Zobrazeno 1 - 10
of 11
pro vyhledávání: '"L. R. Deepthi"'
Publikováno v:
ICT Infrastructure and Computing ISBN: 9789811953309
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::47684375f01032e2161cde8cb0d83c9c
https://doi.org/10.1007/978-981-19-5331-6_4
https://doi.org/10.1007/978-981-19-5331-6_4
Autor:
Reshma S. Pillai, L. R. Deepthi
Publikováno v:
ICT Systems and Sustainability ISBN: 9789811952203
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::131dc03d321ba92e511e36f362498f6b
https://doi.org/10.1007/978-981-19-5221-0_36
https://doi.org/10.1007/978-981-19-5221-0_36
Autor:
P Radhika Dileep, L R Deepthi
Publikováno v:
2022 International Conference on Connected Systems & Intelligence (CSI).
Autor:
L. R. Deepthi, K Sivapriya
Publikováno v:
2020 5th International Conference on Communication and Electronics Systems (ICCES).
Passwords are as yet the prevailing path for user verification and system security while other validation techniques exist. So selecting a strong password is a challenging thing. Passwords are used in every walk of life like logging into a system, cr
Publikováno v:
2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184).
Air pollution is one of the biggest concerns India is facing today. It has been increased due to urbanisation and industrialisation. In this paper, the proposed model uses time series based forecasting for predicting air pollutant concentration. Stud
Autor:
L. R. Deepthi, Krishnappa RamKarthik, Namala Surya, M. Shiva Phaneendra Reddy, Menta Sai Vineeth
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811515170
Community detection in social networks is often thought of a challenged domain that has not been explored completely. In today’s digital world, it is forever laborious to make a relationship between people or objects. Community detection helps us t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::48f32c022e06e745c410e4f4f4493d49
https://doi.org/10.1007/978-981-15-1518-7_2
https://doi.org/10.1007/978-981-15-1518-7_2
Publikováno v:
2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT).
In the past few years, several security algorithms such as encryption and watermarking algorithms have been put forward in order to ensure the security of the digital image from attackers. Most of the encryption algorithm make use of relatively small
Publikováno v:
ICACCI
Steganography is a process of concealing the important information in a digital media which acts as a cover. A data concealing scheme in color images using both alpha and non-alpha channels is designed and implemented without decreasing the image qua
Autor:
L. R. Deepthi, S Sarath
Publikováno v:
2018 International Conference on Communication and Signal Processing (ICCSP).
Vehicular traffic is increasing rapidly in this world which is resulting in traffic congestion. The emergency vehicles such as ambulances, fire engines and police vehicles are given equal priority over other vehicles and hence get stuck up in this tr
Publikováno v:
ICACCI
In the age of IOT, as more and more devices are getting connected to the internet through wireless networks, a better security infrastructure is required to protect these devices from massive attacks. For long SSIDs and passwords have been used to au