Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760887
Anurag Karmakar, Anaswara Raghuthaman, Om Sudhakar Kote, N. Jayapandian
In a world with intensive computational services and require optimal solutions, cloud security is a critical concern. As a known fact, the cloud is a diverse field in which data is crucial, and as a result, it invites the dark world to enter and create a virtual menace to businesses, governments, and technology that is facilitated by the cloud. This article addresses the fundamentals of cloud computing, as well as security and threats in various applications. This research study will explore how security is remaining as a potential risk for cloud users across the globe by listing some of the cloud applications. Some viable solutions and security measures that could help us in analyzing cloud security threats are reviewed. The analyzed solutions include profound analytical thinking on how to render the solutions more impactful in each scenario. Several cloud security solutions are available to assist businesses in reducing costs and enhancing security. This study discover that if the risks are taken into consideration without any delay then the matter of solutions gets divided into four pillars, which will assist us in obtaining a more comprehensive knowledge. Visibility, compute-based security, network protection, and lastly identity security are referred as four pillars.
{"title":"Cloud Computing Application: Research Challenges and Opportunity","authors":"Anurag Karmakar, Anaswara Raghuthaman, Om Sudhakar Kote, N. Jayapandian","doi":"10.1109/ICSCDS53736.2022.9760887","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760887","url":null,"abstract":"In a world with intensive computational services and require optimal solutions, cloud security is a critical concern. As a known fact, the cloud is a diverse field in which data is crucial, and as a result, it invites the dark world to enter and create a virtual menace to businesses, governments, and technology that is facilitated by the cloud. This article addresses the fundamentals of cloud computing, as well as security and threats in various applications. This research study will explore how security is remaining as a potential risk for cloud users across the globe by listing some of the cloud applications. Some viable solutions and security measures that could help us in analyzing cloud security threats are reviewed. The analyzed solutions include profound analytical thinking on how to render the solutions more impactful in each scenario. Several cloud security solutions are available to assist businesses in reducing costs and enhancing security. This study discover that if the risks are taken into consideration without any delay then the matter of solutions gets divided into four pillars, which will assist us in obtaining a more comprehensive knowledge. Visibility, compute-based security, network protection, and lastly identity security are referred as four pillars.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760928
Jun Zhang
Through in-depth excavation and analysis of tourist network texts in many rural tourist spots, the effectiveness of the ecological civilization construction function of rural tourist destinations is analyzed, and it can be found that tourists usually follow the basics of perceptual cognition, attitude and consciousness generation, emotion and behavior transformation Logic, realize the internalization of ecological values, perform topological clustering on the reference network, and then use the text mining method to extract the topic of the network community, combine the relationship between the network communities in different time periods to analyze the technological evolution path, and add materials Take the manufacturing field as an example to conduct empirical research and increase the efficiency by 7.63%.
{"title":"Identification and Analysis of Tourists' Ecological Values based on Computer Network Text Mining Technology","authors":"Jun Zhang","doi":"10.1109/ICSCDS53736.2022.9760928","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760928","url":null,"abstract":"Through in-depth excavation and analysis of tourist network texts in many rural tourist spots, the effectiveness of the ecological civilization construction function of rural tourist destinations is analyzed, and it can be found that tourists usually follow the basics of perceptual cognition, attitude and consciousness generation, emotion and behavior transformation Logic, realize the internalization of ecological values, perform topological clustering on the reference network, and then use the text mining method to extract the topic of the network community, combine the relationship between the network communities in different time periods to analyze the technological evolution path, and add materials Take the manufacturing field as an example to conduct empirical research and increase the efficiency by 7.63%.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133285024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760793
U. Muthuraman, R. Ravi, G. Devaraj, J. M. Esther, R. Kabilan, J. Z. Gabriel
Most civil constructions inside cities, such as flyovers and bridges, remain prone to damage as they are being used after their lifespan has ended which creates a threat to people who use it. Due to the large number of automobiles on the road in a populated city, bridges may collapse, resulting in a huge calamity. As a result, those bridges must be constantly monitored. In this paper, a model that comprises of a load sensing element, an arduino microcontroller, ac flux sensor, an infrared sensor, a Wi-Fi module, and a vibration sensor has been designed. This technology analyzes vibration, bridge bending and vehicle loads, and generates the alarm through buzzer, if the vehicle load, vehicle count, and bending of the bridge exceed the threshold level. Whenever necessary, an administrator delegates an assignment to the employees as upkeep. This communication between administration and the monitoring system is accomplished via the use of IoT. For future data analyses, a webapp is built with statistics acquired by the help of sensors.
{"title":"Embedded Sensor-based Construction Health Warning System for Civil Structures & Advanced Networking Techniques using IoT","authors":"U. Muthuraman, R. Ravi, G. Devaraj, J. M. Esther, R. Kabilan, J. Z. Gabriel","doi":"10.1109/ICSCDS53736.2022.9760793","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760793","url":null,"abstract":"Most civil constructions inside cities, such as flyovers and bridges, remain prone to damage as they are being used after their lifespan has ended which creates a threat to people who use it. Due to the large number of automobiles on the road in a populated city, bridges may collapse, resulting in a huge calamity. As a result, those bridges must be constantly monitored. In this paper, a model that comprises of a load sensing element, an arduino microcontroller, ac flux sensor, an infrared sensor, a Wi-Fi module, and a vibration sensor has been designed. This technology analyzes vibration, bridge bending and vehicle loads, and generates the alarm through buzzer, if the vehicle load, vehicle count, and bending of the bridge exceed the threshold level. Whenever necessary, an administrator delegates an assignment to the employees as upkeep. This communication between administration and the monitoring system is accomplished via the use of IoT. For future data analyses, a webapp is built with statistics acquired by the help of sensors.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132103053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9761023
Li Xu
Fusion of computer virtual reality dynamic multi-dimensional image rendering algorithm in the university smart practice venues is studied in the paper. The visual simulation rendering tool VP is the world's leading software platform for real-time visual simulation, sound simulation and virtual reality. Virtual simulation system is a distributed system for large-scale complex scenes. It can not complete the virtual reproduction of such a large scene on one server. With these 2 combinations, the computer virtual reality dynamic multi-dimensional image rendering algorithm is designed. Through RTDs/RscAD platform modeling, high-precision I/O boards are used to interact with the actual power electronic control and protection system in real time to realize the core closed-loop test of the power electronic control and protection system, and then, the system is appliedto the university smart practice venues. Through the experimental simulation, the designed model is simulated.
{"title":"Fusion of Computer Virtual Reality Dynamic Multi-Dimensional Image Rendering Algorithm in University Smart Practice Venues","authors":"Li Xu","doi":"10.1109/ICSCDS53736.2022.9761023","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9761023","url":null,"abstract":"Fusion of computer virtual reality dynamic multi-dimensional image rendering algorithm in the university smart practice venues is studied in the paper. The visual simulation rendering tool VP is the world's leading software platform for real-time visual simulation, sound simulation and virtual reality. Virtual simulation system is a distributed system for large-scale complex scenes. It can not complete the virtual reproduction of such a large scene on one server. With these 2 combinations, the computer virtual reality dynamic multi-dimensional image rendering algorithm is designed. Through RTDs/RscAD platform modeling, high-precision I/O boards are used to interact with the actual power electronic control and protection system in real time to realize the core closed-loop test of the power electronic control and protection system, and then, the system is appliedto the university smart practice venues. Through the experimental simulation, the designed model is simulated.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115624532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760761
E. Dinesh, S. Kavin Raj, R. Sukeshan, S. Kavin Prasath
This project describes satellite image segmentation using a U-net-based satellite image-based segmentation algorithm, The purpose of this research is to develop a convolutional machine learning used to create a land cover sorting map based on satellite images prototype by a reformed U-Net arrangement. The goal of this project is to develop and evaluate convolutional prototypes for automated land cover mapping. The utility for enhancing the accuracy of land cover mapping and identifying changes. For land cover sorting and semantic sorting, a dataset was created, and machine learning models were trained by the authors. The findings were analyzed across three different geographical classification levels using picture segmentation based on satellite images. One of the two key datasets for the investigation was the BigEarthNet satellite picture database. This unique and most recent collection, which comprises Sentinel-2 satellite photos from ten European nations, was released in 2019.
{"title":"Deep Guidance Network for Satellite Image Segmentation using U-NET Models","authors":"E. Dinesh, S. Kavin Raj, R. Sukeshan, S. Kavin Prasath","doi":"10.1109/ICSCDS53736.2022.9760761","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760761","url":null,"abstract":"This project describes satellite image segmentation using a U-net-based satellite image-based segmentation algorithm, The purpose of this research is to develop a convolutional machine learning used to create a land cover sorting map based on satellite images prototype by a reformed U-Net arrangement. The goal of this project is to develop and evaluate convolutional prototypes for automated land cover mapping. The utility for enhancing the accuracy of land cover mapping and identifying changes. For land cover sorting and semantic sorting, a dataset was created, and machine learning models were trained by the authors. The findings were analyzed across three different geographical classification levels using picture segmentation based on satellite images. One of the two key datasets for the investigation was the BigEarthNet satellite picture database. This unique and most recent collection, which comprises Sentinel-2 satellite photos from ten European nations, was released in 2019.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115774052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760820
Yi Wu, Hui-ling Meng, Hong-wei Yan
According to the military requirements of naval equipment support command, the functional characteristics of Beidou navigation and positioning system and MGIS are analyzed, and a design method of naval equipment support command automation system based on Beidou navigation and positioning system and MGIS is proposed. This method organically combines computer technology, MGIS, and Beidou satellite positioning and communication technology to realize the automation and digitization of equipment support command. The results show that an improved solution model is used to solve the pseudorange formula, which combines the least squares method. It has the characteristics of fast iteration speed and high Kalman filtering accuracy.
{"title":"Adaptive Positioning and Tracking System for Military Equipment based on Beidou Satellites","authors":"Yi Wu, Hui-ling Meng, Hong-wei Yan","doi":"10.1109/ICSCDS53736.2022.9760820","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760820","url":null,"abstract":"According to the military requirements of naval equipment support command, the functional characteristics of Beidou navigation and positioning system and MGIS are analyzed, and a design method of naval equipment support command automation system based on Beidou navigation and positioning system and MGIS is proposed. This method organically combines computer technology, MGIS, and Beidou satellite positioning and communication technology to realize the automation and digitization of equipment support command. The results show that an improved solution model is used to solve the pseudorange formula, which combines the least squares method. It has the characteristics of fast iteration speed and high Kalman filtering accuracy.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"31 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123533088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760749
A. Ramakrishnan, M. Ramkumar
This research work aims to minimize the power fluctuation in the power production of WECS using backup storage device during unexpected scenario. When the generating power is more than the grid capacity buck boost converter step down the power to grid capacity. Instead of wasting, the Excess amount of power will store in backup storage device with the help of controller. When the power generated is lower than the threshold value or Blade running in a slower speed to increase the power production by using backup power instead of draining the power from grid. This is used for ensuring the continuous power production with minimized power fluctuation. This process proceeds further by using DFIG with the combination of buck-boost converter and controller.
{"title":"Review on Backup Storage System in Wind Energy Conversion System","authors":"A. Ramakrishnan, M. Ramkumar","doi":"10.1109/ICSCDS53736.2022.9760749","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760749","url":null,"abstract":"This research work aims to minimize the power fluctuation in the power production of WECS using backup storage device during unexpected scenario. When the generating power is more than the grid capacity buck boost converter step down the power to grid capacity. Instead of wasting, the Excess amount of power will store in backup storage device with the help of controller. When the power generated is lower than the threshold value or Blade running in a slower speed to increase the power production by using backup power instead of draining the power from grid. This is used for ensuring the continuous power production with minimized power fluctuation. This process proceeds further by using DFIG with the combination of buck-boost converter and controller.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121976271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760940
R. M. Pandeeswari, R. Kabilan, T.M. Januanbumani, J. Rejoni, A. Ramya, S. Jothi
It gives importance about motion estimation (ME) as a top priority in video coding and testing. Extended BIST schemes are primarily concerned with memory circuit and testing concerns in video coding systems. Furthermore, by improving the abilities of Concurrent Error Detection, an dependability on several Processing Element will got increased. CED can discover mistakes by looking for inconsistencies and undesirable consequences from operations on the same operands. Concurrent Error Detection involves testing any route with full throttle without having to shut down the entire system. Focusing upon that Concurrent Error Detection idea, this work provides a unique Error - detecting Data Retrieval structure based here on Residue-Quotient code to identify faults & restore information in Processing Units of Motion Estimation in video coding testing analysers.
{"title":"Data Backups and Error Finding by Residue Quotient Code for Testing Applications","authors":"R. M. Pandeeswari, R. Kabilan, T.M. Januanbumani, J. Rejoni, A. Ramya, S. Jothi","doi":"10.1109/ICSCDS53736.2022.9760940","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760940","url":null,"abstract":"It gives importance about motion estimation (ME) as a top priority in video coding and testing. Extended BIST schemes are primarily concerned with memory circuit and testing concerns in video coding systems. Furthermore, by improving the abilities of Concurrent Error Detection, an dependability on several Processing Element will got increased. CED can discover mistakes by looking for inconsistencies and undesirable consequences from operations on the same operands. Concurrent Error Detection involves testing any route with full throttle without having to shut down the entire system. Focusing upon that Concurrent Error Detection idea, this work provides a unique Error - detecting Data Retrieval structure based here on Residue-Quotient code to identify faults & restore information in Processing Units of Motion Estimation in video coding testing analysers.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122082771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9761000
CH. Bhavana, CH. Prameela, C. Jahnavi, P. Harshith, P. V. Naidu, M. Praneetha
A compact Multi Input Multi Output (MIMO) antenna system having four elements are placed with equal spaces and these elements are configured orthogonally are analyzed and designed. The orthogonality of placing antennas and decreased network complexity have been performed. The proposed antenna performance is analyzed for V2V communications. The performance is analyzed in the ranges of 2.11 – 2.29 GHz, 3.3 – 3.45 GHz, 4.62 – 6.7 GHz. V2V communication applications consist of ray launching solver which utilizes the bandwidth of 5.9 GHz allocated to analyze the protocol of waves with bandwidth range of 5.85 – 5.95 GHz. With respect to the radiation performance of antenna diversity performance of antenna is analyzed. The antenna structure consists of adjacent antenna elements, which are placed very close to each other. Antenna efficiency, pattern diversity, and enhanced port isolation of the proposed antenna reveal the simulation results.
{"title":"Duplex C-Shaped Tri-Band MIMO Antenna with Improved Isolation for Multiband Frequency Applications","authors":"CH. Bhavana, CH. Prameela, C. Jahnavi, P. Harshith, P. V. Naidu, M. Praneetha","doi":"10.1109/ICSCDS53736.2022.9761000","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9761000","url":null,"abstract":"A compact Multi Input Multi Output (MIMO) antenna system having four elements are placed with equal spaces and these elements are configured orthogonally are analyzed and designed. The orthogonality of placing antennas and decreased network complexity have been performed. The proposed antenna performance is analyzed for V2V communications. The performance is analyzed in the ranges of 2.11 – 2.29 GHz, 3.3 – 3.45 GHz, 4.62 – 6.7 GHz. V2V communication applications consist of ray launching solver which utilizes the bandwidth of 5.9 GHz allocated to analyze the protocol of waves with bandwidth range of 5.85 – 5.95 GHz. With respect to the radiation performance of antenna diversity performance of antenna is analyzed. The antenna structure consists of adjacent antenna elements, which are placed very close to each other. Antenna efficiency, pattern diversity, and enhanced port isolation of the proposed antenna reveal the simulation results.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116810313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760920
Raviteja Bhima, K. Sridevi, G. Babu, S. Dhanikonda, N. Divya
This research article discusses about the focal points and difficulties of cloud-based framework engineering in observing and examining the factual organization execution. The focus of thsi research effort is on integrating modern remote sensor groups, which are made up of low-power remote devices for detecting and activating a real-time connection with cloud infrastructures, enabling remote access over secured and uninterrupted connections. The proposed cloud connecting structure executes RESTful administrations at the WSN's facilitator hub level, allowing for the use of a more adaptable and efficient communication structure. The general framework provides advantages for perception, information stockpiling and preparing it for dispersed calculations, which can divide into heterogeneous staggered observing and control frameworks. This research work presents a displaying and reenactment approach for enabling adaptable IPv6-based modern remote sensor organizations, feature powerful instruments for cloud interoperability and contention along with the achievability of the proposed framework.
{"title":"Industrial Wireless Sensor Network Integration with Cloud Environment using IPv6 Routing","authors":"Raviteja Bhima, K. Sridevi, G. Babu, S. Dhanikonda, N. Divya","doi":"10.1109/ICSCDS53736.2022.9760920","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760920","url":null,"abstract":"This research article discusses about the focal points and difficulties of cloud-based framework engineering in observing and examining the factual organization execution. The focus of thsi research effort is on integrating modern remote sensor groups, which are made up of low-power remote devices for detecting and activating a real-time connection with cloud infrastructures, enabling remote access over secured and uninterrupted connections. The proposed cloud connecting structure executes RESTful administrations at the WSN's facilitator hub level, allowing for the use of a more adaptable and efficient communication structure. The general framework provides advantages for perception, information stockpiling and preparing it for dispersed calculations, which can divide into heterogeneous staggered observing and control frameworks. This research work presents a displaying and reenactment approach for enabling adaptable IPv6-based modern remote sensor organizations, feature powerful instruments for cloud interoperability and contention along with the achievability of the proposed framework.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124051548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}