Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 79
1.
  • An Efficient Fuzzy Self-Cla... An Efficient Fuzzy Self-Classifying Clustering based Framework for Cloud Security
    Raja, Sivakami; Jaiganesh, M; Ramaiah, Saravanan International journal of computational intelligence systems, 2017/1, Volume: 10, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Though cloud computing has become an attractive technology due to its openness and services, it brings several security hazards towards cloud storage. Since the distributed nature of clouds is ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
2.
  • Multi orthogonal review of ... Multi orthogonal review of modern demand forecasting lines and computational limitations in Green Urban mobility
    ShivajiRao, G.; Kumar, A. Vincent Antony; Jaiganesh, M. E3S web of conferences, 2024, Volume: 547
    Journal Article
    Peer reviewed
    Open access

    Urban mobility attempts to combine payment systems asa service with mobility, which has been divided into several transportation segments, and offer door-to-door services to consumers. Demand ...
Full text
Available for: NUK, UL, UM, UPUK
3.
  • Intrusion Optimal Path Atta... Intrusion Optimal Path Attack detection using ACO for Cloud Computing
    Jaiganesh, M.; ShivajiRao, G.; Dhivya, P. ... E3S web of conferences, 01/2024, Volume: 472
    Journal Article
    Peer reviewed
    Open access

    As the cloud infrastructure is simultaneously shared by millions of consumers, heinous use of cloud resources are also increasing. It makes ways to attackers to set up attacks by exploiting the ...
Full text
Available for: NUK, UL, UM, UPUK
4.
  • A Secure Two-Way Verificati... A Secure Two-Way Verification based Authentication Scheme with user Anonymity for Cloud Networks
    Mercy, S; Nagaraja, R; Jaiganesh, M Annals of the Romanian society for cell biology, 01/2021, Volume: 25, Issue: 2
    Journal Article

    The detailed analysis of security for the proposed scheme demonstrates that it is withstand against various attacks. 1.Introduction In the earlier stage of 90s, storage systems are maintained by the ...
Full text
Available for: ODKLJ, UPUK
5.
  • Location and Temporal based... Location and Temporal based Multi-Cloud Package Selection for Enterprise
    Guruprakash, K S; Jaiganesh, M; Nathan, V Vijey ... Annals of the Romanian society for cell biology, 01/2021, Volume: 25, Issue: 2
    Journal Article

    ...the organizations are usually forced to use whatever packages are available with the provider, either at the expense of quality or at the expense of cost. The model is developed as an online ...
Full text
Available for: ODKLJ, UPUK
6.
  • B3: Fuzzy-Based Data Center... B3: Fuzzy-Based Data Center Load Optimization in Cloud Computing
    Jaiganesh, M.; Antony Kumar, A. Vincent Mathematical problems in engineering, 01/2013, Volume: 2013
    Journal Article
    Peer reviewed
    Open access

    Cloud computing started a new era in getting variety of information puddles through various internet connections by any connective devices. It provides pay and use method for grasping the services by ...
Full text
Available for: FZAB, GIS, IJS, IZUM, KILJ, NLZOH, NUK, OILJ, PILJ, PNG, SAZU, SBCE, SBMB, UL, UM, UPUK

PDF
7.
  • The Use of Privacy-Preserving Techniques in Edge-Cloud Computing: A Study of Alternative Approaches to Face Recognition
    Nambiar, Rajashree; Jaiganesh, M.; Rao, M.V. Panduranga 2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT), 2022-Aug.-11
    Conference Proceeding

    Face verification is by far the most popular biometrics technology used for authentication since it is noninvasive and does not require the assistance of the user. In contrast, fingerprint and iris ...
Full text
Available for: IJS, NUK, UL, UM
8.
  • INVENTORY MODEL WITH STOCKLEVEL CONSTRAINT USING ARITHMETIC– GEOMETRIC INEQUALITY
    Jaiganesh, M; Vediappan, M K; Ravithammal, M NeuroQuantology, 01/2022, Volume: 20, Issue: 11
    Journal Article

    In this paper, a basic methodology with two essential strategies (basic analytical geometry and algebraic methods) is used to settle the organized vendor - buyer inventory issue. An incorporated ...
Full text
Available for: NUK, UL, UM, UPUK
9.
  • Iot Based Power Monitoring ... Iot Based Power Monitoring System
    P M, Jaiganesh; B, Meenakshi Sundaram International Journal of Computer Science and Engineering, 4/2021, Volume: 8, Issue: 4
    Journal Article
    Open access
Full text
Available for: NUK, UL, UM, UPUK

PDF
10.
  • Ensemble Learning Driven Co... Ensemble Learning Driven Computer-Aided Diagnosis Model for Brain Tumor Classification on Magnetic Resonance Imaging
    Vaiyapuri, Thavavel; Jaiganesh, M.; Ahmad, Sultan ... IEEE access, 01/2023, Volume: 11
    Journal Article
    Peer reviewed
    Open access

    Brain tumour (BT) detection involves the process of identifying the presence of a brain tumour in medical imaging, such as MRI scans. BT detection often relies on medical imaging techniques, such as ...
Full text
Available for: NUK, UL, UM, UPUK
1 2 3 4 5
hits: 79

Load filters