Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Sowmyarani C N"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Veena Gadad, sowmyarani c n
Publikováno v:
Veena Gadad
Autor:
Veena Gadad, null Sowmyarani C. N.
Publikováno v:
Information Security and Privacy in Smart Devices ISBN: 9781668459911
Privacy preserving data publishing (PPDP) provides a suite of anonymization algorithms and tools that aim to balance the privacy of sensitive attributes and utility of the published data. In this domain, extensive work has been carried out to preserv
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4f059562d4cf2441e2821e98c548b35d
https://doi.org/10.4018/978-1-6684-5991-1.ch006
https://doi.org/10.4018/978-1-6684-5991-1.ch006
Autor:
Veena Gadad, Sowmyarani C N
Publikováno v:
International Journal of Advanced Computer Science and Applications. 14
Publikováno v:
International Journal of Engineering and Advanced Technology. 9:22-29
The deployment of a robot in a remote environment is a field of research that has huge applications. The robotic system must have the capability of sensing its surroundings and being aware of what it is around. We concluded two key tasks for this pur
Autor:
Gadad, Veena, Sowmyarani C N
There is a large requirement of the quality data that gets collected from various sources because the effective development, planning and research depend on the same. Huge amount of data gets collected and is stored in cloud or data centers. However,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5ae77095218829aaee55ed139a35ac80
Autor:
Shruthi N, Sowmyarani C N
Any number of gadgets can be associated with a Wi-Fi remotely. Anybody inside scope of the Wi-Fi can endeavour to get to the system. Due to this, Wi-Fi is progressively powerless against assaults. Consequently, client touchy data is at the danger of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::529ebb20a051199aede6d3d88ac5c362
Autor:
Manohar K, Dr. Sowmyarani C N
Security is one of the pillars of internet technology. Block chain is one of the newest technology which bundles a set of mechanisms such as distributed mechanism, password protection mechanism, decentralized mechanism as well as the scripted mechani
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::05d0e52eba764b7db0d518ee014be498
Publikováno v:
SN Computer Science; August 2024, Vol. 5 Issue: 6
Autor:
Veena Gadad, Sowmyarani C N
Publikováno v:
2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC).
In today’s world organizations outsource their data to cloud to enjoy number of advantages such as location independent data storage, ubiquitous data access and on demand high quality service. Data is collected by many of independent sources as mic