Search Results - "Aruna, M. G."

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Cloud to cloud data migration using self sovereign identity for 5G and beyond by Aruna, M. G., Hasan, Mohammad Kamrul, Islam, Shayla, Mohan, K. G., Sharan, Preeta, Hassan, Rosilah

    Published in Cluster computing (01-08-2022)
    “…The Coronavirus pandemic and the work-from-anywhere has created a shift toward cloud-based services. The pandemic is causing an explosion in cloud migration,…”
    Get full text
    Journal Article
  2. 2

    Designing a Multi-party Collaborator of Explicit Units of the Blockchain to Mitigate the Security Attacks on the Data Migration from Cloud to Cloud by Aruna, M. G., Mohan, K. G.

    Published in Wireless personal communications (01-12-2021)
    “…The advancement of internet-based applications generated enormous voluminous media data, requiring effective storage and processing pipelines to handle the…”
    Get full text
    Journal Article
  3. 3

    Vine Disease Detection UAV Multi Spectral Image using Segnet and Mobilenet Method by M G, Aruna, Silvia, Ensteih, Al-Fatlawy, Ramy Riad, Rao, Hanumanthakari Kalyan, M, Sowmya

    “…Deep Learning-based vine disease detection has garnered significant attention from the community, particularly with the utilization of UAV multispectral images…”
    Get full text
    Conference Proceeding
  4. 4

    Residual Attention based Long Short-Term Memory for Anomaly Human Behaviour Detection by Padma Kala, S, Aruna, M G, Upendra Roy, B. P., Gurumoorthy, Sasikumar, Alabdeli, Haider

    “…The recognition of video anomaly is an effective computer vision task which played an essential part in smart surveillance and safety of public however that is…”
    Get full text
    Conference Proceeding
  5. 5

    Secured cloud data migration technique by competent probabilistic public key encryption by Aruna, M. G., Mohan, K. G.

    Published in China communications (01-05-2020)
    “…Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic…”
    Get full text
    Journal Article
  6. 6