<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Smart Hospital Setups with IoT-Enabled Connectivity of Artificial Intelligence System</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Vella</forename><surname>Satyanarayana</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of ECE</orgName>
								<orgName type="institution">Aditya Engineering College</orgName>
								<address>
									<settlement>Surampalem</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mahesh</forename><forename type="middle">Kumar</forename><surname>Singh</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of ECE</orgName>
								<orgName type="institution">Aditya Engineering College</orgName>
								<address>
									<settlement>Surampalem</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Robin</forename><surname>Varghese</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of ECE</orgName>
								<orgName type="institution">Aditya Engineering College</orgName>
								<address>
									<settlement>Surampalem</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Smart Hospital Setups with IoT-Enabled Connectivity of Artificial Intelligence System</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">CFDE9872A955EB23083DF10A3A311B71</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:47+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>IOT</term>
					<term>NB-IoT</term>
					<term>Smart grid</term>
					<term>Sensors</term>
					<term>Actuators</term>
					<term>Cloud platform</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The widespread of the internet of things (IoT) like sensors, actuators, wearable devices play a vital part in our daily lives as well as it will mainly help in hospitals also. It improves the quality of our life. It also improves the quality of medical care and it improves the facilities in hospitals. We need an architecture that connects all the intelligence of things that are made feasible in hospitals by Narrowband intelligence of things (NB-IoT). Here proposed the architecture that is connected by the intelligence of things based on NB IoT. IoT develops many various applications to support Wi-Fi and additional data gathering approaches which probably collects the data and transfers the information to a cloud stage. It processes to a secure connection that increases the users in the real-time interface. It implements the structure of the design and made a small demonstration design and it tests the results. It develops a smart grid in our lives.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>As we know there is rapid use of the internet, the IoT, and wearable devices. many hospitals have put it into implementation like they use mobile applications for a doctor appointment, online consultancies,3G blood pressure meter, smart ECGs and many more <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b2">3]</ref>. These devices are known as monitoring devices i.e. monitoring devices will send the information to A framework for short-and long-range wireless connections between autonomous entities. The support of modern technology like IoT and cloud computing it had created a smart grid around us. By using IoT it results in rapid digitalization across the hospitals. This technology follows up and connects with everyday objects such as sensors, actuators, and many more to the IoT and increases the efficient use of hospital resources. We had a network that will monitor the environment of the hospital with the NB-IoT <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b5">6]</ref>. For instance, there is a network architecture for tracking patients' behavior and environment in hospitals.</p><p>• we use the IoT smart gateway.</p><p>ACI <ref type="bibr">'23:</ref> Workshop on Advances in Computational Intelligence at ICAIDS 2023, December 29-30, 2023, Hyderabad, India ⋆ You can use this document as the template for preparing your publication. We recommend using the latest version of the ceurart style. * Corresponding author. † These authors contributed equally. Envelope vasece[underscore]vella@aec.edu.in (V. Satyanarayana); mahesh.092002.ece@gmail.com (M. K. Singh); 20A91A04O4@aec.edu.in (R. Varghese)</p><p>• It provides the data from terminals of smartphones using networks like 4G and 5G.</p><p>• NB-IoT is a smart protocol that works virtually everywhere.</p><p>Application scenarios: Tele-medicine monitoring: Patients who have been discharged from hospitals are required to undergo thorough monitoring in their homes. We are able to monitor or examine the patient's conditions, even when such situations are atypical, thanks to the use of wearable equipment <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>. Therefore, the device notifies the members of the family, allowing them to instantly make a trip to the physician <ref type="bibr" target="#b8">[9]</ref>. Intelligent parking: Intelligent parking means we can book our parking slot before going to the hospital. We can book parking slots using mobile apps it will lock our parking slot until we arrive when we leave the hospital it will auto-lock our slot using wireless communication <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11]</ref>. Access Control: Access control means giving control to the staff of the hospital so when they arrive it will give control and open the door using wearable devices. Other Applications: By using sensors wireless devices and other networks they will help us to generate many facilities in hospitals and Medicare hospitals. For example, water meters in hospitals <ref type="bibr" target="#b11">[12]</ref>. As the number of people in the world continues to rise, the healthcare sector is facing an increasing number of challenges. Following an intensive review of the relevant literature, it was found that the most prevalent issues that are related with healthcare include inadequate communication methods, insufficient staffing, poor patient flow, and lengthy hospital stays. These are the most common concerns. In point of fact, there is a necessity to address these concerns, and that is precisely what the objective of this effort is to do. When it comes to the internet of things (IoT), the most significant concerns for developers are not only the availability of resources but also the quality of security and the networking. The combination of this factor with the possibility of basic impediments results in a significant number of difficulties being encountered <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14]</ref>.</p><p>A smart city is one that designs and implements smart solutions in order to create an environment that is more conducive to positive outcomes. Smart cities are designed and implemented when populations rise. In order to ensure that we maximise our productivity, it is absolutely necessary that we have a solid healthcare sector. Because of this, people will be able to perform their jobs with a level of worry that is much reduced. The plan that T. Alizadeh developed for a smart city includes a patient record system that is integrated with a variety of healthcare applications and is equipped with Internet of Things (IoT) devices and machine learning (ML) protocols. Additionally, the plan calls for the integration of these technology components. The technology and architecture of remote health monitoring (RHM) include a patient record system that integrates well with the appropriate sensing mechanisms and collects structured and unstructured data for machine learning analysis <ref type="bibr" target="#b14">[15]</ref>.</p><p>RHM is also known as remote health monitoring. There is another name for RHM, which is remote health monitoring. In order to facilitate the transmission of data and signals across the various devices, systems, and models that make up the Internet of Things, communication protocols have emerged as an indispensable component. The individuals who live in smart cities are afforded a good quality of life as a result of their residence. Blockchain technology has the potential to be advantageous for smart cities because it enables the storage of transactions in a ledger that is not only safe but also open, shared, and immutable within the network. It is possible to categorise the technologies that constitute the communication systems of the smart city as follows: proximity wireless, personal area networks, wireless local area networks, wireless metropolitan area networks, and wireless wide-area network technologies. Numerous technologies, such as radio-frequency identification (RFID), Bluetooth, near field communication (NFC), 3G, 4G, 5G, Zigbee, and others, all comprise them. Among these technologies are also others <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref>.</p><p>Because of the rapid development of edge-assisted solutions in Internet of Things (IoT) networks, connected healthcare is becoming increasingly dependent on these solutions. This is because edge-assisted solutions are extremely useful. This is a reference to the systems that are in place to ensure that all of the various players in the healthcare business are connected to one another. Some of the cutting-edge technologies that are utilised by these systems include the Internet of Things (IoT), edge computing, and artificial intelligence (AI) <ref type="bibr" target="#b12">[13]</ref>. These technologies are utilised in order to change conventional health care systems into intelligent systems that are more effective, appropriate, and individualised. On the other hand, such systems are subject to a significant number of restrictions and require innovative regulations to be implemented. Fog computing is transformed into edge computing by the process of moving computation and processing closer to the data sources and end-users <ref type="bibr" target="#b17">[18]</ref>. Edge computing has the ability to reduce latency, bandwidth utilisation, and energy consumption <ref type="bibr" target="#b18">[19]</ref> expenses. Fog computing is also known as fog computing. To the best of our knowledge, there is no research that is both methodological and systematic, and that examines the studies that have already been conducted while taking into consideration a wide range of factors that are significant and relevant <ref type="bibr" target="#b19">[20]</ref>. Within the scope of this survey, the objective is to investigate the most recent research that has been carried out in this particular field. After completing an in-depth examination of a significant number of papers that deal to this topic, we have categorised them into two basic taxonomies: approaches that are process-centric and procedures that are patient-centric. In addition, key issues, such as the data sets that are readily available, as well as parameters like as accuracy, mobility, and data rates, are discussed and studied <ref type="bibr" target="#b20">[21,</ref><ref type="bibr" target="#b21">22,</ref><ref type="bibr" target="#b22">23,</ref><ref type="bibr" target="#b23">24]</ref>. Our goal is to bridge the gap between edge computing and linked healthcare solutions by participating in a discussion of the difficulties that may arise in the future and by conducting an evaluation of the trends that may emerge in the following years <ref type="bibr" target="#b14">[15]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head><p>In this paper, we are discussing the usage of IoT in hospitals for solving or detecting problems in hospitals. In hospitals, there is excessive usage of electricity so using Arduino board equipped with micro-controller which has low power utilization. In this paper, we discussed the construction and architecture with the combined implementation of IoT in smart hospitals.it provides a concrete application scheme and changes the existing hospital model into a smart hospital. In this research, the IoT and artificial intelligence are used to create a smart and safe framework for the hospital environment. With the assistance of AI, it controls the use of a wide variety of electronic components, including actuators, sensors, and more. The Internet of Things and artificial intelligence working together will bring further benefits to many different industries <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b24">25,</ref><ref type="bibr" target="#b17">18]</ref>. This paper contains information about the introduction of the system's design, architecture, and test results, both simple and complex. It develops an IoT system that is very much required in hospitals for various requirements <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b20">21]</ref>. The authors of this piece of writing presented the idea of a "smart community, " which is characterized by its use of the Internet of Things. In the subject of cyber-physical systems, the communal networks of interconnected and communicative electronic devices are referred to as "smart communities. " It encourages a scenario in which embedded sensors and actuators can self-configure and be controlled through the internet; this topic will be deliberated in greater details in the approaching units of this article <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b3">4]</ref>.</p><p>The use of tele-medicine and remote patient monitoring is becoming increasingly significant as a means of avoiding physical contact with patients. The Internet of Things (IoT) and the technologies that are connected to it, such as Artificial Intelligence (AI), Machine Learning (ML), Blockchain technology, and Cloud Computing, are the resources that make this a reality. Due to the fact that the Internet of Things (IoT) generates such a substantial amount of data in a wide range of forms, there is a substantial demand for connection and streaming analytics. Because of this, the 5G technology and its applications have been taken into consideration. These applications include smart 5G connected ambulances and hospitals that are based on 5G technology. A further potential technology is long-range radio, which is becoming the technology of choice for Internet of Things networks all over the world, particularly in regions with inadequate network coverage <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b14">15]</ref>. This is due to the fact that long-range radio operates with a low amount of power and has the ability to transmit data over long distances at faster speeds. In view of the fact that there is a lack of suitable medical infrastructure all over the world, an evaluation of smart ventilators that are based on the Internet of Things has simultaneously been carried out. This is because there is a demand for qualified medical staff as well as ventilators in the modern medical field. A smart healthcare model design is suggested as a potential solution to the problem of Internet of Things (IoT) problems in the healthcare business at the conclusion of the paper. This model design is proposed as a potential solution. The module also includes a UVC Disinfection box, which would be of tremendous assistance in removing the chance of the virus infiltrating our homes. This is in account of the current state of events about the COVID-19 Pandemic, which is currently prevalent <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b15">16]</ref>.</p><p>As an additional point of interest, the rapid use of blockchain technology results in a significant contribution to the formation of a new ecosystem for digital smart cities. Therefore, the confluence of blockchain technology with artificial intelligence technology is revolutionising smart city infrastructures in order to establish sustainable ecosystems for Internet of Things applications. This is a result of the convergence of these two technologies. However, these technological innovations and advancements in technology also generate opportunities and issues for the creation of applications that are sustainable for the Internet of Things. These opportunities and problems affect the development of applications. Blockchain technology and artificial intelligence are a singular force that is pushing technical innovation in applications that are both intelligent and sustainable for the Internet of Things <ref type="bibr" target="#b6">[7]</ref>.</p><p>The purpose of this essay is to study the confluence of these two technologies. During our chat, the primary focus was on the potential advantages of blockchain technology, which has the ability to support the creation and development of Internet of Things applications that are ecologically friendly. We were able to introduce a conceptual framework that is both clever and sustainable thanks to the conversation that served as the basis for our presentation. The processing and acquisition of the necessary information is accomplished by this framework through the utilisation of cloud computing, devices connected to the Internet of Things, and artificial intelligence. The system provides digital analytics and keeps the data in decentralised cloud repositories utilising blockchain technology. This is done with the intention of supporting a wide variety of applications. Furthermore, the layer-based design makes it possible to have a sustainable incentive structure, which may be of aid in the development of smart city applications that are secure and protected. This is because the design is built on layers <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref>. In this section, we discussed the enhanced solutions and provided a summary of the most essential components that may be utilised for the construction of a variety of systems that are based on blockchain technology and artificial intelligence. In addition, we discussed the issues that have not yet been resolved as well as our future research objectives, which may result in the creation of novel ideas and future standards for applications of the Internet of Things that are accountable for the environment <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b24">25]</ref>.</p><p>It is a conceptual paper we learn deficiencies of the IoT concept and how to analyze them and to discover the issue behind the lack of reasoning and IoT concept.it concludes the benefits of implementing a concept to solve real-world issues and solves a lot of issues and eases our daily routine. The introduction of the IoT technology is followed by a suggestion for the creation of a sensor system based on IoT gateways in this study <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>. It concludes that in order to achieve the information storage for sensor access, it has created an LAPD environment. This paper used the IoT to build a real-world scenario of smart hospital management. It seeks to describe in detail the technologies underlying the IoT and the modeling of health care data for medical devices <ref type="bibr" target="#b7">[8]</ref>. As IoT is gaining momentum for many devices and wireless systems soon be adopting various IoT technologies. In IoT, every device is connected to the internet. It provides a brief survey to security threats extent change to different IoT devices <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Method and Methodology for Image Detection HELM-FSK</head><p>The NB-IoT standard is particularly designed for usage in low-power, stationary, heavily-loaded applications with little tolerance for delay. The communication delay cannot be tightly controlled with the NB-IoT protocol. The protocol was created with the network design in mind, which demands for a lot of access points and a low minimum power consumption requirement. In some use cases for smart hospitals, such as the intensive care unit where specific physiological sign data of patients with serious conditions must be uploaded in real time, requiring a low latency, this could be a concern shown in figure <ref type="figure" target="#fig_0">1</ref>. Using NB-IoT in smart hospital has a number of benefits, including the following:</p><p>• NB-IoT has the potential to facilitate billion of connection and link tens of thousands of user in a single locality. • It can effectively avoid the devices from accessing pseudo Bs.</p><p>• When compared to the already available mobile network, the link budget for NB-IoT is increased by about 20 dB</p><p>Here, classifying the authentic and the annoyance picture using a novel HELM-FSK has been proposed. The proposed techniques are the filter term with the median filter principle and the overlapping units are discussed before processing. The function vector is extracted • The clouds platform store and processed worldwide data with low latency requirements, and it uses big data analysis to maintain control. • A huge number of NB-IoT base station is deployed in the BS layer. These NB-IoT base stations must be furnished with routing, congestion control, traffic scheduling, and data encryption systems in order to guarantee the smooth integration and security of data transfers. • In the sensing layers, there are a significant number of terminals device that have NB-IoT modules embedded into them. Data collection and processing are two of the functions that these gadgets are capable of. attacked. The sensing layer needs to have security methods such as data encryption, data verification, and access authentication in order to maintain the confidentiality and safety of the data. Two-factor authentication is required for access authentication, which must involve both the devices and the BS. • Because the edge server is located quite close to the terminal, the amount of time it takes for data to complete a round trip is relatively short, which significantly lowers the latency. The monitoring that takes place in intensive care settings, for example, has a high requirement for latency, and this can be of considerable help to that monitoring.</p><p>We have integrated the Internet of Things into our platform. The five levels that make up this system are the sensing layer, the forwarding layer, the connection layer, the data storage layer, and the service layer. Each succeeding layer now has a name that accurately describes the task it is responsible for carrying out. The sensing layer integrates support for a wide range of wireless Internet of Things protocols in order to gather information. Heterogeneous data from various devices will be treated uniformly at the forwarding layer before being delivered to the cloud over a secure connection at the connection layer. Once the information reaches the data storage layer, it will be permanently archived. This data is once again made available to the user through the user interface that the service layer offers shown in figure <ref type="figure" target="#fig_0">1</ref>.</p><p>In figure <ref type="figure" target="#fig_1">2</ref> shown that it links networks and smart sensors. "Smart" healthcare, "smart" housing, "smart" grids, and other fields employ the Internet of Things. A growing number of governments are developing "smart healthcare" pilot projects. Edge computing could help IoT-enabled healthcare systems secure equipment and patient data. IoT-enabled healthcare delivery systems also need edge computing. Edge computing offers low-latency, low-cost data services. The technology improves healthcare IoT devices' connectivity and processing speed. Authorization of IoT devices is required prior to data transmission in IoT-enabled healthcare systems. In order to swiftly process the authenticated data, it must be offloaded to powerful computers at the edge. With the help of the SDN controller, which can create complete network programmability, offloading to the Edge can be done in a planned manner. SDN's smarts are what meet the needs of Edge computing in terms of load balancing and allocating resources, while a lightweight authentication method safeguards the security of sensitive information. The SDN controller is in charge of handling data, ensuring that time-sensitive data is handled properly, orchestrating the Edge, and ensuring that data flow is both fast and secure.</p><p>processes patient data following authentication. Each Edge server includes a separate SDN controller for intelligent decision-making and load balancing. SDN-based edge computing improves collaboration and resource use by optimizing network design. The network's reaction time, packet delivery ratio, latency, throughput, and control overhead are improved. Three independent simulations were conducted to verify the suggested method's efficacy. Protecting patients' personal and medical data is one of our future goals. We suggest recording patterns in a dataset and using a machine-learning system to predict hostile network activity. Data encryption and decryption can begin after system configuration. Extensive testing has shown its effectiveness in encrypting and decrypting data at the sender and recipient.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion and Future Scope</head><p>Healthcare systems with IoT capabilities should use edge computing with software-defined networks for security. Simple authentication verifies IoT devices' legitimacy. The Edge server processes patient data following authentication. Each Edge server includes a separate SDN controller for intelligent decision-making and load balancing. SDN-based edge computing improves collaboration and resource use by optimizing network design. The network's reaction time, packet delivery ratio, latency, throughput, and control overhead are improved. Three independent simulations were conducted to verify the suggested method's efficacy. Protecting patients' personal and medical data is one of our future goals. We suggest recording data patterns in a dataset and using a machine-learning system to predict hostile network activity. Data encryption and decryption can begin after system configuration. Extensive testing has shown its effectiveness in encrypting and decrypting data at the sender and recipient.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Proposed NB-IoT standard</figDesc><graphic coords="6,186.14,84.19,223.00,225.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: NB-IoT access method</figDesc><graphic coords="7,186.14,84.19,223.00,202.50" type="bitmap" /></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Results and Discussion</head><p>In this section, we simulate our design for safe healthcare systems to test its performance in realworld settings. Here, the simulations are run on a computer. First, we'll go over the simulation and testing setup, describe some key performance measures, and analyze the simulation's output in light of these and other considerations. MATLAB was used to analyze the proposed system's robustness, and the resulting data was put into our model. The SDN controller, Edge Server, and authentication protocol were all executed in parallel, but on separate simulated threads. The Edge server thread is responsible for load balancing and resource efficiency, while the authentication protocol thread is in charge of ensuring system security. Among the responsibilities of the SDN controller thread is the periodic analysis of trending network parameters. These settings allow you to fine-tune edge-to-gateway communication, edge-toedge collaboration, and task transfer shown in table 1 and table 2. </p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Smart hospitals using internet of things (iot)</title>
		<author>
			<persName><forename type="first">P</forename><surname>Kanase</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gaikwad</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Research Journal of Engineering and Technology (IRJET)</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="1735" to="1737" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Architecture and plan of smart hospital based on internet of things (iot)</title>
		<author>
			<persName><forename type="first">K</forename><surname>Dhariwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mehta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. Res. J. Eng. Technol</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="1976" to="1980" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Smart and secure iot and ai integration framework for hospital environment</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Valanarasu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of ISMAC</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="172" to="179" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Analysis of factors affecting iot-based smart hospital design</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">Ç</forename><surname>Uslu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Okay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Dursun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Cloud Computing</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page">67</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Smart community: an internet of things application</title>
		<author>
			<persName><forename type="first">X</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Liang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Shen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Lin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications magazine</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="page" from="68" to="75" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Smart hospital based on internet of things</title>
		<author>
			<persName><forename type="first">L</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of networks</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page">1654</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Detecting plant diseases, quantifying and classifying digital image processing techniques</title>
		<author>
			<persName><forename type="first">G</forename><surname>Veerendra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Swaroop</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Dattu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">A</forename><surname>Jyothi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Materials Today: Proceedings</title>
		<imprint>
			<biblScope unit="volume">51</biblScope>
			<biblScope unit="page" from="837" to="841" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Recognition of plant&apos;s leaf infection by image processing approach</title>
		<author>
			<persName><forename type="first">U</forename><surname>Padma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Jagadish</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Materials Today</title>
		<imprint>
			<biblScope unit="volume">51</biblScope>
			<biblScope unit="page" from="914" to="917" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A text independent speaker identification system using ann, rnn, and cnn classification technique</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Multimedia Tools and Applications</title>
		<imprint>
			<biblScope unit="page" from="1" to="13" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Feature extraction and classification efficiency analysis using machine learning approach for speech signal</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Multimedia Tools and Applications</title>
		<imprint>
			<biblScope unit="page" from="1" to="16" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Towards the internet of agents: an analysis of the internet of things from the intelligence and autonomy perspective</title>
		<author>
			<persName><forename type="first">P</forename><surname>Pico-Valencia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Holgado-Terriza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Herrera-Sánchez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Sampietro</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ingeniería e Investigación</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="page" from="121" to="129" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">On the application of the internet of things in the field of medical and health care</title>
		<author>
			<persName><forename type="first">F</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Shen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE international conference on green computing and communications and IEEE Internet of Things and IEEE cyber, physical and social computing</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2013">2013. 2013</date>
			<biblScope unit="page" from="2053" to="2058" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Study of different types of smart sensors for iot application sensors</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">V</forename><surname>Mani Kiran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Jagadeesh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Babu</surname></persName>
		</author>
		<author>
			<persName><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of Second International Conference in Mechanical and Energy Technology: ICMET 2021</title>
				<meeting>Second International Conference in Mechanical and Energy Technology: ICMET 2021<address><addrLine>India</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="101" to="107" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Blockchain in iot and limitations</title>
		<author>
			<persName><forename type="first">V</forename><surname>Walia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Madaan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mohan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Gupta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sharma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Trust-Based Communication Systems for Internet of Things Applications</title>
				<imprint>
			<publisher>John Wiley &amp; Sons, Inc</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="17" to="27" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Speaker identification analysis based on long-term acoustic characteristics with minimal performance</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Manusha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Balaramakrishna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gamini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Electrical and Electronics Research</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="848" to="852" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Smart e-health gateway: Bringing intelligence to internet-of-things based ubiquitous healthcare systems</title>
		<author>
			<persName><forename type="first">A.-M</forename><surname>Rahmani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">K</forename><surname>Thanigaivelan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">N</forename><surname>Gia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Granados</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Negash</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Liljeberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Tenhunen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2015 12th annual IEEE consumer communications and networking conference (CCNC), IEEE</title>
				<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="826" to="834" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Madaan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sharma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">K</forename><surname>Sharma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kautish</surname></persName>
		</author>
		<title level="m">Trust-based communication systems for internet of things applications</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Local binary pattern symmetric centre feature extraction method for detection of image forgery</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Kalyan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kishore</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Artificial Intelligence and Data Science</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="89" to="100" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Energy consumption analysis of r-based machine learning algorithms for pandemic predictions</title>
		<author>
			<persName><forename type="first">S</forename><surname>Benedict</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Prodan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Advanced Informatics for Computing Research</title>
				<meeting><address><addrLine>Singapore Singapore</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="192" to="204" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Using convolution networks to remove stripes noise from infrared cloud images</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">Chandana</forename><surname>Sri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Deepika</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Radha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Artificial Intelligence and Data Science</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="530" to="539" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Cardiac surveillance system using by the modified kalman filter</title>
		<author>
			<persName><forename type="first">S</forename><surname>Urmila</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Artificial Intelligence and Data Science</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="112" to="122" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Suspicious human activity recognition for video surveillance system</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S B</forename><surname>Musa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Control, Instrumentation, Communication &amp; Computational Technologies ICCICCT-2014</title>
				<imprint>
			<publisher>IEEEXplore</publisher>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Yolov4 vs yolov5: Object detection on surveillance videos</title>
		<author>
			<persName><forename type="first">N</forename><surname>Mohod</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Madaan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Advanced Network Technologies and Intelligent Computing</title>
				<meeting><address><addrLine>Switzerland Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Nature</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="654" to="665" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Human detection in surveillance video using deep learning approach</title>
		<author>
			<persName><forename type="first">N</forename><surname>Mohod</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Madan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2023 6th International Conference on Information Systems and Computer Networks (ISCON), IEEE</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">A copy and move image forged classification by using hybrid neural networks</title>
		<author>
			<persName><forename type="first">K</forename><surname>Sushma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Satyanarayana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Artificial Intelligence and Data Science</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="101" to="111" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">E-gardener: building a plant caretaker robot using computer vision</title>
		<author>
			<persName><forename type="first">S</forename><surname>Chauhan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Madaan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2018 4th International Conference on Computing Sciences (ICCS), IEEE</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="137" to="142" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Multi lingual speaker recognition using artificial neural network</title>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shukla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tiwari</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Advances in Computational Intelligence</title>
		<imprint>
			<biblScope unit="page" from="1" to="9" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Multi lingual speaker identification on foreign languages using artificial neural network</title>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Kaur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Kaur</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Applications</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Adopting the internet of things technologies in health care systems</title>
		<author>
			<persName><forename type="first">I</forename><surname>Chiuchisan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H.-N</forename><surname>Costin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Geman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2014 international conference and exposition on electrical and power engineering (EPE)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="532" to="535" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
