Zobrazeno 1 - 10
of 18
pro vyhledávání: '"N. Pandeeswari"'
Autor:
T. Kavitha, N. Pandeeswari, R. Shobana, V.R. Vinothini, K. Sakthisudhan, A. Jeyam, A. Jasmine Gnana Malar
Publikováno v:
Measurement: Sensors, Vol 24, Iss , Pp 100563- (2022)
Intelligent Transportation System (ITS) holds an inevitable concern in road safety and efficient transportation. Data communication is enforced by wireless sensor nodes and is compatible with traffic monitoring and control capabilities. Congestion in
Externí odkaz:
https://doaj.org/article/acfd14333f7342c9b4a2d9922f9c7b41
Publikováno v:
EAI Endorsed Transactions on Energy Web, Vol 8, Iss 36 (2021)
INTRODUCTION: Cloud computing offers on-demand services, from which consumers can avail networked storage and computer resources. Due to the fact that cloud is accessed through internet, its data are prone to internal and external intrusions. Cloud I
Externí odkaz:
https://doaj.org/article/3a647aac25bb45ca99e31873453b4ac8
Autor:
K. Sivakumar, N. Pandeeswari
Publikováno v:
PLANT ARCHIVES. 21
A field experiment was carried out at department of agricultural microbiology, Annamalai University, Chidambaram, Tamil Nadu, India to evaluate the performance of tomato inoculated with Arbuscular Mycorrhiza (AM) and phosphate solubilizing bacteria (
Autor:
K. Sivakumar, N. Pandeeswari
Publikováno v:
PLANT ARCHIVES. 21
Salinity seriously constrains crop yield in irrigated agriculture throughout the world. Also, salinity is a serious threat to agriculture in arid and semi arid regions. Nearly 10 % of the world’s land surface can be classified as endangered by sali
Autor:
P. Ganeshkumar, N. Pandeeswari
Publikováno v:
International Journal of Fuzzy Systems. 18:367-378
Despite its continuous improvement, cloud computing system is still vulnerable to malicious activities. This has necessitated in constructing an anomaly detection component for discovering anomalies in cloud environment. In this paper, an anomaly det
Autor:
N. Pandeeswari, Ganesh Kumar
Publikováno v:
Mobile Networks and Applications. 21:494-505
Cloud computing affords lot of resources and computing facilities through Internet. Cloud systems attract many users with its desirable features. In spite of them, Cloud systems may experience severe security issues. Thus, it is essential to create a
Publikováno v:
2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS).
Extreme machine learning and its variants have shown good generalization performance and high leaning speed in many applications through its fast convergence. Despite the parallel and distributed ELM on MapReduce framework able to handle very large s
Publikováno v:
EAI Endorsed Transactions on Energy Web, Vol 8, Iss 36 (2021)
INTRODUCTION: Cloud computing offers on-demand services, from which consumers can avail networked storage and computer resources. Due to the fact that cloud is accessed through internet, its data are prone to internal and external intrusions. Cloud I
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.