Zobrazeno 1 - 10
of 12
pro vyhledávání: '"P. C. Senthil Mahesh"'
Autor:
P. C. Senthil Mahesh, K. Muthumanickam
Publikováno v:
Wireless Networks. 29:1671-1683
Autor:
P. C. Senthil Mahesh, S. Hemalatha
Publikováno v:
Wireless Personal Communications. 126:679-700
Publikováno v:
The Journal of Supercomputing.
Publikováno v:
ECS Transactions. 107:17323-17333
During the last two decades, technical advancements in data bases and query processing have replaced hard copy maintenance in government sectors, resulting in an increase in the use of software applications to simplify human tasks in a matter of seco
Publikováno v:
Multimedia Tools and Applications. 81:24399-24418
Autor:
P. C. Senthil Mahesh
Publikováno v:
International Journal of Advanced Trends in Computer Science and Engineering. 9:3887-3891
Autor:
Vamsidhar Enireddy, K. Somasundaram, P. C. Senthil Mahesh M, M. Ramkumar Prabhu, D. Vijendra Babu, Karthikeyan. C
Publikováno v:
2021 2nd International Conference on Smart Electronics and Communication (ICOSEC).
Cloud storage, in general, is a collection of Computer Technology resources provided to consumers over the internet on a leased basis. Cloud storage has several advantages, including simplicity, reliability, scalability, convergence, and cost savings
Autor:
P. C. Senthil Mahesh, K. Muthumanickam
Publikováno v:
Wireless Networks. 26:2537-2547
Advances in both telecommunications and Information technology have improved the way users do business online. Android, an open-source mobile operating system, is becoming an attractive target for cyber criminals to exploit due to its predefined perm
Autor:
K. Muthumanickam, P. C. Senthil Mahesh
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811514197
Recently Android based smart phones become an attractive gadget for malevolent attacks. Executing malicious payload in the background without a user’s consent exercises huge amount of battery power and also causes immense heat. As a result, the lif
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2126be86b4d45210715c4afa8fbe5edf
https://doi.org/10.1007/978-981-15-1420-3_195
https://doi.org/10.1007/978-981-15-1420-3_195
Publikováno v:
Cluster Computing. 22:11591-11599
Accurately calculating the impact of existing change requests is vital for estimating the probability of fault occurrence in future change requests. For a new request like bug fixing, effectiveness in current change requests is required. In a real-ti