol for multihop Internet of
cast transmission of information alongside focal vehicles communication. Transactions on
memory, regular computing, and feature point Emerging Telecommunications
information transmission service. In any case, Technologies, 31(5), e3690.
analysts contemplated the impact of 4 kinds of [2] Alqaralleh, B. A., Mohanty, S. N., Gupta, D.,
service: stockpiling, computing, and feature point Khanna, A., Shankar, K., & Vaiyapuri, T.
information transmission. [58] researched a (2020). Reliable multi-object tracking model
fundamental quantifiable Time module procedure to using deep learning and energy efficient
cloud resources technique. Likewise, it is accepted wireless multimedia sensor networks. IEEE
the determined resources usage time in stable Access, 8, 213426-213436.
condition. Scientists have assessed speed up for [3] Agrawal, D., Minocha, S., Namasudra, S., &
comparable resources advancement relying on Gandomi, A. H. (2022). A robust drug recall
identical grid increase [59-64]. For examining

ISSN: 2347-8578 www.ijcstjournal.org Page 56


International Journal of Computer Science Trends and Technology (IJCST) – Volume 10 Issue 3, May-Jun 2022

supply chain management system using classification using chest CT images. Biology,
hyperledger blockchain ecosystem. Computers 11(1), 43.
in biology and medicine, 140, 105100. [14] M. Ragab, E. B. Ashary, M. F. S. Sabir, A. A.
[4] Mansour, R. F., El Amraoui, A., Nouaouri, I., Bahaddad and R. F. Mansour, "Mathematical
Díaz, V. G., Gupta, D., & Kumar, S. (2021). modelling of quantum kernel method for
Artificial intelligence and Internet of Things biomedical data analysis," Computers,
enabled disease diagnosis model for smart Materials & Continua, vol. 71, no.3, pp. 5441–
healthcare systems. IEEE Access, 9, 45137- 5457, 2022.
45146. [15] Lian, J., Jia, W., Zareapoor, M., Zheng, Y.,
[5] Namasudra, S., Chakraborty, R., Majumder, Luo, R., Jain, D. K., & Kumar, N. (2019).
A., & Moparthi, N. R. (2020). Securing Deep-learning-based small surface defect
multimedia by using DNA-based encryption in detection via an exaggerated local variation-
the cloud computing environment. ACM based generative adversarial network. IEEE
Transactions on Multimedia Computing, Transactions on Industrial Informatics, 16(2),
Communications, and Applications 1343-1351.
(TOMM), 16(3s), 1-19. [16] Swati, S., Kumar, M., & Namasudra, S.
[6] Ismail, S. S., Mansour, R. F., El-Aziz, A., (2022). Early prediction of cognitive
Rasha, M., & Taloba, A. I. (2022). Efficient E- impairments using physiological signal for
Mail Spam Detection Strategy Using Genetic enhanced socioeconomic status. Information
Decision Tree Processing with NLP Features. Processing & Management, 59(2), 102845.
Computational Intelligence and Neuroscience, [17] Mukherjee, A., Jain, D. K., Goswami, P., Xin,
2022. Q., Yang, L., & Rodrigues, J. J. (2020). Back
[7] Althobaiti, M. M., Kumar, K. P. M., Gupta, propagation neural network based cluster head
D., Kumar, S., & Mansour, R. F. (2021). An identification in MIMO sensor networks for
intelligent cognitive computing based intrusion intelligent transportation systems. IEEE
detection for industrial cyber-physical systems. Access, 8, 28524-28532.
Measurement, 186, 110145. [18] Nair, R., Ragab, M., Mujallid, O. A.,
[8] Vaiyapuri, T., Dutta, A. K., Sikkandar, M. Y., Mohammad, K. A., Mansour, R. F., & Viju, G.
Gupta, D., Alouffi, B., Alharbi, A., ... & K. (2022). Impact of Wireless Sensor Data
Kadry, S. (2022). Design of Metaheuristic Mining with Hybrid Deep Learning for Human
Optimization-Based Vascular Segmentation Activity Recognition. Wireless
Techniques for Photoacoustic Images. Contrast Communications and Mobile Computing,
Media & Molecular Imaging, 2022. 2022.
[9] Metawa, N., Nguyen, P. T., Le Hoang Thuy [19] Chinnasamy, P., Deepalakshmi, P., Dutta, A.
To Nguyen, Q., Elhoseny, M., & Shankar, K. K., You, J., & Joshi, G. P. (2021). Ciphertext-
(2021). Internet of things enabled financial Policy Attribute-Based Encryption for Cloud
crisis prediction in enterprises using optimal Storage: Toward Data Privacy and
feature subset selection-based classification Authentication in AI-Enabled IoT
model. Big Data, 9(5), 331-342. System. Mathematics, 10(1), 68.
[10] Shankar, K., Perumal, E., Tiwari, P., [20] Shankar, K., Perumal, E., Díaz, V. G., Tiwari,
Shorfuzzaman, M., & Gupta, D. (2021). Deep P., Gupta, D., Saudagar, A. K. J., &
learning and evolutionary intelligence with Muhammad, K. (2021). An optimal cascaded
fusion-based feature extraction for detection of recurrent neural network for intelligent
COVID-19 from chest X-ray COVID-19 detection using Chest X-ray
images. Multimedia Systems, 1-13. images. Applied Soft Computing, 113,
[11] Mukherjee, A., Jain, D. K., & Yang, L. (2020). 107878.
On-demand efficient clustering for next [21] Al-Wesabi, F. N., Obayya, M., Hamza, M. A.,
generation IoT applications: A hybrid NN Alzahrani, J. S., Gupta, D., & Kumar, S.
approach. IEEE Sensors Journal, 21(22), (2022). Energy Aware Resource Optimization
25457-25464. using Unified Metaheuristic Optimization
[12] Jain, D. K., Zareapoor, M., Jain, R., Kathuria, Algorithm Allocation for Cloud Computing
A., & Bachhety, S. (2020). GAN-Poser: an Environment. Sustainable Computing:
improvised bidirectional GAN model for Informatics and Systems, 35, 100686.
human motion prediction. Neural Computing [22] Ragab, M., Alshehri, S., Aldawsari, H. M.,
and Applications, 32(18), 14579-14591. Noor, A., Ashary, E. B., Abou-Taleb, S. A. K.,
[13] Ragab, M., Eljaaly, K., Alhakamy, N. A., & Abdelazim, G. (2022). COVID-19
Alhadrami, H. A., Bahaddad, A. A., Abo- Identification System Using Transfer Learning
Dahab, S. M., & Khalil, E. M. (2021). Deep Technique With Mobile-NetV2 and Chest X-
ensemble model for COVID-19 diagnosis and Ray Images. Frontiers in Public Health, 102.

ISSN: 2347-8578 www.ijcstjournal.org Page 57


International Journal of Computer Science Trends and Technology (IJCST) – Volume 10 Issue 3, May-Jun 2022

[23] Vaiyapuri, T., Mohanty, S. N., Sivaram, M., (2021). An effective metaheuristic based node
Pustokhina, I. V., Pustokhin, D. A., & localization technique for wireless sensor
Shankar, K. (2021). Automatic vehicle license networks enabled indoor
plate recognition using optimal deep learning communication. Physical Communication, 48,
model. Computers, Materials and 101411.
Continua, 67(2), 1881-1897. [35] Alqaralleh, B. A., Vaiyapuri, T., Parvathy, V.
[24] Shankar, K., Taniar, D., Yang, E., & Yi, O. S., Gupta, D., Khanna, A., & Shankar, K.
(2021). Secure and Optimal Secret Sharing (2021). Blockchain-assisted secure image
Scheme for Color Images. Mathematics, 9(19), transmission and diagnosis model on Internet
2360. of Medical Things Environment. Personal and
[25] Shankar, K., Mohanty, S. N., Yadav, K., ubiquitous computing, 1-11.
Gopalakrishnan, T., & Elmisery, A. M. (2021). [36] Vaiyapuri, T. (2021). Deep learning enabled
Automated COVID-19 diagnosis and autoencoder architecture for collaborative
classification using convolutional neural filtering recommendation in iot environment.
network with fusion based feature extraction CMC-COMPUTERS MATERIALS &
model. Cognitive Neurodynamics, 1-14. CONTINUA, 68(1), 487-503.
[26] Dutta, A. K. (2021). Detecting phishing [37] Mansour, R. F., Escorcia-Gutierrez, J.,
websites using machine learning technique. Gamarra, M., Díaz, V. G., Gupta, D., &
PloS one, 16(10), e0258361. Kumar, S. (2021). Artificial intelligence with
[27] Ragab, M., Ashary, E. B., Aljedaibi, W. H., big data analytics-based brain intracranial
Alzahrani, I. R., Kumar, A., Gupta, D., & hemorrhage e-diagnosis using CT images.
Mansour, R. F. (2022). A novel metaheuristics Neural Computing and Applications, 1-13.
with adaptive neuro-fuzzy inference system for [38] A. A. Eshmawi, H. Alhumyani, S. A. Khalek,
decision making on autonomous unmanned R. A. Saeed, M. Ragab et al., "Design of
aerial vehicle systems. ISA Transactions. automated opinion mining model using
[28] Vaiyapuri, T., Lydia, E. L., Sikkandar, M. Y., optimized fuzzy neural network," Computers,
Díaz, V. G., Pustokhina, I. V., & Pustokhin, D. Materials & Continua, vol. 71, no.2, pp. 2543–
A. (2021). Internet of Things and Deep 2557, 2022.
Learning Enabled Elderly Fall Detection [39] Manjari, K., Verma, M., Singal, G., &
Model for Smart Homecare. IEEE Access, 9, Namasudra, S. (2022). QEST: Quantized and
113879-113888. Efficient Scene Text Detector using Deep
[29] Tyagi, S. K. S., Mukherjee, A., Boyang, Q., & Learning. Transactions on Asian and Low-
Jain, D. K. (2021). Computing resource Resource Language Information Processing.
optimization of big data in optical cloud radio [40] Lan, X., Zhang, W., Zhang, S., Jain, D. K., &
access networked industrial Internet of Things. Zhou, H. (2019). Robust multi-modality
IEEE Transactions on Industrial Informatics, anchor graph-based label prediction for RGB-
17(11), 7734-7742. infrared tracking. IEEE Transactions on
[30] Kumar, S., Toshniwal, D., & Parida, M. Industrial Informatics.
(2017). A comparative analysis of [41] Das, A. K., Mishra, D., Das, K., Mallick, P.
heterogeneity in road accident data using data K., Kumar, S., Zymbler, M., & El-Sayed, H.
mining techniques. Evolving systems, 8(2), (2022). Prophesying the Short-Term Dynamics
147-155. of the Crude Oil Future Price by Adopting the
[31] Kumar, S., & Nezhurina, M. I. (2019). An Survival of the Fittest Principle of Improved
ensemble classification approach for Grey Optimization and Extreme Learning
prediction of user’s next location based on Machine. Mathematics, 10(7), 1121.
Twitter data. Journal of Ambient Intelligence [42] Nair, R., Ragab, M., Mujallid, O. A.,
and Humanized Computing, 10(11), 4503- Mohammad, K. A., Mansour, R. F., & Viju, G.
4513. K. (2022). Impact of Wireless Sensor Data
[32] Paikrao, P., Mukherjee, A., Jain, D. K., Mining with Hybrid Deep Learning for Human
Chatterjee, P., & Alnumay, W. (2021). Smart Activity Recognition. Wireless
emotion recognition framework: A secured Communications and Mobile Computing,
IOVT perspective. IEEE Consumer 2022.
Electronics Magazine. [43] Mansour, R. F., Escorcia-Gutierrez, J.,
[33] Gupta, A., & Namasudra, S. (2022). A novel Gamarra, M., Gupta, D., Castillo, O., &
technique for accelerating live migration in Kumar, S. (2021). Unsupervised deep learning
cloud computing. Automated Software based variational autoencoder model for
Engineering, 29(1), 1-21. COVID-19 diagnosis and classification.
[34] Sekhar, P., Lydia, E. L., Elhoseny, M., Al- Pattern Recognition Letters, 151, 267-274.
Akaidi, M., Selim, M. M., & Shankar, K.

ISSN: 2347-8578 www.ijcstjournal.org Page 58


International Journal of Computer Science Trends and Technology (IJCST) – Volume 10 Issue 3, May-Jun 2022

[44] Pavithran, P., Mathew, S., Namasudra, S., & Computers & Electrical Engineering, 100,
Srivastava, G. (2022). A novel cryptosystem 107871.
based on DNA cryptography, hyperchaotic [54] Jain, D. K., Boyapati, P., Venkatesh, J., &
systems and a randomly generated Moore Prakash, M. (2022). An Intelligent Cognitive-
machine for cyber physical systems. Computer Inspired Computing with Big Data Analytics
Communications, 188, 1-12. Framework for Sentiment Analysis and
[45] Jain, D. K., Tyagi, S. K. K. S., Neelakandan, Classification. Information Processing &
S., Prakash, M., & Natrayan, L. (2021). Management, 59(1), 102758.
Metaheuristic optimization-based resource [55] Vaiyapuri, T., & Gupta, M. (2021). Traffic
allocation technique for cybertwin-driven 6G accident severity prediction and cognitive
on IoE environment. IEEE Transactions on analysis using deep learning. Soft Computing,
Industrial Informatics. 1-13.
[46] Nayak, D. R., Padhy, N., Mallick, P. K., [56] Zhou, S., Luo, P., Jain, D. K., Lan, X., &
Bagal, D. K., & Kumar, S. (2022). Brain Zhang, Y. (2019). Double-domain imaging
Tumour Classification Using Noble Deep and adaption for person re-identification. IEEE
Learning Approach with Parametric Access, 7, 103336-103345.
Optimization through Metaheuristics [57] Shankar, K., Perumal, E., Elhoseny, M., Taher,
Approaches. Computers, 11(1), 10. F., Gupta, B. B., & El-Latif, A. A. A. (2021).
[47] Pustokhina, I. V., Pustokhin, D. A., Aswathy, Synergic Deep Learning for Smart Health
R. H., Jayasankar, T., Jeyalakshmi, C., Díaz, Diagnosis of COVID-19 for Connected Living
V. G., & Shankar, K. (2021). Dynamic and Smart Cities. ACM Transactions on
customer churn prediction strategy for Internet Technology (TOIT), 22(3), 1-14.
business intelligence using text analytics with [58] Dutta, A. K. (2020). Managing natural hazards
evolutionary optimization in smart cities in Kingdom of Saudi Arabia
algorithms. Information Processing & using a technique based on interior search
Management, 58(6), 102706. algorithm. Electronic Government, an
[48] Dutta, A. K., Aljarallah, N. A., Abirami, T., International Journal, 16(1-2), 155-169.
Sundarrajan, M., Kadry, S., Nam, Y., & Jeong, [59] Sharma, P., Moparthi, N. R., Namasudra, S.,
C. W. (2022). Optimal Deep-Learning- Shanmuganathan, V., & Hsu, C. H. (2021).
Enabled Intelligent Decision Support System Blockchain‐based IoT architecture to secure
for SARS-CoV-2 Classification. Journal of healthcare system using identity‐based
Healthcare Engineering, 2022. encryption. Expert Systems, e12915.
[49] Pustokhina, I. V., Pustokhin, D. A., Lydia, E. [60] Vaiyapuri, T., Parvathy, V. S., Manikandan,
L., Elhoseny, M., & Shankar, K. (2021). V., Krishnaraj, N., Gupta, D., & Shankar, K.
Energy efficient neuro-fuzzy cluster based (2021). A novel hybrid optimization for
topology construction with metaheuristic route cluster‐based routing protocol in information-
planning algorithm for unmanned aerial centric wireless sensor networks for IoT based
vehicles. Computer Networks, 196, 108214. mobile edge computing. Wireless Personal
[50] Namasudra, S. (2020). Fast and secure data Communications, 1-24.
accessing by using DNA computing for the [61] Joshi, G. P., Alenezi, F., Thirumoorthy, G.,
cloud environment. IEEE Transactions on Dutta, A. K., & You, J. (2021). Ensemble of
Services Computing. deep learning-based multimodal remote
[51] M. Ragab, A. Algarni, A. A. Bahaddad and R. sensing image classification model on
F. Mansour, "Machine learning applied to unmanned aerial vehicle
problem-solving in medical applications," networks. Mathematics, 9(22), 2984.
Computers, Materials & Continua, vol. 69, [62] Vaiyapuri, T., Dutta, A. K., Punithavathi, I. H.,
no.2, pp. 2277–2294, 2021. Duraipandy, P., Alotaibi, S. S., Alsolai, H., ...
[52] Padmaa, M., Jayasankar, T., Venkatraman, S., & Mahgoub, H. (2022, April). Intelligent
Dutta, A. K., Gupta, D., Shamshirband, S., & Deep-Learning-Enabled Decision-Making
Rodrigues, J. J. (2022). Oppositional chaos Medical System for Pancreatic Tumor
game optimization based clustering with trust Classification on CT Images.
based data transmission protocol for intelligent In Healthcare (Vol. 10, No. 4, p. 677). MDPI.
IoT edge systems. Journal of Parallel and [63] Althobaiti, M. M., Almulihi, A., Ashour, A.
Distributed Computing, 164, 142-151. A., Mansour, R. F., & Gupta, D. (2022).
[53] Escorcia-Gutierrez, J., Gamarra, M., Beleño, Design of Optimal Deep Learning-Based
K., Soto, C., & Mansour, R. F. (2022). Pancreatic Tumor and Nontumor
Intelligent deep learning-enabled autonomous Classification Model Using Computed
small ship detection and classification model.

ISSN: 2347-8578 www.ijcstjournal.org Page 59


International Journal of Computer Science Trends and Technology (IJCST) – Volume 10 Issue 3, May-Jun 2022

Tomography Scans. Journal of Healthcare


Engineering, 2022.
[64] Jain, D. K., Li, Y., Er, M. J., Xin, Q., Gupta,
D., & Shankar, K. (2021). Enabling Unmanned
Aerial Vehicle Borne Secure Communication
with Classification Framework for Industry
5.0. IEEE Transactions on Industrial
Informatics.
[65] Ragab, M., Albukhari, A., Alyami, J., &
Mansour, R. F. (2022). Ensemble Deep-
Learning-Enabled Clinical Decision Support
System for Breast Cancer Diagnosis and
Classification on Ultrasound
Images. Biology, 11(3), 439.
[66] Namasudra, S., & Roy, P. (2017). Time saving
protocol for data accessing in cloud
computing. IET Communications, 11(10),
1558-1565.
[67] Namasudra, S., Sharma, P., Crespo, R. G., &
Shanmuganathan, V. (2022). Blockchain-
Based Medical Certificate Generation and
Verification for IoT-based Healthcare
Systems. IEEE Consumer Electronics
Magazine.

ISSN: 2347-8578 www.ijcstjournal.org Page 60

You might also like