[PDF][PDF] Mining user profile exploitation cluster from computer program logs

K Venkatesan, V Khanna, JP Thakur… - International Journal of …, 2015 - researchgate.net
Fundamental part of any personalization application is user identification, the present user
identification ways ar supported users interest (ie positive preferences). The main focus is on …

[PDF][PDF] Reduced Path, Sink Failures in Autonomous Network Reconfiguration System (ANRS) Techniques

KGS Venkatesan, V Khanaa… - International Journal of …, 2015 - Citeseer
This paper Routing using Autonomous Network Reconfiguration System (ANRS) with
bandwidth guarantees focuses on a wireless mesh network (WMN) consists of a large …

[PDF][PDF] Transmission of Data between Sensors by devolved Recognition

KGS Venkatesan, BS Raj, V Keerthiga… - International Journal of …, 2015 - researchgate.net
This paper presents a model of the property of a Wireless detector Network (WSN) deployed
over asq. space, that considers border effects. This model supports AN correct analysis of …

[PDF][PDF] Moral Hacking: A way to boost data security by using vulnerability scanning Tools

AK Anbukarsan, I Nagarajan… - International Journal of …, 2015 - researchgate.net
The state of security on the net is dangerous and obtaining worse. One reaction to the
present state of affairs is termed as Moral Hacking that makes an attempt to extend security …

[PDF][PDF] Network Monitoring using Test Packet Generation

KGS Venkatesan, V Khanna… - International Journal of …, 2015 - researchgate.net
Wireless Mesh Network (WMN) is one of emerging technology of the next generation
networks, and it is going to address the internet provision to users at low cost anytime from …

[PDF][PDF] Wireless communication enables information transfer in ad-hoc network

KGS Venkatesan, V Khanaa, R Udayakumar - researchgate.net
Wireless communication enables Remote correspondence empowers data exchange
among a system of detached, and regularly portable, clients. Famous remote systems, for …

[PDF][PDF] An Analytical Study and Implementation of Multi-Path File Sharing On Distributed Network

KGS Venkatesan, ARP Reddy, NM Reddy, MS Reddy… - researchgate.net
This paper considers the matter of passing on K clear substance to D destinations from N
sources in remote frameworks. Action in reverse direction quite a pair of remote hops can …

[PDF][PDF] Dynamic & Self-Organizing of Ad-Hoc Network that enables Information Transfer

KGS Venkatesan, GNM Rao, D Venkatesh, K Ramesh… - 2016 - researchgate.net
Wireless Communication, Remote correspondence empowers data exchange among a
system of separated, and regularly versatile, clients. Well known remote systems, for …

[PDF][PDF] Safety and Moral Affairs in Cyber Space: An IT Firm's Prospect

KGS Venkatesan, V Khanaa, AK Anbukarsan… - Safety, 2015 - researchgate.net
Information Technology is dynamical the face of latest World. The IT's not solely connected
the globe at one single platform however it's additionally serving to within the integration of …

[PDF][PDF] Associate Adaptable Transactional Information Store in the Cloud Using Distributed Storage and Meta Data Manager

KGS Venkatesan, K Viswalingam, NG Vijitha - researchgate.net
Over the last few years,“Cloud Computing” or “Elastic Computing” has emerged as a
compelling and successful paradigm for net scale computing. One of the key causative …