Zobrazeno 1 - 10
of 17
pro vyhledávání: '"V. Anjana Devi"'
Publikováno v:
Franklin Open, Vol 8, Iss , Pp 100150- (2024)
Providing security to the Mobile Ad-hoc Network (MANET) integrated with the Internet of Things (IoT) is one of the most challenging and demanding tasks in improving the security of the network by detecting trust nodes in the path. High energy consump
Externí odkaz:
https://doaj.org/article/d11c8ac064a74c07908e18e61a6b1ce4
Publikováno v:
ICTACT Journal on Communication Technology, Vol 13, Iss 4, Pp 2815-2819 (2022)
An integer linear programming (ILP) model was developed with the intention of reducing the quantity of network spectrum resources while maintaining spectrum contiguity and spectrum continuity restrictions. The techniques that were just outlined have
Externí odkaz:
https://doaj.org/article/285483b1ecc74be09ca09abff15fa519
Autor:
Dhanasekaran S., V. Anjana Devi, S. Sankara Narayanan, Vijayakarthik P., Hariharasitaraman S., Rajasekaran S.
Publikováno v:
Webology. 19:3109-3118
Face Recognition is the one of the foremost emerging and interesting technology. In this fast-evolving generation, attendance is usually a problem among school community and so as business community. One among the foremost efficient solution for this
Publikováno v:
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI).
Publikováno v:
Emerging Trends in Computing and Expert Technology ISBN: 9783030321499
Investigating customer practices in online business organizations is a tedious activity and clustering algorithms are utilized for that reason. The items from organizations are sorted out as product tree where the interior hubs (aside from root hub)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6d31465d8dee7c6fbdd8b53dd7bfb2f4
https://doi.org/10.1007/978-3-030-32150-5_98
https://doi.org/10.1007/978-3-030-32150-5_98
Publikováno v:
Emerging Trends in Computing and Expert Technology ISBN: 9783030321499
Over the past decade, there have been massive developments in technology such as self-driving cars, crypto currencies, streaming services, voice assistants etc. In each of the listed breakthroughs, Cloud Computing was involved. Cloud computing has of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3fbb1ca3c9f3760a74dce5b52c66a986
https://doi.org/10.1007/978-3-030-32150-5_93
https://doi.org/10.1007/978-3-030-32150-5_93
Autor:
R. S. Bhuvaneswaran, V. Anjana Devi
Publikováno v:
International Journal of Network Security & Its Applications. 3:243-256
Mobile ad-hoc wireless networks (MANET) are a significant area of research with many applications. MANETs are more vulnerable to malicious attack. Authentication and encryption techniques can be used as the first line of defense for reducing the poss
Autor:
V. Anjana Devi, R. S. Bhuvaneswaran
Publikováno v:
Advances in Network Security and Applications ISBN: 9783642225390
Due to the development of in the field of computer networks, Mobile ad hoc network (MANET) has emerged as a technology to provide anywhere, anytime communication. Due to its deployment nature, MANETs are more vulnerable to malicious attack. Authentic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::151cbf3ea152b4258540b6abc62c4db5
https://doi.org/10.1007/978-3-642-22540-6_41
https://doi.org/10.1007/978-3-642-22540-6_41
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.