<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Archiving and Interchange DTD v2.3 20070202//EN" "archivearticle.dtd">
<article xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="methods-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Bohr. Scit.</journal-id>
<journal-title>BOHR International Journal of Smart Computing and Information Technology</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Bohr. Scit.</abbrev-journal-title>
<issn pub-type="epub">2583-2026</issn>
<publisher>
<publisher-name>BOHR</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.54646/bijscit.2023.33</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Methods</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>A secured database monitoring method to improve data backup and recovery operations in cloud computing</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Ramesh</surname> <given-names>G.</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name><surname>Logeshwaran</surname> <given-names>J.</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Aravindarajan</surname> <given-names>V.</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>Department of Information Technology, K.L.N College of Engineering</institution>, <addr-line>Madurai</addr-line>, <country>India</country></aff>
<aff id="aff2"><sup>2</sup><institution>Department of E.C.E, Sri Eshwar College of Engineering</institution>, <addr-line>Coimbatore</addr-line>, <country>India</country></aff>
<author-notes>
<corresp id="c001">&#x002A;Correspondence: J. Logeshwaran, <email>drlogeshj@gmail.com</email></corresp>
</author-notes>
<pub-date pub-type="epub">
<day>24</day>
<month>04</month>
<year>2023</year>
</pub-date>
<volume>4</volume>
<issue>1</issue>
<fpage>17</fpage>
<lpage>23</lpage>
<history>
<date date-type="received">
<day>20</day>
<month>03</month>
<year>2023</year>
</date>
<date date-type="accepted">
<day>15</day>
<month>04</month>
<year>2023</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2023 Ramesh, Logeshwaran and Aravindarajan.</copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Ramesh, Logeshwaran and Aravindarajan</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by-nc-nd/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract>
<p>In general, the company sometimes uses unregistered functions in database, which significantly improves performance, but does not leave the possibility of recovery except for backup. That is, actions must be performed immediately after passing the session. A queue problem is likely to cause data loss and downtime of about a week. In modern conditions, this can lead to the bankruptcy of the company. It can be seen that backup systems have been installed and configured, but despite this, they have not succeeded in restoring within the time frame specified in the SLA. In this study, a secured database monitoring method was proposed to improve data backup and recovery operations in cloud computing. In this proposed method, the backup speed is directly proportional to the amount of data, while having at least 30% annual data growth. In 3&#x2013;4 years, the data at least doubled, but for some companies, this number is even higher, while the backup speed does not change. Those terms and those SLAs that were relevant 3&#x2013;4 years ago now need to be at least doubled. At the same time, business requirements for data recovery (recovery point objective/recovery time objective) continue to grow.</p>
</abstract>
<kwd-group>
<kwd>database</kwd>
<kwd>performance</kwd>
<kwd>recovery</kwd>
<kwd>backup</kwd>
<kwd>operating system</kwd>
<kwd>queue</kwd>
<kwd>downtime</kwd>
</kwd-group>
<counts>
<fig-count count="7"/>
<table-count count="1"/>
<equation-count count="0"/>
<ref-count count="53"/>
<page-count count="7"/>
<word-count count="4874"/>
</counts>
</article-meta>
</front>
<body>
<sec id="S1" sec-type="intro">
<title>Introduction</title>
<p>All business processes of the company are being transferred to information technology, and the paper primary (copies and originals of documents, reports, scans, etc.) is disappearing (<xref ref-type="bibr" rid="B1">1</xref>, <xref ref-type="bibr" rid="B2">2</xref>). Everything revolves around IT systems, and data loss literally means losing everything (<xref ref-type="bibr" rid="B3">3</xref>). There is no more room for error. In the cases we presented, all the time, companies were unable to function due to the unavailability of data due to various circumstances (<xref ref-type="bibr" rid="B4">4</xref>, <xref ref-type="bibr" rid="B5">5</xref>). This led to direct and indirect losses, for example, reputational losses, when the company could not carry out its main business process, which is not easy to measure in monetary terms but in the long run does not cause less damage to the company (<xref ref-type="bibr" rid="B6">6</xref>&#x2013;<xref ref-type="bibr" rid="B8">8</xref>). We have reflected on our observations regarding recovery time objective. As your data grow, the actual recovery time must also grow, and the SLA requirements become stricter (<xref ref-type="bibr" rid="B9">9</xref>). The point where the actual graph time equals the required time has already been sent to most clients (<xref ref-type="bibr" rid="B10">10</xref>). In fact, most errors are associated with the loss of some part of the data. At the same time, traditional backup tools allow you to restore data directly from the backup, but often you need to restore the entire system (<xref ref-type="bibr" rid="B11">11</xref>&#x2013;<xref ref-type="bibr" rid="B13">13</xref>). If your database is 15 TB, this will take several days (<xref ref-type="bibr" rid="B14">14</xref>). In a world where the master sheet disappears and everything is stored in IT systems, every second creates data that we want to protect immediately, the moment it is created. But this cannot be done using classic backup systems (<xref ref-type="bibr" rid="B15">15</xref>, <xref ref-type="bibr" rid="B16">16</xref>). Each data have a certain length of time, and these data exist all over the world in one copy (<xref ref-type="bibr" rid="B17">17</xref>).</p>
<p>The customers want to continue to protect their data from the moment it appears (<xref ref-type="bibr" rid="B18">18</xref>). When you decide to restore from a backup, you often need to restore a day earlier and then have the data retrieved somewhere else a day later (<xref ref-type="bibr" rid="B19">19</xref>, <xref ref-type="bibr" rid="B20">20</xref>). As a rule, this is a long task for administrators that take several days (<xref ref-type="bibr" rid="B21">21</xref>). With a very negative development of events, it can lead to the loss of very important information (<xref ref-type="bibr" rid="B22">22</xref>). Of course, the problem is not limited to backup; it is about the construction of the IT system as a whole, and the title in this case is so important that it cannot be ignored (<xref ref-type="bibr" rid="B23">23</xref>, <xref ref-type="bibr" rid="B24">24</xref>). Unfortunately, there are no cheap and quick options to check how well the backup was done (<xref ref-type="bibr" rid="B25">25</xref>). Of course, this can be done with periodic test recoveries, but this is a very expensive operation in terms of human effort and IT resources (<xref ref-type="bibr" rid="B26">26</xref>). It is the work of a separate team on a separate hardware (<xref ref-type="bibr" rid="B27">27</xref>). Most of the customers do not do this. It often happens that everyone creates backups, but during restoration, it turns out that they could not have been done &#x2013; despite the outwardly correct operation of RMS, they cannot be restored (<xref ref-type="bibr" rid="B28">28</xref>, <xref ref-type="bibr" rid="B29">29</xref>). This happens for various reasons. This is best explained with an example (<xref ref-type="bibr" rid="B30">30</xref>). A backup system is a service subsystem of a data center and has the following features:</p>
<list list-type="simple">
<list-item>
<label>&#x2022;</label>
<p>The backup process is not critical to solving IS problems. A failure of a backup system does not lead to a reduction in the availability of critical information services (<xref ref-type="bibr" rid="B31">31</xref>).</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>The computational burden that the backup process creates is not beneficial to the provision of IS information services (<xref ref-type="bibr" rid="B32">32</xref>).</p>
</list-item>
</list>
<p>Naturally, it was forgotten in the maintenance industry for many years. Thus, a part of the data is completely lost (<xref ref-type="bibr" rid="B33">33</xref>, <xref ref-type="bibr" rid="B34">34</xref>). It took several more days to completely recreate the infrastructure services &#x2013; no backups of operating systems, binaries, configurations, etc. (<xref ref-type="bibr" rid="B35">35</xref>). All the missing information was collected from primary documents (<xref ref-type="bibr" rid="B36">36</xref>). One of our customers used a SAP system with an Oracle database. The backup was carried out by inbuilt SAP tools with the help of huge vendors (<xref ref-type="bibr" rid="B37">37</xref>, <xref ref-type="bibr" rid="B38">38</xref>). Two different backup policies were configured: the first was file-based and copied the data of operating and software systems, and the second was the database itself (<xref ref-type="bibr" rid="B39">39</xref>). Since they were sent to the same system, an exclusion list was constructed and entered into the database (<xref ref-type="bibr" rid="B40">40</xref>). The file policy takes this list into account and does not allocate directories in the database (<xref ref-type="bibr" rid="B41">41</xref>). Due to the uniqueness of the architecture, the database backup policy ignored the list of exclusions and correctly copied the required data (<xref ref-type="bibr" rid="B42">42</xref>).</p>
</sec>
<sec id="S2">
<title>Related works</title>
<p>An improper approach to the problem of backup is a critical problem. Historically, the company or an integrator built it. At the time of construction, it certainly met all the requirements and performed its function perfectly (<xref ref-type="bibr" rid="B43">43</xref>). Over the years, the enterprise IT landscape has changed. At the same time, the backup system was simply adjusted as the system evolved, and often no systematic approach was followed, which would take into account the importance of system compliance with initial indicators in all subsequent phases (<xref ref-type="bibr" rid="B44">44</xref>). When developing a data protection system in your organization, you should take into account that this is only one part of your data protection strategy (<xref ref-type="bibr" rid="B45">45</xref>). A reserve parachute is not a silver bullet, as many case studies prove that the approach to data protection must be comprehensive, so when developing it, we must consider where it will fit in the global strategy for data protection (<xref ref-type="bibr" rid="B46">46</xref>).</p>
<p>A system administrator maintains an inventory of backup client computers, recording devices, and backup storage media and schedules backups. All this information is contained in a special database stored on the backup management server (<xref ref-type="bibr" rid="B47">47</xref>). The management server instructs the agent program installed on the client computer to start backing up data according to the selected policy in accordance with the schedule or according to the operator&#x2019;s command (<xref ref-type="bibr" rid="B48">48</xref>). The agent program collects and transfers the data to be backed up to the copy server specified by the management server (<xref ref-type="bibr" rid="B49">49</xref>). The mechanism of action of &#x201C;snapshots&#x201D; is different and can be implemented both in software on a production server and in hardware within the array (<xref ref-type="bibr" rid="B50">50</xref>). At the moment when the backup needs to be started, the agent program instructs the application to complete all transactions and save the cache memory (<xref ref-type="bibr" rid="B51">51</xref>). A fundamental challenge for any data center is implementing a service level agreement between the IT department and the business (<xref ref-type="bibr" rid="B52">52</xref>). A key aspect of meeting business needs is the assurance of data security, so a data backup and recovery system is an integrated infrastructure unit of a properly organized data center&#x2019;s data storage subsystem (<xref ref-type="bibr" rid="B53">53</xref>). This type of backup and recovery actually takes a few seconds, which distinguishes this technology from classical systems with foreign media (54). The issues in the existing systems and the proposed solutions are shown in <xref ref-type="table" rid="T1">Table 1</xref>.</p>
<table-wrap position="float" id="T1">
<label>TABLE 1</label>
<caption><p>The related issues and proposed suggestions.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<td valign="top" align="left">Issues</td>
<td valign="top" align="left">Proposed suggestions</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">The IBS was misconfigured, and no test reconfigurations were performed.</td>
<td valign="top" align="left">Use Database Standby located on a different queue. This will allow some time to transition to the running data instance.</td>
</tr>
<tr>
<td valign="top" align="left">There are no mechanisms for quick recovery in case of disaster and redundant systems.</td>
<td valign="top" align="left">Database ZDLRA backup appliances will allow database restoration in a very short period of time.</td>
</tr>
<tr>
<td valign="top" align="left">The number of attacks here was high because no clear DR plan was defined.</td>
<td valign="top" align="left">Smart planning of backup and recovery processes can avoid such huge losses and recover within a day.</td>
</tr>
</tbody>
</table></table-wrap>
</sec>
<sec id="S3">
<title>Proposed model</title>
<p>First, it is necessary to disconnect the backup and recovery speed from the computer volume. Data storage systems, application software, and RMS manufacturers recommend using some tools that can be used to solve this problem. Snapshots allow you to back up and restore data in seconds with little or no impact on performance. This is done through sequence, while being able to control SRK, and should be part of its policy. Another solution may be to use various utility tools like Oracle Standby, DB2 HADR, and MS SQL Always On. All of these tools allow you to have a working copy of the production system, separated from the original, which can be deployed immediately. It allows you to work immediately after failures. The second is to make it possible to restore only the data you need. Our approach takes into account that when restoring a part of the data, there is no need to copy the entire system, we can restore the data we need at this time. This is achieved by the ability to quickly deploy or use existing systems that contain this data. As in the first case, the snapshot allows you to solve this problem (you can quickly open a snapshot on a neighboring server and extract the necessary data). It also includes continuous data protection technologies, for example, Oracle Standby with Flashback. They allow you to quickly deploy a working copy of your data in a timely manner.</p>
<p>If you need to get a logical volume, for example, a row or a database table, these tools greatly simplify the task, allowing you to restore the necessary data without restoring the entire copy. The third is to reduce the gap between the origin of data and its protection. This can be achieved in several ways, depending on the specifics of a particular case and the degree of importance of the data. For example, for less critical systems, the time interval for backups can be reduced to a few hours. In this case, we use snapshots. They can act as a restore point that can be done once per hour. Some modern arrays handle these processes very well and can store large numbers of system snapshots. This is a great way out of a situation where you need to step back for a while. For more critical systems, there may be no time interval, and data must be protected continuously. There are many solutions of this class, for example, Oracle Standby with Flash Back, which allows you to roll back the database for a while by recording all changes. You can use Oracle ZDLRA PAK, which will receive almost synchronously all changes in database, or general purpose software and hardware systems. They record all changes and allow you to restore to any point in time. Regular backups can be an indispensable tool in the event of major disasters or the need to recover data from long ago. However, in the present situation, it is only a reserve parachute, used at the last moment. The proposed model has the following important blocks (<xref ref-type="fig" rid="F1">Figure 1</xref>):</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption><p>Important blocks of the proposed model.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijscit-2023-33-g001.tif"/>
</fig>
<list list-type="simple">
<list-item>
<label>&#x2022;</label>
<p>Backup</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>Recovery</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>Content analysis</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>Contextual search</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>Mobile data access</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>Seamless integration with the cloud</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>Information security tasks</p>
</list-item>
</list>
<p>The fourth is to reduce hidden errors. There is only one way to make sure that the backup is working correctly &#x2013; try to restore it. This is the most perfect and rarely used method by our clients. But we offer a way out of this situation. First, have easily recoverable instances of computers. This is again a story about snapshot and standby systems that can be quickly deployed and tested. It takes incomparably less time and effort than &#x201C;unpacking&#x201D; an entire backup. Of course, this does not always help; but in case of an emergency, at least it gives a little more confidence that the data can be recovered by these means. Second, some SRCs allow automated testing. At a specific point in time on a schedule, you can run virtual machines in an isolated environment and use predefined algorithms to verify that data have actually been retrieved, that the application is available, that it is consistent, and that it is responding to the necessary requests. In this way, administrators can be relieved of long, routine tasks. A centralized backup system has a multi-layered architecture, which includes the following, as shown in <xref ref-type="fig" rid="F2">Figure 2</xref>:</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption><p>Components of centralized backup system.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijscit-2023-33-g002.tif"/>
</fig>
<list list-type="simple">
<list-item>
<label>&#x2022;</label>
<p>A backup management server that can also incorporate the functions of a data copy server.</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>One or more data copy servers to which backup devices are attached.</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>Client computers that have backup agent programs installed.</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>Backup System Administrator Console.</p>
</list-item>
</list>
<p>The fifth was the backup system&#x2019;s transparency. The described integrated approach involves creating a complex system using different technologies from different manufacturers. The task of making this system actually work, with further changes and scaling possible, is not trivial and can be tackled in two ways:</p>
<list list-type="simple">
<list-item>
<label>&#x2022;</label>
<p>The first way is that the customer is self-sufficient and wants to implement the system. Here, as a coordinator, we help create all the necessary processes, create regulatory frameworks, create all the necessary instructions and plans so that the customer&#x2019;s IT department can develop, and run the system in the right direction more independently. Then, transfer all this practical basis of terms and tasks to the customer in the form of functional organization of business processes.</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>The second option is when the customer is not sure that the SRK system can be continuously maintained in a combat condition; the solution is to partially or fully outsource the system. We have clients who successfully use this service as both SLA requirements and our engagement levels as an IT outsourcer continue to increase.</p>
</list-item>
</list>
<p>Unfortunately, there is still no universal recipe for solving the problem of data recovery under the current conditions of constant system development and problems. Only a combination of the above solutions and a systematic approach will allow organizations to recover data at the point of business need. Backup systems ensure the continuity of business processes.</p>
</sec>
<sec id="S4" sec-type="results|discussion">
<title>Results and discussion</title>
<p>The proposed database monitoring method (DMM) was compared with the existing storage backup and recovery strategy (SBRS), Distributed Data Backup and Recovery Method (DDBRM), Automation of Disaster Recovery and Security (ADRS), and control and communication management (CCM)</p>
<sec id="S4.SS1">
<title>Data backup management</title>
<p>Events may have undesirable consequences for the IT infrastructure and business in general; for example, a fire in a building, the breakthrough of the central heating battery in the server room, or casual theft of equipment and components. One of the ways to avoid data loss in such situations is to store backups in a location away from the central area of the server equipment. The comparison of data backup management is shown in <xref ref-type="fig" rid="F3">Figure 3</xref>.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption><p>Comparison of data backup management.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijscit-2023-33-g003.tif"/>
</fig>
</sec>
<sec id="S4.SS2">
<title>Off-server copy management</title>
<p>Providing a quick way to access the data needed for recovery is essential. The method described is off-site (in other words, keeping copies off-site). Two methods are used to organize this process. It has been writing data to removable media and physically moving it. In this case, you need to take care of the means to provide the press quickly in case of failure. The comparison of off-server copy management is shown in <xref ref-type="fig" rid="F4">Figure 4</xref>.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption><p>Comparison of off-server copy management.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijscit-2023-33-g004.tif"/>
</fig>
</sec>
<sec id="S4.SS3">
<title>Storage device management</title>
<p>The advantage of this method is the ability to organize without difficulty. The downside is the difficulty of retrieving the media, the need to transfer the information to storage, and the risk of damaging the media in transit. They are copying data to another location over a network channel. The comparison of storage device management is shown in <xref ref-type="fig" rid="F5">Figure 5</xref>.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption><p>Comparison of storage device management.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijscit-2023-33-g005.tif"/>
</fig>
</sec>
<sec id="S4.SS4">
<title>Server-less copy management</title>
<p>This method uses a VPN tunnel over the Internet. The advantage is that there is no need to transport the information somewhere; the disadvantage is the need to use a sufficiently wide channel (as a rule, it is costly) and protect the transmitted data (e.g., using the same VPN). Compression algorithms or deductive technology can significantly reduce the difficulty in converting large amounts of data. The comparison of server-less copy management is shown in <xref ref-type="fig" rid="F6">Figure 6</xref>.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption><p>Comparison of server-less copy management.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijscit-2023-33-g006.tif"/>
</fig>
</sec>
<sec id="S4.SS5">
<title>Data copy management</title>
<p>Separately, security measures should be taken when organizing data storage. First, it is necessary to ensure that the data carriers are in a protected area and that measures are in place to prevent unauthorized persons from reading the data, for example, by using an encryption system, entering a non-disclosure agreement, and so on. The comparison of data copy management is shown in <xref ref-type="fig" rid="F7">Figure 7</xref>.</p>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption><p>Comparison of data copy management.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijscit-2023-33-g007.tif"/>
</fig>
<p>If removable media is involved, the data on it must also be encrypted. In this case, the marking system should not help the attacker analyze the data. It is necessary to use a faceless numbering scheme to indicate the carriers of the names of the changed files.</p>
</sec>
</sec>
<sec id="S5" sec-type="conclusion">
<title>Conclusion</title>
<p>To automate backup processes, special software is used that controls the process of creating backups and the recovery process and allows you to work with various data carriers, including tape devices. What data should be stored, where, and on which bandwidth? Additional features of centralized backup software allow you to restore individual characters and database tables without restoring the entire volume of data. Writing backups to tape allows you to organize remote storage of backups and the protection of critical data in the event of a disaster. Using tape media to store archival copies allows data to be read 50 years after it was written. It will only be effective if done regularly. If data change frequently, replication should also be frequent. Therefore, rather than copying data manually, many prefer to use specialized software to automate this process. Any computer has many risks that can lead to hardware failure and loss of important data. In the business sector, this is even worse because the loss of business data results in huge losses and lost customers. When choosing a backup program, it wants to make sure that you can easily restore the data it wants.</p>
</sec>
</body>
<back>
<ref-list>
<title>References</title>
<ref id="B1"><label>1.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Adhikari</surname> <given-names>N</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Kiruthiga</surname> <given-names>T</given-names></name></person-group>. <article-title>The artificially intelligent switching framework for terminal access provides smart routing in modern computer networks.</article-title> <source><italic>BOHR Int J Smart Comput Inf Technol.</italic></source> <volume>3</volume>:<fpage>45</fpage>&#x2013;<lpage>50</lpage>. <pub-id pub-id-type="doi">10.54646/BIJSCIT.18</pub-id></citation></ref>
<ref id="B2"><label>2.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname> <given-names>Y</given-names></name> <name><surname>Xu</surname> <given-names>C</given-names></name> <name><surname>Muntean</surname> <given-names>GM</given-names></name></person-group>. <article-title>A novel distributed data backup and recovery method for software defined-WAN controllers.</article-title> <source><italic>Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM).</italic></source> <publisher-loc>Madrid</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2021</year>). p. <fpage>01</fpage>&#x2013;<lpage>06</lpage>. <pub-id pub-id-type="doi">10.1109/GLOBECOM46510.2021.9685291</pub-id></citation></ref>
<ref id="B3"><label>3.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gopi</surname> <given-names>B</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Gowri</surname> <given-names>J</given-names></name> <name><surname>Kiruthiga</surname> <given-names>T</given-names></name></person-group>. <article-title>The moment probability and impacts monitoring for electron cloud behavior of electronic computers by using quantum deep learning model.</article-title> <source><italic>Neuroquantology.</italic></source> (<year>2022</year>) <volume>20</volume>:<fpage>6088</fpage>&#x2013;<lpage>100</lpage>.</citation></ref>
<ref id="B4"><label>4.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>Q</given-names></name></person-group>. <article-title>Cloud data backup and recovery method based on the DELTA compression algorithm.</article-title> <source><italic>Proceedings of the 2021 IEEE International Conference on Industrial Application of Artificial Intelligence (IAAI).</italic></source> <publisher-loc>Harbin</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2021</year>). p. <fpage>183</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1109/IAAI54625.2021.9699943</pub-id></citation></ref>
<ref id="B5"><label>5.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>The topology configuration of protocol-based local networks in high speed communication networks.</article-title> <source><italic>Multidisciplinary Approach Res.</italic></source> (<year>2022</year>) <volume>15</volume>:<fpage>78</fpage>&#x2013;<lpage>83</lpage>.</citation></ref>
<ref id="B6"><label>6.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yao</surname> <given-names>L</given-names></name></person-group>. <article-title>Feasibility study report on cloud technology of high-performance self-service database.</article-title> In: <person-group person-group-type="editor"><name><surname>Hung</surname> <given-names>JC</given-names></name> <name><surname>Chang</surname> <given-names>J</given-names></name> <name><surname>Pei</surname> <given-names>Y</given-names></name> <name><surname>Wu</surname> <given-names>W</given-names></name></person-group> <role>editors</role>. <source><italic>Innovative Computing. Lecture Notes in Electrical Engineering.</italic></source> <publisher-loc>Singapore</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2022</year>). p. <fpage>1315</fpage>&#x2013;<lpage>23</lpage>. <pub-id pub-id-type="doi">10.1007/978-981-16-4258-6_160</pub-id></citation></ref>
<ref id="B7"><label>7.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ramesh</surname> <given-names>G</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Aravindarajan</surname> <given-names>V</given-names></name></person-group>. <article-title>The performance evolution of antivirus security systems in ultra dense cloud server using intelligent deep learning.</article-title> <source><italic>BOHR Int J Comput Intellig Commun Netw.</italic></source> (<year>2022</year>) <volume>1</volume>:<fpage>15</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.54646/bijcicn.004</pub-id></citation></ref>
<ref id="B8"><label>8.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jin</surname> <given-names>D</given-names></name> <name><surname>Wang</surname> <given-names>Q</given-names></name></person-group>. <article-title>CDP backup and recovery method for ensuring database consistency.</article-title> <source><italic>Proceedings of the 2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA).</italic></source> <publisher-loc>Shenyang</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2021</year>). p. <fpage>722</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1109/ICPECA51329.2021.9362541</pub-id></citation></ref>
<ref id="B9"><label>9.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ramesh</surname> <given-names>G</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Gowri</surname> <given-names>J</given-names></name> <name><surname>Ajay Mathew</surname></name></person-group>. <article-title>The management and reduction of digital noise in video image processing by using transmission based noise elimination scheme.</article-title> <source><italic>ICTACT J Image Video Process.</italic></source> (<year>2022</year>) <volume>13</volume>:<fpage>2797</fpage>&#x2013;<lpage>801</lpage>.</citation></ref>
<ref id="B10"><label>10.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Adee</surname> <given-names>R</given-names></name> <name><surname>Mouratidis</surname> <given-names>H</given-names></name></person-group>. <article-title>A dynamic four-step data security model for data in cloud computing based on cryptography and steganography.</article-title> <source><italic>Sensors.</italic></source> (<year>2022</year>) <volume>22</volume>:<issue>1109</issue>. <pub-id pub-id-type="doi">10.3390/s22031109</pub-id></citation></ref>
<ref id="B11"><label>11.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jasmine</surname> <given-names>J</given-names></name> <name><surname>Yuvaraj</surname> <given-names>N</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>DSQLR-A distributed scheduling and QoS localized routing scheme for wireless sensor network.</article-title> <source><italic>Recent Trends Inf Technol Commun Industry 4.0.</italic></source> (<year>2022</year>) <volume>1</volume>:<fpage>47</fpage>&#x2013;<lpage>60</lpage>.</citation></ref>
<ref id="B12"><label>12.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jing</surname> <given-names>F</given-names></name> <name><surname>Huang</surname> <given-names>D</given-names></name> <name><surname>Wang</surname> <given-names>Y</given-names></name> <name><surname>Lv</surname> <given-names>X</given-names></name> <name><surname>Du</surname> <given-names>Q</given-names></name></person-group>. <article-title>Remote sensing data backup and recovery system for power industry.</article-title> <source><italic>Proceedings of the 2021 IEEE Intl Conf on Parallel &#x0026; Distributed Processing with Applications, Big Data &#x0026; Cloud Computing, Sustainable Computing &#x0026; Communications, Social Computing &#x0026; Networking (ISPA/BDCloud/SocialCom/SustainCom).</italic></source> <publisher-loc>New York, NY</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2021</year>). p. <fpage>1717</fpage>&#x2013;<lpage>23</lpage>. <pub-id pub-id-type="doi">10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00231</pub-id></citation></ref>
<ref id="B13"><label>13.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Adhikari</surname> <given-names>N</given-names></name> <name><surname>Joshi</surname> <given-names>SS</given-names></name> <name><surname>Saxena</surname> <given-names>P</given-names></name> <name><surname>Sharma</surname> <given-names>A</given-names></name></person-group>. <article-title>The deep DNA machine learning model to classify the tumor genome of patients with tumor sequencing.</article-title> <source><italic>Int J Health Sci.</italic></source> (<year>2022</year>) <volume>6</volume>:<fpage>9364</fpage>&#x2013;<lpage>75</lpage>. <pub-id pub-id-type="doi">10.53730/ijhs.v6nS5.10767</pub-id></citation></ref>
<ref id="B14"><label>14.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ravimaran</surname> <given-names>S</given-names></name> <name><surname>Sathish</surname> <given-names>A</given-names></name></person-group>. <article-title>Robust security with strong authentication in mobile cloud computing based on trefoil congruity framework.</article-title> <source><italic>J Organ End User Comput.</italic></source> (<year>2021</year>) <volume>33</volume>:<fpage>1</fpage>&#x2013;<lpage>28</lpage>. <pub-id pub-id-type="doi">10.4018/JOEUC.20211101.oa11</pub-id></citation></ref>
<ref id="B15"><label>15.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Ramkumar</surname> <given-names>M</given-names></name> <name><surname>Kiruthiga</surname> <given-names>T</given-names></name> <name><surname>Sharan Pravin</surname> <given-names>R</given-names></name></person-group>. <article-title>SVPA - the segmentation based visual processing algorithm (SVPA) for illustration enhancements in digital video processing (DVP).</article-title> <source><italic>ICTACT J Image Video Process.</italic></source> (<year>2022</year>) <volume>12</volume>:<fpage>2669</fpage>&#x2013;<lpage>73</lpage>.</citation></ref>
<ref id="B16"><label>16.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Smara</surname> <given-names>M</given-names></name> <name><surname>Aliouat</surname> <given-names>M</given-names></name> <name><surname>Harous</surname> <given-names>S</given-names></name> <name><surname>Pathan</surname> <given-names>ASK</given-names></name></person-group>. <article-title>Robustness improvement of component-based cloud computing systems.</article-title> <source><italic>J Super Comput.</italic></source> (<year>2022</year>) <volume>78</volume>:<fpage>4977</fpage>&#x2013;<lpage>5009</lpage>. <pub-id pub-id-type="doi">10.1007/s11227-021-04054-2</pub-id></citation></ref>
<ref id="B17"><label>17.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ramesh</surname> <given-names>G</given-names></name> <name><surname>Aravindarajan</surname> <given-names>V</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Kiruthiga</surname> <given-names>T</given-names></name> <name><surname>Vignesh</surname> <given-names>S</given-names></name></person-group>. <article-title>Estimation analysis of paralysis effects for human nervous system by using Neuro fuzzy logic controller.</article-title> <source><italic>Neuroquantology.</italic></source> (<year>2022</year>) <volume>20</volume>:<fpage>3195</fpage>&#x2013;<lpage>206</lpage>.</citation></ref>
<ref id="B18"><label>18.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ampera</surname> <given-names>D</given-names></name> <name><surname>Fibriasari</surname> <given-names>H</given-names></name></person-group>. <article-title>Implementation of cloud computing system in learning system development in engineering education study program.</article-title> <source><italic>Int J Educ Math Sci Technol.</italic></source> (<year>2021</year>) <volume>9</volume>:<fpage>728</fpage>&#x2013;<lpage>40</lpage>. <pub-id pub-id-type="doi">10.46328/ijemst.2114</pub-id></citation></ref>
<ref id="B19"><label>19.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Ramkumar</surname> <given-names>M</given-names></name> <name><surname>Kiruthiga</surname> <given-names>T</given-names></name> <name><surname>Sharanpravin</surname> <given-names>R</given-names></name></person-group>. <article-title>The role of integrated structured cabling system (ISCS) for reliable bandwidth optimization in high-speed communication network.</article-title> <source><italic>ICTACT J Commun Technol.</italic></source> (<year>2022</year>) <volume>13</volume>:<fpage>2635</fpage>&#x2013;<lpage>9</lpage>.</citation></ref>
<ref id="B20"><label>20.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jeslin</surname> <given-names>JG</given-names></name> <name><surname>Kumar</surname> <given-names>PM</given-names></name></person-group>. <article-title>Implementing an efficient data deduplication framework for cloud storage.</article-title> <source><italic>Indian J. Comput. Sci. Eng.</italic></source> (<year>2022</year>) <volume>13</volume>:<fpage>136</fpage>&#x2013;<lpage>44</lpage>. <pub-id pub-id-type="doi">10.21817/indjcse/2022/v13i1/221301046</pub-id></citation></ref>
<ref id="B21"><label>21.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Rex</surname> <given-names>MJ</given-names></name> <name><surname>Kiruthiga</surname> <given-names>T</given-names></name> <name><surname>Rajan</surname> <given-names>VA</given-names></name></person-group>. <article-title>FPSMM: Fuzzy probabilistic based semi morkov model among the sensor nodes for realtime applications.</article-title> <source><italic>Proceedings of the 2017 International Conference on Intelligent Sustainable Systems (ICISS).</italic></source> <publisher-loc>Palladam</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2017</year>). p. <fpage>442</fpage>&#x2013;<lpage>6</lpage>. <pub-id pub-id-type="doi">10.1109/ISS1.2017.8389391</pub-id></citation></ref>
<ref id="B22"><label>22.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhao</surname> <given-names>J</given-names></name> <name><surname>Zhang</surname> <given-names>L</given-names></name> <name><surname>Zhao</surname> <given-names>Y</given-names></name></person-group>. <article-title>Informatization of accounting systems in small-and medium-sized enterprises based on artificial intelligence-enabled cloud computing.</article-title> <source><italic>Comput Intellig Neurosci.</italic></source> (<year>2022</year>) <volume>2022</volume>. <pub-id pub-id-type="doi">10.1155/2022/6089195</pub-id></citation></ref>
<ref id="B23"><label>23.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Raja</surname> <given-names>S</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Venkatasubramanian</surname> <given-names>S</given-names></name> <name><surname>Jayalakshmi</surname> <given-names>M</given-names></name> <name><surname>Rajeswari</surname> <given-names>N</given-names></name> <name><surname>Olaiya</surname> <given-names>NG</given-names></name><etal/></person-group> <article-title>OCHSA: Designing energy-efficient lifetime-aware leisure degree adaptive routing protocol with optimal cluster head selection for 5G communication network disaster management.</article-title> <source><italic>Sci. Program.</italic></source> (<year>2022</year>) <volume>2022</volume>. <pub-id pub-id-type="doi">10.1155/2022/5424356</pub-id></citation></ref>
<ref id="B24"><label>24.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Shaik</surname> <given-names>V</given-names></name> <name><surname>Natarajan</surname> <given-names>K</given-names></name></person-group>. <article-title>Asynchronous method of oracle: A cost-effective and reliable model for cloud migration using incremental backups.</article-title> <source><italic>Data Science and Security.</italic></source> <publisher-loc>Singapore</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2021</year>). p. <fpage>417</fpage>&#x2013;<lpage>27</lpage>. <pub-id pub-id-type="doi">10.1007/978-981-16-4486-3_47</pub-id></citation></ref>
<ref id="B25"><label>25.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ramesh</surname> <given-names>G</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Rajkumar</surname> <given-names>K</given-names></name></person-group>. <article-title>The smart construction for image preprocessing of mobile robotic systems using neuro fuzzy logical system approach.</article-title> <source><italic>Neuroquantology.</italic></source> (<year>2022</year>) <volume>20</volume>:<fpage>6354</fpage>&#x2013;<lpage>67</lpage>.</citation></ref>
<ref id="B26"><label>26.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Belgacem</surname> <given-names>A</given-names></name></person-group>. <article-title>Dynamic resource allocation in cloud computing: Analysis and taxonomies.</article-title> <source><italic>Computing.</italic></source> (<year>2022</year>) <volume>104</volume>:<fpage>681</fpage>&#x2013;<lpage>710</lpage>. <pub-id pub-id-type="doi">10.1007/s00607-021-01045-2</pub-id></citation></ref>
<ref id="B27"><label>27.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gopi</surname> <given-names>B</given-names></name> <name><surname>Ramesh</surname> <given-names>G</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>An innovation for energy release of nuclear fusion at short distance dielectrics in semiconductor model.</article-title> <source><italic>ICTACT J Microelectron.</italic></source> (<year>2022</year>) <volume>8</volume>:<fpage>1430</fpage>&#x2013;<lpage>5</lpage>.</citation></ref>
<ref id="B28"><label>28.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhou</surname> <given-names>J</given-names></name> <name><surname>Zou</surname> <given-names>W</given-names></name></person-group>. <article-title>Construction and application of Wenhua education cloud based on Huawei FusionSphere.</article-title> <source><italic>Proceedings of the 2021 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA).</italic></source> <publisher-loc>Dalian</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2021</year>). p. <fpage>477</fpage>&#x2013;<lpage>81</lpage>. <pub-id pub-id-type="doi">10.1109/ICAICA52286.2021.9498210</pub-id></citation></ref>
<ref id="B29"><label>29.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>AICSA - an artificial intelligence cyber security algorithm for cooperative P2P file sharing in social networks.</article-title> <source><italic>ICTACT J Data Sci Mach Learn.</italic></source> (<year>2021</year>) <volume>3</volume>:<fpage>251</fpage>&#x2013;<lpage>3</lpage>.</citation></ref>
<ref id="B30"><label>30.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chang</surname> <given-names>D</given-names></name> <name><surname>Li</surname> <given-names>L</given-names></name> <name><surname>Chang</surname> <given-names>Y</given-names></name> <name><surname>Qiao</surname> <given-names>Z</given-names></name></person-group>. <article-title>Cloud computing storage backup and recovery strategy based on secure IoT and spark.</article-title> <source><italic>Mobile Inf Syst.</italic></source> (<year>2021</year>) <volume>2021</volume>:<issue>9505249</issue>. <pub-id pub-id-type="doi">10.1155/2021/9505249</pub-id></citation></ref>
<ref id="B31"><label>31.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Malik</surname> <given-names>JA</given-names></name> <name><surname>Adhikari</surname> <given-names>N</given-names></name> <name><surname>Joshi</surname> <given-names>SS</given-names></name> <name><surname>Bishnoi</surname> <given-names>P</given-names></name></person-group>. <article-title>IoT-TPMS: An innovation development of triangular patient monitoring system using medical internet of things.</article-title> <source><italic>Int J Health Sci.</italic></source> (<year>2022</year>) <volume>6</volume>:<fpage>9070</fpage>&#x2013;<lpage>84</lpage>. <pub-id pub-id-type="doi">10.53730/ijhs.v6nS5.10765</pub-id></citation></ref>
<ref id="B32"><label>32.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>F</given-names></name> <name><surname>Wang</surname> <given-names>H</given-names></name> <name><surname>Xue</surname> <given-names>L</given-names></name></person-group>. <article-title>Research on data security in big data cloud computing environment.</article-title> <source><italic>Proceedings of the 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).</italic></source> (<volume>Vol. 5</volume>), <publisher-loc>Chongqing</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2021</year>). p. <fpage>1446</fpage>&#x2013;<lpage>50</lpage>. <pub-id pub-id-type="doi">10.1109/IAEAC50856.2021.9391025</pub-id></citation></ref>
<ref id="B33"><label>33.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gopi</surname> <given-names>B</given-names></name> <name><surname>Ramesh</surname> <given-names>G</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>The fuzzy logical controller based energy storage and conservation model to achieve maximum energy efficiency in modern 5g communication.</article-title> <source><italic>ICTACT J Commun Technol.</italic></source> (<year>2022</year>) <volume>13</volume>:<fpage>2774</fpage>&#x2013;<lpage>9</lpage>.</citation></ref>
<ref id="B34"><label>34.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tiwari</surname> <given-names>PK</given-names></name> <name><surname>Pandey</surname> <given-names>SK</given-names></name> <name><surname>Thamba Meshach</surname> <given-names>W</given-names></name> <name><surname>Parashar</surname> <given-names>J</given-names></name> <name><surname>Kumar</surname> <given-names>A</given-names></name> <name><surname>Altuwairiqi</surname> <given-names>M</given-names></name><etal/></person-group> <article-title>Improved data security in cloud environment for test automation framework and access control for industry 4.0.</article-title> <source><italic>Wireless Commun Mobile Comput.</italic></source> (<year>2022</year>) <volume>2022</volume>. <pub-id pub-id-type="doi">10.1155/2022/3242092</pub-id></citation></ref>
<ref id="B35"><label>35.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sekar</surname> <given-names>G</given-names></name> <name><surname>Sivakumar</surname> <given-names>C</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>NMLA: The smart detection of motor neuron disease and analyze the health impacts with neuro machine learning model.</article-title> <source><italic>Neuroquantology.</italic></source> (<year>2022</year>) <volume>20</volume>:<fpage>892</fpage>&#x2013;<lpage>9</lpage>.</citation></ref>
<ref id="B36"><label>36.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Peng</surname> <given-names>X</given-names></name> <name><surname>Song</surname> <given-names>Y</given-names></name> <name><surname>Yuan</surname> <given-names>K</given-names></name> <name><surname>Guo</surname> <given-names>X</given-names></name> <name><surname>Lu</surname> <given-names>Z</given-names></name> <name><surname>Liu</surname> <given-names>J</given-names></name></person-group>. <article-title>UCloudStack-A private cloud platform for lightweight delivery.</article-title> <source><italic>Proceedings of the 2022 IEEE 7th International Conference on Smart Cloud (SmartCloud).</italic></source> <publisher-loc>Shanghai</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2022</year>). p. <fpage>184</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1109/SmartCloud55982.2022.00036</pub-id></citation></ref>
<ref id="B37"><label>37.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ramkumar</surname> <given-names>M</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Husna</surname> <given-names>T</given-names></name></person-group>. <article-title>CEA: Certification based encryption algorithm for enhanced data protection in social networks.</article-title> <source><italic>Fundamentals Appl Math Soft Comput.</italic></source> (<year>2022</year>) <volume>1</volume>:<fpage>161</fpage>&#x2013;<lpage>70</lpage>.</citation></ref>
<ref id="B38"><label>38.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Perri</surname> <given-names>D</given-names></name> <name><surname>Simonetti</surname> <given-names>M</given-names></name> <name><surname>Tasso</surname> <given-names>S</given-names></name> <name><surname>Ragni</surname> <given-names>F</given-names></name> <name><surname>Gervasi</surname> <given-names>O</given-names></name></person-group>. <article-title>Implementing a scalable and elastic computing environment based on cloud containers.</article-title> <source><italic>Proceedings of the International Conference on Computational Science and Its Applications.</italic></source> <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2021</year>). p. <fpage>676</fpage>&#x2013;<lpage>89</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-030-86653-2_49</pub-id></citation></ref>
<ref id="B39"><label>39.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Karthick</surname> <given-names>S</given-names></name></person-group>. <article-title>A smart design of a multi-dimensional antenna to enhance the maximum signal clutch to the allowable standards in 5G communication networks.</article-title> <source><italic>ICTACT J Microelectron.</italic></source> (<year>2022</year>) <volume>8</volume>:<fpage>1269</fpage>&#x2013;<lpage>74</lpage>.</citation></ref>
<ref id="B40"><label>40.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Shareef</surname> <given-names>TH</given-names></name> <name><surname>Sharif</surname> <given-names>KH</given-names></name> <name><surname>Rashid</surname> <given-names>BN</given-names></name></person-group>. <article-title>A survey of comparison different cloud database performance: SQL and NoSQL.</article-title> <source><italic>Passer J Basic Appl Sci.</italic></source> (<year>2022</year>) <volume>4</volume>:<fpage>45</fpage>&#x2013;<lpage>57</lpage>. <pub-id pub-id-type="doi">10.24271/psr.2022.301247.1104</pub-id></citation></ref>
<ref id="B41"><label>41.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>The control and communication management for ultra dense cloud system using fast Fourier algorithm.</article-title> <source><italic>ICTACT J Data Sci Mach Learn.</italic></source> (<year>2022</year>) <volume>3</volume>:<fpage>281</fpage>&#x2013;<lpage>4</lpage>.</citation></ref>
<ref id="B42"><label>42.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Subramani</surname> <given-names>R</given-names></name> <name><surname>Kaliappan</surname> <given-names>S</given-names></name> <name><surname>Arul</surname> <given-names>PV</given-names></name> <name><surname>Sekar</surname> <given-names>S</given-names></name> <name><surname>Poures</surname> <given-names>MV</given-names></name> <name><surname>De Patil</surname> <given-names>PP</given-names></name><etal/></person-group> <article-title>A recent trend on additive manufacturing sustainability with supply chain management concept, multicriteria decision making techniques.</article-title> <source><italic>Adv Mater Sci Eng.</italic></source> (<year>2022</year>) <volume>2022</volume>:<issue>9151839</issue>. <pub-id pub-id-type="doi">10.1155/2022/9151839</pub-id></citation></ref>
<ref id="B43"><label>43.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Shanmugasundaram</surname> <given-names>RN</given-names></name></person-group>. <article-title>Enhancements of resource management for device to device (D2D) communication: A review.</article-title> <source><italic>Proceedings of the 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC).</italic></source> <publisher-loc>Palladam</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2019</year>). p. <fpage>51</fpage>&#x2013;<lpage>5</lpage>. <pub-id pub-id-type="doi">10.1109/I-SMAC47947.2019.9032632</pub-id></citation></ref>
<ref id="B44"><label>44.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Raja</surname> <given-names>S</given-names></name> <name><surname>Rajan</surname> <given-names>AJ</given-names></name></person-group>. <article-title>A decision-making model for selection of the suitable FDM machine using fuzzy TOPSIS.</article-title> <source><italic>Math Probl Eng.</italic></source> (<year>2022</year>) <volume>2022</volume>:<issue>7653292</issue>. <pub-id pub-id-type="doi">10.1155/2022/7653292</pub-id></citation></ref>
<ref id="B45"><label>45.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ramesh</surname> <given-names>G</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Aravindarajan</surname> <given-names>V</given-names></name> <name><surname>Feny Thachil</surname></name></person-group>. <article-title>Eliminate the interference in 5g ultra-wide band communication antennas in cloud computing networks.</article-title> <source><italic>ICTACT J Microelectron.</italic></source> (<year>2022</year>) <volume>8</volume>:<fpage>1338</fpage>&#x2013;<lpage>44</lpage>.</citation></ref>
<ref id="B46"><label>46.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Raja</surname> <given-names>S</given-names></name> <name><surname>Rajan</surname> <given-names>AJ</given-names></name> <name><surname>Kumar</surname> <given-names>VP</given-names></name> <name><surname>Rajeswari</surname> <given-names>N</given-names></name> <name><surname>Girija</surname> <given-names>M</given-names></name> <name><surname>Modak</surname> <given-names>S</given-names></name><etal/></person-group> <article-title>Selection of additive manufacturing machine using analytical hierarchy process.</article-title> <source><italic>Sci. Program.</italic></source> (<year>2022</year>) <volume>2022</volume>:<issue>1596590</issue>. <pub-id pub-id-type="doi">10.1155/2022/1596590</pub-id></citation></ref>
<ref id="B47"><label>47.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gopi</surname> <given-names>B</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Gowri</surname> <given-names>J</given-names></name> <name><surname>Aravindarajan</surname> <given-names>V</given-names></name></person-group>. <article-title>The Identification of quantum effects in electronic devices based on charge transfer magnetic field model.</article-title> <source><italic>Neuroquantology.</italic></source> (<year>2022</year>) <volume>20</volume>:<fpage>5999</fpage>&#x2013;<lpage>6010</lpage>.</citation></ref>
<ref id="B48"><label>48.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Venkatasubramanian</surname> <given-names>S</given-names></name> <name><surname>Raja</surname> <given-names>S</given-names></name> <name><surname>Sumanth</surname> <given-names>V</given-names></name> <name><surname>Dwivedi</surname> <given-names>JN</given-names></name> <name><surname>Sathiaparkavi</surname> <given-names>J</given-names></name> <name><surname>Modak</surname> <given-names>S</given-names></name><etal/></person-group> <article-title>Fault diagnosis using data fusion with ensemble deep learning technique in IIoT.</article-title> <source><italic>Math Probl Eng.</italic></source> (<year>2022</year>) <volume>2022</volume>:<issue>1682874</issue>. <pub-id pub-id-type="doi">10.1155/2022/1682874</pub-id></citation></ref>
<ref id="B49"><label>49.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Vaniprabha</surname> <given-names>A</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Kiruthiga</surname> <given-names>T</given-names></name> <name><surname>Shah</surname> <given-names>KB</given-names></name></person-group>. <article-title>Examination of the effects of long-term COVID-19 impacts on patients with neurological disabilities using a neuro machine learning model.</article-title> <source><italic>BOHR Int J Neurol Neurosci.</italic></source> (<year>2022</year>) <volume>1</volume>:<fpage>21</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.54646/bijnn.003</pub-id></citation></ref>
<ref id="B50"><label>50.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Nasurudeen</surname> <given-names>TFK</given-names></name> <name><surname>Shukla</surname> <given-names>VK</given-names></name> <name><surname>Gupta</surname> <given-names>S</given-names></name></person-group>. <article-title>Automation of disaster recovery and security in cloud computing.</article-title> <source><italic>Proceedings of the 2021 International Conference on Communication information and Computing Technology (ICCICT).</italic></source> <publisher-loc>Mumbai</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2021</year>). p. <fpage>1</fpage>&#x2013;<lpage>6</lpage>.</citation></ref>
<ref id="B51"><label>51.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gopi</surname> <given-names>B</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Kiruthiga</surname> <given-names>T</given-names></name></person-group>. <article-title>An innovation in the development of a mobile radio model for a dual-band transceiver in wireless cellular communication.</article-title> <source><italic>BOHR Int J Comput Intellig Commun Netw.</italic></source> (<year>2022</year>) <volume>1</volume>:<fpage>20</fpage>&#x2013;<lpage>5</lpage>. <pub-id pub-id-type="doi">10.54646/bijcicn.005</pub-id></citation></ref>
<ref id="B52"><label>52.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Saravanakumar</surname> <given-names>K</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>Auto-theft prevention system for underwater sensor using lab view.</article-title> <source><italic>Int J Innov Res Comput Commun Eng.</italic></source> (<year>2016</year>) <volume>4</volume>:<fpage>1750</fpage>&#x2013;<lpage>5</lpage>.</citation></ref>
<ref id="B53"><label>53.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sutharasan</surname> <given-names>M</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>Design intelligence data gathering and incident response model for data security using honey pot system.</article-title> <source><italic>Int J Res Dev Technol.</italic></source> (<year>2016</year>) <volume>5</volume>:<fpage>310</fpage>&#x2013;<lpage>4</lpage>.</citation></ref>
</ref-list>
</back>
</article>
