Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Vahiduddin Shariff"'
Autor:
S Phani Praveen, Veerapaneni Esther Jyothi, Chokka Anuradha, K VenuGopal, Vahiduddin Shariff, S Sindhura
Publikováno v:
International Journal of Image and Graphics.
Nowadays, in most countries, the most dangerous and life threatening infection is Chronic Kidney Disease (CKD). A progressive malfunctioning of the kidneys and less effectiveness of the kidney are considered CKD. CKD can be a life threatening disease
Publikováno v:
2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC).
Autor:
T N S Koti Mani Kumar, UnniKiran Jaladhi, Sri Krishna Chaitanya Rudraraju, Vahiduddin Shariff, Venkata Rami Reddy Ch, P A Harsha Vardhini
Publikováno v:
2022 International Mobile and Embedded Technology Conference (MECON).
Publikováno v:
International Journal of u- and e- Service, Science and Technology. 9:197-202
The extraction of similar features based on quality is called pattern discovery to the huge number of terms, phrases and noise. Identifying the better pattern discovery is the major problem to extract the accurate information from the text documents
Publikováno v:
International Journal of Control and Automation. 8:383-392
In this paper we proposed a recovery and replacement algorithm mainly used to increase or strengthen the life of a sensor node when they complete the battery power. In generally wireless sensor network consists of lot of sensor nodes, hundred(s) or t
Autor:
Vahiduddin Shariff, N.K. Sumanth
Publikováno v:
International Journal of Human and Smart Device Interaction. 1:11-16
Publikováno v:
Journal of Physics: Conference Series. 1228:012027
The wireless sensor network present all sensor hubs to produce an equal proportion of information packages in a WSN. The centers around a sink need to exchange a more noteworthy number of groups and will all in all fail miserably sooner than various
Publikováno v:
Scopus-Elsevier
Security is the one of the main point of focus in recent trends of computer science, as it has to determine the right people accessing the system and ones who are trying the bypassing it. IP spoofing is one of the prevalent attacks, where the attacke
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a528d6bcaef8f5e8f5fe517eed6dc1e5
http://www.scopus.com/inward/record.url?eid=2-s2.0-85045261141&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-85045261141&partnerID=MN8TOARS