关注
Dr. Densy John
Dr. Densy John
Assistant Professor, University of Technology, Bahrain
在 utb.edu.bh 的电子邮件经过验证
标题
引用次数
引用次数
年份
Artificial Intelligence based Visual Aid with Live Tracking of Visually Impaired People
C Ananth, P Thenmozhi, DJ Vadakkan, S Kavitha, TA Kumar
2022 2nd International Conference on Technological Advancements in …, 2022
42022
A hybrid approach for web traffic prediction using deep learning algorithms
A Prasanth, P Surendran, D John, B Thomas
2022 9th International Conference on Electrical and Electronics Engineering …, 2022
32022
Fault Classification and Blockchain-Based Incentive Scheme for Smart Wireless Sensor Networks
B Thomas, P Surendran, A Prasanth, D John
International Conference on Microelectronics, Electromagnetics and …, 2023
2023
Authentication Protocol for Secure Data Access in Fog Computing-Based Internet of Things
P Surendran, B Thomas, D John, A Prasanth, J Winston, AK Jilani
International Conference on Frontiers of Intelligent Computing: Theory and …, 2023
2023
Enhancing Segmentation Approaches from Fuzzy-MPSO Based Liver Tumor Segmentation to Gaussian Mixture Model and Expected Maximization
C Ananth, M Kameswari, DJ Vadakkan
Journal of Algebraic Statistics 13 (2), 788-797, 2022
2022
A System and Method for Assisting Driving in a Ghat Region
AJE Christo Ananth, Narendran S, K.Praghash, Dr.A.Anitha, Ahila.A , Nanjesh ...
IN Patent 202041055859 A, 2021
2021
Implementation of Cloud Security Using mCL-PKE and Identity based Syncryption
D John V., EJT Fredrik
Journal of Advanced Research in Dynamical & Control Systems 10 (03-special …, 2018
2018
Highly Secured Confidential Data Transfer Using Bloom Based Elliptic Curve Attribute Encryption In Cloud Environment
D John V., DA Kalarani X
International Journal of Computer Engineering and Applications 11 (XII), 112 …, 2017
2017
Bayes Certificateless Signcryption Based Secured Data Integrity for Cloud Service Provisioning
V Densy John
International Journal of Applied Engineering Research 12 (20), 9515-9524, 2017
2017
Enhancing Security By Altering Encryption Keys For Symmetric Algorithm
D John V., DA Kalarani X
International Journal of Development Research 6 (12), 10738-10743, 2016
2016
A Survey on Security Issues in Cloud Computing and its Solutions
D John V., DA Kalarani X
International Advanced Research Journal in Science, Engineering and …, 2015
2015
A System Monitoring for Harvesting of Farming Using Drone Technology
C Ananth, N Purushothaman, N Priya, RU Maheshwari
Education 2020, 2013
2013
Fault Classification
BBI Scheme, B Thomas, P Surendran, A Prasanth, D John
Evolution in Signal Processing and Telecommunication Networks, 397, 0
系统目前无法执行此操作,请稍后再试。
文章 1–13