2020
DOI: 10.1007/s11277-020-07091-x
|View full text |Cite
|
Sign up to set email alerts
|

TelMED: Dynamic User Clustering Resource Allocation Technique for MooM Datasets Under Optimizing Telemedicine Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…Network attributes can be represented as which can be extracted from each . Source Port number, Destination Port number, IP address, and MAC address are the required network traffic attributes here [ 40 ]. Network parameters ( P ) can be retrieved from the network requirements ( ) of individual by the function .…”
Section: Proposed Approachmentioning
confidence: 99%
“…Network attributes can be represented as which can be extracted from each . Source Port number, Destination Port number, IP address, and MAC address are the required network traffic attributes here [ 40 ]. Network parameters ( P ) can be retrieved from the network requirements ( ) of individual by the function .…”
Section: Proposed Approachmentioning
confidence: 99%
“…Here work focuses on comparative study [9] [10]on different clustering methods and performance of each algorithm, so that it will be helpful to the researchers/developers, which of the algorithm suits for clustering. Three clustering algorithms are compared and calculated the performance on similar data sets, i.e., Graph Based Clustering Algorithm, Genetic Algorithm based [6] [7] Tweet Clustering; Feature Selection-based Clustering Algorithm. This study clearly tell that classification of micro loggings or social media data is one of the difficult task and another complex task is to categorizing the social media data is increase with data set [8] [11].…”
Section: Literature Surveymentioning
confidence: 99%
“…The threats such as exploitation of messages or traces the trajectory of vehicles by attacker have to be overcome before communication architecture in VANETs is deployed to increase the reliability ,dependability and individual`s acceptance of the VANETs system, Formerly many approaches have been proposed to address the security and privacy issues. Most of the literatures pay more attention to two important aspects such as architecture of VANETs and communication over it [20].…”
Section: Security and Privacymentioning
confidence: 99%