Search Results - "Ponnurangam Dhavachelvan"
-
1
A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications
Published in Journal of King Saud University. Computer and information sciences (01-02-2021)“…•Systematic organization of Data Compression (DC) concepts with its importance, mathematical formulation and performance measures.•Critical investigation of…”
Get full text
Journal Article -
2
A multi-agent approach: To preserve user information privacy for a pervasive and ubiquitous environment
Published in Egyptian informatics journal (01-03-2015)“…Cloud user’s data are getting insecure in current technological advancement. This research focuses on proposing a secure model to maintain the secrecy in a…”
Get full text
Journal Article -
3
F5N‐based unequal clustering protocol (F5NUCP) for wireless sensor networks
Published in International journal of communication systems (25-11-2018)“…Summary Wireless sensor networks (WSNs) became very popular and still remains an active research because of diverse applications. Minimizing the energy…”
Get full text
Journal Article -
4
A secure data privacy preservation for on-demand cloud service
Published in Journal of King Saud University. Engineering sciences (01-04-2017)“…This paper spotlights privacy and its obfuscation issues of intellectual, confidential information owned by insurance and finance sectors. Privacy risk in…”
Get full text
Journal Article -
5
Data privacy breach prevention framework for the cloud service
Published in Security and communication networks (01-04-2015)“…This paper examines the privacy awareness and importance of user's secrecy preserving in current ubiquitous cloud computing world. Data stored in the cloud…”
Get full text
Journal Article -
6
A New Objective Image Quality Assessment Metric: For Color and Grayscale Images
Published in 3D research (01-09-2018)“…Image quality assessment (IQA) is a challenging task in digital image processing where the images get distorted in several situations. In recent years, various…”
Get full text
Journal Article -
7
A coordinator‐specific privacy‐preserving model for E‐health monitoring using artificial bee colony approach
Published in Security and privacy (01-07-2018)“…In the contemporary scientific world, unpredictable health‐related issues and tribulations are changing into new diseases for the next generation. Medication…”
Get full text
Journal Article -
8
A secure data privacy preservation for on-demand
Published in Journal of King Saud University. Engineering sciences (01-04-2017)“…This paper spotlights privacy and its obfuscation issues of intellectual, confidential information owned by insurance and finance sectors. Privacy risk in…”
Get full text
Journal Article -
9
GPS: a constraint-based gene position procurement in chromosome for solving large-scale multiobjective multiple knapsack problems
Published in Frontiers of Computer Science (01-02-2018)“…The multiple knapsack problem (MKP) forms a base for resolving many real-life problems. This has also been considered with multiple objectives in genetic…”
Get full text
Journal Article -
10
-
11
A survey of data visualization tools for analyzing large volume of data in big data platform
Published in 2016 International Conference on Communication and Electronics Systems (ICCES) (01-10-2016)“…The growth of data in the present world is drastically increased, where tons of data is produced from different fields. Due to this enormous growth of data the…”
Get full text
Conference Proceeding -
12
Analysis of Empirical Software Effort Estimation Models
Published 07-04-2010“…IJCSIS, Vol. 7 No. 3, March 2010 Reliable effort estimation remains an ongoing challenge to software engineers. Accurate effort estimation is the state of art…”
Get full text
Journal Article -
13
Evaluation Model for Web Service Change Management Based on Business Policy Enforcement
Published in 2012 International Symposium on Cloud and Services Computing (01-12-2012)“…Today organizations in all industries particularly financial services, retail and communications are increasingly dependent upon IT and a highly available…”
Get full text
Conference Proceeding