Zobrazeno 1 - 10
of 13
pro vyhledávání: '"P. D. Sheba Kezia Malarchelvi"'
Publikováno v:
International Journal of Electrical and Power Engineering. 13:36-49
Publikováno v:
Applied Mathematics & Information Sciences. 13:223-229
Publikováno v:
Journal of Computational and Theoretical Nanoscience. 15:1018-1026
Publikováno v:
Multimedia Tools and Applications. 77:10329-10346
Long term research activities focus on the provision of fundamental understanding and easy deployment of multimedia services on the multimedia communication. The rapid growth of digital communication and electronic data exchange provides the intensiv
Publikováno v:
Journal of Computational and Theoretical Nanoscience. 14:2601-2611
Publikováno v:
ICCBDC
In this fast moving world, every industry is advanced by a new technological paradigm called Internet of Things (IoT). It offers interconnectivity between the digital and the real world which will swiftly transform the style of doing business. It ope
Publikováno v:
Advances in Computer and Computational Sciences ISBN: 9789811037696
Internet of Things (IoT) is a backboneless network. Because of the uni-directional link and mobility nature of the nodes, the network is dynamic. The nodes are self-organized and two nodes can transfer data directly when they are within the transmiss
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f38cf84ea177113ad4541b9f90b922be
https://doi.org/10.1007/978-981-10-3770-2_21
https://doi.org/10.1007/978-981-10-3770-2_21
Publikováno v:
International Journal of Computer Applications. 88:17-21
In today’s IT industry, the more sophisticated data storage is cloud storage. Cloud storage mainly helps Small and Medium scale Enterprises (SMEs) to reduce their investments and maintenance of storage servers. Most of SMEs are outsourcing their da
Publikováno v:
International Journal of Information and Computer Security. 11:1
Cloud provides storage for enterprises to store their data in virtual storage. Enterprises outsourced their data but security of data in cloud storage is not guaranteed. If anything wrong happens on the data, the users suspect the cloud storage provi
Publikováno v:
International Conference on Information Communication and Embedded Systems (ICICES2014).
Network security consists of provisions and policies adopted by network administrator to prevent unauthorized access of network accessible resources. Jamming can be viewed as a form of Denial-of-Service attack, whose goal is to prevent users from rec