Zobrazeno 1 - 10
of 13
pro vyhledávání: '"H. D. Phaneendra"'
Autor:
K. S., SUHAS1 suhasksgbd90@gmail.com, H. D., PHANEENDRA2 hdphanee@nie.ac.in
Publikováno v:
Journal of Pharmaceutical Negative Results. 2022 Special Issue, Vol. 13, p2024-2029. 6p.
Publikováno v:
International Journal for Research in Applied Science and Engineering Technology. 10:4822-4826
Hepatocellular Carcinoma (HCC), which accounts for 75% of instances of liver cancer, is the most prevalent form of the disease. Liver cancer, also known as hepatic cancer, is caused by abnormal cell development in the liver. It is challenging to dete
Publikováno v:
International Journal for Research in Applied Science and Engineering Technology. 10:3980-3983
Heart attack is among one of the deadliest of cardiovascular diseases. It happens as circulation or blood flow to heart muscle is interrupted, causing the heart muscle to damage or die. The essential reason for most heart assaults could be a blockage
Publikováno v:
Intelligent Data Communication Technologies and Internet of Things ISBN: 9789811676093
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7aba3ee4cab9999966a9d7fbd50d0738
https://doi.org/10.1007/978-981-16-7610-9_35
https://doi.org/10.1007/978-981-16-7610-9_35
Autor:
H. D. Phaneendra, Sanjay Kumar C K
Publikováno v:
2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC).
Automating the process of tumor detection and classification from brain MRI images is an exciting but difficult due to the difference in the appearance of the tumor tissues from person to person and in many cases, tumors look almost same as the norma
Publikováno v:
Inventive Computation Technologies ISBN: 9783030338459
The Run-time Reconfiguration is implemented in many of the applications like Home Automation, Structural Health Monitoring Systems, Intrusion Detection Systems, Fire Detection Systems etc. It is required to dynamically reconfigure the applications ba
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::75a28d508a93b30d2e4576daf6b17272
https://doi.org/10.1007/978-3-030-33846-6_30
https://doi.org/10.1007/978-3-030-33846-6_30
Autor:
H. D. Phaneendra, S. G. Srikantaswamy
Publikováno v:
International Journal of Network Security & Its Applications. 3:243-248
The process of exchanging information is called Communication. The basic Communication system involves transmitter, receiver and the channel. The data transmitted by the sender reaches receiver through the channel. The unauthorized parties (cracker,h
Autor:
M. S. Shivakumar, H. D. Phaneendra
Publikováno v:
International Journal of Quantum Information. :413-425
In a number of Internet applications, we need to search for objects to download them. This includes peer-to-peer (P2P) file sharing, grid computing and content distribution networks. Here the single object will be searched for in multiple servers. Th
Autor:
H. D. Phaneendra, S.G.Srikantaswamy
Publikováno v:
International Journal of Computer Applications. 29:34-36
is a basic process of exchanging information. Information security is a very important aspect now a day. The introduction of internet and distributed system made the information security issue more challenging and complex. Cryptography plays a crucia
Secured Communication involves Encryption process at the sending end and Decryption process at the receiving end of the communication system. Many Ciphers have been developed to provide data security . The efficiency of the Ciphers that are being use
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c5082d26e651b9f5a1952b66720b6783