Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Sharvani G"'
Publikováno v:
Indian Journal of Computer Science and Engineering. 13:1466-1482
Publikováno v:
International Journal for Research in Applied Science and Engineering Technology. 10:568-573
There's enormous growth and fashionability of YouTube. It has all implicit to move billion of lives encyclopedically as the number of observers is growing day by day. Nearly billions of vids are watched on YouTube every single day, generating a huge
Autor:
Sharvani G. S., Ruquiya Anjum
Publikováno v:
2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N).
Publikováno v:
2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N).
Autor:
Sharvani G S, Gurunath Reddy
Publikováno v:
Regular issue. 10:170-172
Secure element is a microprocessor chip that provides a secure environment to store the data, execute the applications and communicate the data to external entities securely. As secure element provides a promising security feature, it is used in vari
Publikováno v:
SSRN Electronic Journal.
Publikováno v:
International Journal of Engineering and Advanced Technology. 9:6062-6066
Network based data representation has received widespread attention over the years. Data is oriented in graph format by aligning information as nodes and edges. Some of the predominant network cases include biological and social sciences. There is a
Designing an effective load balancing algorithm is difficult due to Dynamic topology of MANET. To address the problem, a load balancing routing algorithm namely Modified Termite Algorithm (MTA) has been developed based on ant’s food foraging behavi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::81ff1bb3d83300137d01c7ae1ae09add
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE).
to improve security and performance in the networks most of the enterprises deploy middlebox processing services. But these infrastructures are expensive, prone to failures and complex to manage. Hence it can be argued that middlebox can have a bette