A desktop application of QR code for data security and authentication

P Mittra, N Rakesh - 2016 International Conference on Inventive …, 2016 - ieeexplore.ieee.org
Initially the barcodes have been widely used for the unique identification of the products.
Quick Response ie QR codes are 2D representation of barcodes that can embed text, audio …

Fault tolerance based routing approach for WMN

M Chawla, A Mundra, N Rakesh… - … on Computer and …, 2015 - ieeexplore.ieee.org
Today, Wireless Mesh Networks has been recognized as a new attractive communication
paradigm due to their ease of deployment and ability of fault tolerance. WMN is a multi-hop …

[PDF][PDF] Resilient packet transmission (RPT) for the buffer based routing (BBR) protocol

G Rathee, N Rakesh - Journal of Information Processing Systems, 2016 - koreascience.kr
To provide effective communication in the wireless mesh network (WMN), several algorithms
have been proposed. Since the possibilities of numerous failures always exist during …

Operations on Cloud Data (Classification and Data Redundancy)

S Khanna, N Rakesh, KN Chaturvedi - Advances in Computer and …, 2018 - Springer
Cloud computing is a turning in the field of information technology as it provides resources
over network. Besides the features, cloud services are widely available for all. Content …

Cost Effective Parameter Analysis of Real-Time Multi Core Algorithms

A Agarwal, N Rakesh - … Sciences: Proceedings of ICCCCS 2016, Volume 1, 2017 - Springer
Cost effective and reliable scheduling of tasks on real-time systems has always been a
challenge and with multiprocessor platforms penetrating into the real-time systems …

[引用][C] Comparative Performance Analysis of Study of Routing Protocols for Adhoc Networks

C Singh, V Sharma - International Journal of Advanced Research in …, 2015