Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Srinivasan Nagaraj"'
Autor:
G. S. V. P. Raju, Srinivasan Nagaraj
Publikováno v:
International Journal of Security and Its Applications. 10:119-124
The Cryptographic systems need a secret key or a random number must be necessarily tied to an individual through a unique identifier. This unique identifier definitely might exist a globally user id or biometric data [2]. In this paper we combined bi
Publikováno v:
Bulletin of Electrical Engineering and Informatics. 4:67-72
In information security the following security parameters like, integrity , non repudiation and confidentiality , authentication must be satisfied. To avoid thievery of organization resources it needs be secured in more efficient way and there is alw
Publikováno v:
Procedia Computer Science. 48:276-281
The enlarged size of the internet and vast communication across it and also medical needs digital images require of security plays vital role. So different techniques are used to protect confidential image data from unauthorized access. In this paper
Autor:
Ramesh Manickam, Rajeshkumar Lakshmi Narasimhan, Srinivasan Nagarajan, Kumar Damodaran Vasanth, Balaji Devarajan
Publikováno v:
e-Polymers, Vol 22, Iss 1, Pp 898-916 (2022)
The current day target for material scientists and researchers is developing a wholesome material to satisfy the parameters such as durability, manufacturability, low cost, and lightweight. Extensive research studies are ongoing on the possible appli
Externí odkaz:
https://doaj.org/article/dfd16d09f30245f2a26b9754558e178a
Publikováno v:
ACM SIGSOFT Software Engineering Notes. 38:1-5
This paper presents a design method for optimizing software-testing efficiency by identifying the most critical path clusters in a program. This is done by the application of soft computing techniques, specifically genetic algorithms. We develop a ge
Publikováno v:
International Journal of Computer Applications. 8:18-22
The idea to use texture analysis in medical imaging has been considered since the early 1970s. However, the exciting evolution of both texture analysis algorithms and computer technology revived researchers' interest in applications for medical imagi
Publikováno v:
International Journal of Computer Applications. 8:31-35
The existing system consisted of files with literally no file security. The main issue of Reading or tapping data is secrecy and confidentiality. Confidentiality has always played an important role in diplomatic and military matters. Often Informatio
Publikováno v:
International Journal of Computer Applications. 8:26-30
world timely product delivery is much needed in order to satisfy the customer requirement as part of that well designed project management is placing important role. After being part of a new team that works with outsourcing team with dynamic allocat
Autor:
Srinivasan Nagaraj, G Narasinga rao
Publikováno v:
International Journal of Computer Applications. 3:32-38
In this paper, Mirror sites enable client requests to be serviced by any of a number of servers, reducing load at individual servers and dispersing network load. Typically a client requests service from a single mirror site. We suggest a way for the
Publikováno v:
International Journal of Computer Applications. 1:103-108
The availability of Low cost and high performance workstations connected by a high-speed network has made distributed computing an attractive and inexpensive mechanism to exploit parallelism at functional level present in the user or application prog