Recitation of load balancing algorithms in grid computing environment using policies and strategies an approach M Kamarunisha, S Ranichandra, TKP Rajagopal International Journal of Scientific & Engineering Research 2 (3), 2011 | 15 | 2011 |
An Efficient Delay Centric Speed and Directional Routing (DMDR) for Improved Routing in MANET SV M.kamarunisha SN Computer Science 5 (article number 235), 9, 2024 | 1 | 2024 |
Optimization of multi parameters of WEDM using ANN based on principal component analysis for AA6063/B4C metal matrix composites R Amuthakkannan, K Vijayalakshmi, M Kamarunisha, SG Kumar, ... Materials Today: Proceedings, 2023 | | 2023 |
HYBRID DEEP LEARNING FRAMEWORK FOR LONG TAIL SERVICES RECOMMENDATION SYSTEM S Gowri, S Vimalanand, M Kamarunisha, K Sneka, LF Begum, R Deepika, ... Journal of Data Acquisition and Processing 38 (3), 2980, 2023 | | 2023 |
Air Quality Monitoring System Based OnISO/IEC/IEEE 21451Standards M KAMARUNISHA International Conference on Materials, Computing, Communication Technologies, 2022 | | 2022 |
Term frequency-Inverse Document Frequency Method Based On Virtual Machine introspection (VMI) Cloud Environment M KAMARUNISHA International Conference on Materials, Computing, Communication Technologies, 2022 | | 2022 |
Threats, Vulnerability and Data Attacks for Cloud Computing MK A.Sivasankari. purakala 31 (40), 33-45, 2020 | | 2020 |
Scheduling Process For Disjoint Covers in Manets Network Using Wake Up Scheduling AR M.Kamarunisha International Journal of Scientific & Technology Research 9 (02), 5791-5795, 2020 | | 2020 |
ONTOLOGY BASED INFORMATION GATHERING FROM WEB PAGES M KAMARUNISHA Scholar : National School of Leadership 8, 6, 2019 | | 2019 |
JS-REDUCE: DEFENDING YOUR DATA FROM SEQUENTIAL BACKGROUND KNOWLEDGE ATTACKS M KAMARUNISHA Scholar : National School of Leadership 8, 8, 2019 | | 2019 |
A NOVEL APPROACH FOR EFFICIENT USAGE OF INTRUSION DETECTION SYSTEM IN MOBILE AD HOC NETWORKS M KAMARUNISHA Scholar : National School of Leadership 8, 5, 2019 | | 2019 |
CONTRADICTION BASED GRAY-HOLE ATTACK MINIMIZATION FOR AD-HOC NETWORKS M KAMARUNISHA Scholar : National School of Leadership 8, 5, 2019 | | 2019 |
COLLEGE WEBSITE CREATION M KAMARUNISHA Scholar : National School of Leadership 8, 13, 2019 | | 2019 |
A BANKER’S CHEQUE USING ATM INTERFACED WITH TRUSTED THIRD PARTY SERVER M KAMARUNISHA Scholar : National School of Leadership 8, 5, 2019 | | 2019 |
ANONYMOUS DATA SHARING WITH FORWARD SECURITY FOR VERIFICATION PROCESS M KAMARUNISHA Scholar : National School of Leadership 8, 8, 2019 | | 2019 |
OPTIMAL POWER CONTROL AND RELIABLE COMMUNICATION FOR MOBILE NETWORK THROUGH EFFICIENT ROUTING PROTOCOL M KAMARUNISHA Scholar : National School of Leadership 8, 6, 2019 | | 2019 |
A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds MMK G.Revathi,R.Sathiya International Journal Research Science and Engineering 1 (4), 1-6, 2019 | | 2019 |
Detecting and Resolving Firewall Policy Anomalies M.Meera, Mrs. M.Kamarunisha International Journal Research Science and Engineering 1 (4), 1-7, 2019 | | 2019 |
Maximizing Sensor Lifetime with the Minimal Service Cost of a Mobile Charger in Wireless Sensor Networks P.Meena,R.Renuka Devi,Mrs. M.Kamarunisha International Journal Research Science and Engineering 1 (4), 1-7, 2019 | | 2019 |
DYNAMIC SECURITY AND TRUSTABLE WAY OF MESSAGE SENDING IN WIRELESS SENSOR NETWORK DTD M.Kamarunisha, Dr.Vimalanand Scope International Journal of Science, Humanities, Management and …, 2017 | | 2017 |