[PDF][PDF] Energy efficient data sharing method using lightweight algorithm for mobile cloud environment
GS Kumar, DR Jegadeesan, A Pravalika… - SSRN Electronic …, 2019 - researchgate.net
As the popularity of cloud computing increases on mobile devices, this can store or retrieve
personal data from anywhere at any time. At the same time, the problem of data security also …
personal data from anywhere at any time. At the same time, the problem of data security also …
[PDF][PDF] A NOVEL APPROACH FOR DETECTING AUTOMATED SPAMMERS IN TWITTER
P PRIYA, R WALTER - academia.edu
Twitter is one of the most popular microblogging services, which generally used to share
messages restricted to 280characters. However, its open nature and large user base are …
messages restricted to 280characters. However, its open nature and large user base are …
[PDF][PDF] PERFORMANCE ANALYSIS OF MACHINE LEARNING ALGORITHMS FOR IDS
K Priyanka, R Jegadeesan, V Neelima, S Divya… - 2019 - researchgate.net
Any abnormal activity will be assumed to be anomalies intrusion. Intrusion could be a major
issue that is to be addressed and should be detected. Intrusion detection could be a central …
issue that is to be addressed and should be detected. Intrusion detection could be a central …
[PDF][PDF] TWO FACTOR DATA SECURITY MECHANISM FOR CLOUD STORAGE.
V Nareenkanth, R Jegadeesan, V Sowmya… - 2019 - researchgate.net
Data sharing in cloud storage is receiving substantial attention in information
communications technology, as it can provide customers with systematic and beneficial …
communications technology, as it can provide customers with systematic and beneficial …
[PDF][PDF] DATA CLUSTERING FRAMEWORK BASED ON DENSITY
V Rakshitha, R Jegadeesan, P Balakishan, K Jayasri… - 2019 - researchgate.net
Grouping of information with high measurement and variable densities represents a
surprising test to the customary thickness based bunching strategies. As of late, entropy, a …
surprising test to the customary thickness based bunching strategies. As of late, entropy, a …
[PDF][PDF] SECURITY PORTRAYAL AND EVALUATION IN INFORMATION DISTRIBUTING
B Shirisha - 2019 - researchgate.net
The growing ability to track and acquire huge amounts of records with the use of current
hardware technology now has lead to an activity in the improvement of facts mining …
hardware technology now has lead to an activity in the improvement of facts mining …
[PDF][PDF] ENHANCED SECURITY SERVICES TO SHARE OF PERSONAL HEALTH DATA IN THE CLOUD
N Venkateswaran, R Jegadeesan, G Kalyani, G Ravali… - 2019 - researchgate.net
The cloud service in the health care zone has evolved in cost effective and suitable
exchange of personal health data. Storing the personal health information to cloud is …
exchange of personal health data. Storing the personal health information to cloud is …
[PDF][PDF] SECURED AND EFFICIENT CLOUD COMPUTING FRAMEWORK FOR MOBILE
B Krishnaveni, R Jegadeesan, B Sriteja, G Rajender… - 2019 - researchgate.net
Cordless phone machines are used in our daily lives. However, these machines have
drawbacks such as unreliable network connectivity, limited size memory, low computing …
drawbacks such as unreliable network connectivity, limited size memory, low computing …
[PDF][PDF] AVOIDING PRIVACY LEAKAGE TO CLOUD SERVER WITH PRIVACY PRESERVING TO SQL QUERIES
N Rasagna - 2019 - researchgate.net
Recent days, outsourcing database to cloud is getting popular as cloud provide services and
applications which are in low cost and available even foe small scale industries. There are …
applications which are in low cost and available even foe small scale industries. There are …
[引用][C] Crop Yield Prediction Based On Indian Agriculture Using Machine Learning
A Sujatha, R Jegadeesan, VS Harsha, G Snehitha… - Zeichen Journal