Zobrazeno 1 - 10
of 38
pro vyhledávání: '"V. Vennila"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-18 (2024)
Abstract Cloud computing technology offers flexible and expedient services that carry a variety of profits for both societies as well as individuals. De-duplication techniques were developed to minimize redundant data in the cloud storage. But, one o
Externí odkaz:
https://doaj.org/article/e69fa9361524460e84c65d5d834c6eaf
Publikováno v:
Cybernetics and Systems. :1-19
Publikováno v:
Computer Systems Science and Engineering. 40:779-793
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
A. Rajiv Kannan, V. Vennila
Publikováno v:
International Journal of Fuzzy Systems. 21:809-822
With the increasing availability of large amount of information and the benefits related to data processing, big data have gained large significance in recent years. With scalable nature of data, big data applications are processed using MapReduce pr
Publikováno v:
Journal of Tropical Forestry and Environment, Vol 4, Iss 1 (2014)
PAHs are a class of ubiquitous pollutants which consist of two or more fused benzene rings in various arrangements. A number of PAH compounds are known carcinogens and bioaccumulate and biomagnify. These compounds originate naturally as well as anthr
Externí odkaz:
https://doaj.org/article/4e2d53344ca640f4909ada5aeded6132
Publikováno v:
Materials Today: Proceedings.
Object detection is blooming area in computer vision that is maturing very quickly. Consistently, new algorithms/ models keep on outperforming the previous one. Most of the computer vision system will first collect the data regarding the object to be
Publikováno v:
Intelligent Computing and Communication ISBN: 9789811510830
Nowadays there is a chance for false mismatch of fingerprints due to elastic distorted. This is the main problem which wholly affects the fingerprint recognition techniques and applications mainly in false recognition techniques in duplication recogn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cd72c166702cd9d4e535b6c0591eb110
https://doi.org/10.1007/978-981-15-1084-7_62
https://doi.org/10.1007/978-981-15-1084-7_62
Autor:
V. Vennila, S. Umamaheswari
Publikováno v:
International Journal of Scientific Research in Computer Science, Engineering and Information Technology. :340-342
Cryptography comes from the Greek word kryptos which means hidden. The aim of our research is to provide secrecy for the data during transmission. In this we discuss about the qwerty cipher algorithm, its merits and demerits. The existing qwerty algo
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.