关注
Kamarunisha.M
Kamarunisha.M
Dhanalakshmi Srinivasan College of Arts and Science for Women (Autonomous)
在 dscollege.ac.in 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Recitation of load balancing algorithms in grid computing environment using policies and strategies an approach
M Kamarunisha, S Ranichandra, TKP Rajagopal
International Journal of Scientific & Engineering Research 2 (3), 2011
152011
An Efficient Delay Centric Speed and Directional Routing (DMDR) for Improved Routing in MANET
SV M.kamarunisha
SN Computer Science 5 (article number 235), 9, 2024
12024
Optimization of multi parameters of WEDM using ANN based on principal component analysis for AA6063/B4C metal matrix composites
R Amuthakkannan, K Vijayalakshmi, M Kamarunisha, SG Kumar, ...
Materials Today: Proceedings, 2023
2023
HYBRID DEEP LEARNING FRAMEWORK FOR LONG TAIL SERVICES RECOMMENDATION SYSTEM
S Gowri, S Vimalanand, M Kamarunisha, K Sneka, LF Begum, R Deepika, ...
Journal of Data Acquisition and Processing 38 (3), 2980, 2023
2023
Air Quality Monitoring System Based OnISO/IEC/IEEE 21451Standards
M KAMARUNISHA
International Conference on Materials, Computing, Communication Technologies, 2022
2022
Term frequency-Inverse Document Frequency Method Based On Virtual Machine introspection (VMI) Cloud Environment
M KAMARUNISHA
International Conference on Materials, Computing, Communication Technologies, 2022
2022
Threats, Vulnerability and Data Attacks for Cloud Computing
MK A.Sivasankari.
purakala 31 (40), 33-45, 2020
2020
Scheduling Process For Disjoint Covers in Manets Network Using Wake Up Scheduling
AR M.Kamarunisha
International Journal of Scientific & Technology Research 9 (02), 5791-5795, 2020
2020
ONTOLOGY BASED INFORMATION GATHERING FROM WEB PAGES
M KAMARUNISHA
Scholar : National School of Leadership 8, 6, 2019
2019
JS-REDUCE: DEFENDING YOUR DATA FROM SEQUENTIAL BACKGROUND KNOWLEDGE ATTACKS
M KAMARUNISHA
Scholar : National School of Leadership 8, 8, 2019
2019
A NOVEL APPROACH FOR EFFICIENT USAGE OF INTRUSION DETECTION SYSTEM IN MOBILE AD HOC NETWORKS
M KAMARUNISHA
Scholar : National School of Leadership 8, 5, 2019
2019
CONTRADICTION BASED GRAY-HOLE ATTACK MINIMIZATION FOR AD-HOC NETWORKS
M KAMARUNISHA
Scholar : National School of Leadership 8, 5, 2019
2019
COLLEGE WEBSITE CREATION
M KAMARUNISHA
Scholar : National School of Leadership 8, 13, 2019
2019
A BANKER’S CHEQUE USING ATM INTERFACED WITH TRUSTED THIRD PARTY SERVER
M KAMARUNISHA
Scholar : National School of Leadership 8, 5, 2019
2019
ANONYMOUS DATA SHARING WITH FORWARD SECURITY FOR VERIFICATION PROCESS
M KAMARUNISHA
Scholar : National School of Leadership 8, 8, 2019
2019
OPTIMAL POWER CONTROL AND RELIABLE COMMUNICATION FOR MOBILE NETWORK THROUGH EFFICIENT ROUTING PROTOCOL
M KAMARUNISHA
Scholar : National School of Leadership 8, 6, 2019
2019
A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds
MMK G.Revathi,R.Sathiya
International Journal Research Science and Engineering 1 (4), 1-6, 2019
2019
Detecting and Resolving Firewall Policy Anomalies
M.Meera, Mrs. M.Kamarunisha
International Journal Research Science and Engineering 1 (4), 1-7, 2019
2019
Maximizing Sensor Lifetime with the Minimal Service Cost of a Mobile Charger in Wireless Sensor Networks
P.Meena,R.Renuka Devi,Mrs. M.Kamarunisha
International Journal Research Science and Engineering 1 (4), 1-7, 2019
2019
DYNAMIC SECURITY AND TRUSTABLE WAY OF MESSAGE SENDING IN WIRELESS SENSOR NETWORK
DTD M.Kamarunisha, Dr.Vimalanand
Scope International Journal of Science, Humanities, Management and …, 2017
2017
系统目前无法执行此操作,请稍后再试。
文章 1–20