Search Results - "Shaji, R. S."
-
1
Ethereum blockchain for electronic health records: securing and streamlining patient management
Published in Frontiers in medicine (25-09-2024)“…Electronic health records (EHRs) are increasingly replacing traditional paper-based medical records due to their speed, security, and ability to eliminate…”
Get full text
Journal Article -
2
A review on the features and technologies for energy efficiency of smart grid
Published in International journal of energy research (10-03-2018)“…Summary In today's world striving for efficiency in every sector, especially power generation and distribution, smart grids emerge as the solution for…”
Get full text
Journal Article -
3
Modelling and Detection of Worm Propagation for Web Vehicular Ad Hoc Network (WVANET)
Published in Wireless personal communications (01-11-2019)“…Web Vehicular Ad Hoc Network becomes the major research platform these days. This web vehicular ad hoc network is fundamentally different from the earlier…”
Get full text
Journal Article -
4
A Novel Algorithm for Load Balancing in Mobile Cloud Networks: Multi-objective Optimization Approach
Published in Wireless personal communications (01-11-2017)“…Cloud computing is a type of computing, because they share computing resources for better throughput. In cloud, virtualization technique is used to maximize…”
Get full text
Journal Article -
5
Secure smart grid implementation with automatic data integrity attack location prediction and exalted energy theft detection
Published in Connection science (31-12-2024)Get full text
Journal Article -
6
A survey on evolutionary machine learning algorithms for multi-dimensional data classification
Published in 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (01-12-2015)“…The paper presents an analysis of various knowledge discovery estimation methods performed using different methods. Knowledge discovery approach addresses the…”
Get full text
Conference Proceeding -
7
An analysis of data leakage and prevention techniques in cloud environment
Published in 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (01-12-2015)“…Cloud computing is an elastic, economical and an established delivery platform with the intention of provisioning business or consumer IT services via the…”
Get full text
Conference Proceeding -
8
Signature based data auditing under mobile cloud system
Published in 2015 Global Conference on Communication Technologies (GCCT) (01-04-2015)“…Cloud computing is getting more popular in the field of computer science because of its reliability in storing and assessing data remotely. In the presence…”
Get full text
Conference Proceeding -
9
A secure virtual machine migration using processor workload prediction method for cloud environment
Published in 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (01-03-2016)“…The cloud services are shared in one are more customers by pooling in a multitenant environment, which provides virtualized resources to the customer using…”
Get full text
Conference Proceeding -
10
Symmetric key based cryptic scheme for mobile cloud storage
Published in 2015 Global Conference on Communication Technologies (GCCT) (01-04-2015)“…Cloud computing is getting more popular in the field of computer science because of its reliability in storing and assessing data remotely. In the presence…”
Get full text
Conference Proceeding -
11
A secure virtual machine migration using memory space prediction for cloud computing
Published in 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (01-03-2016)“…A cost effective, easy to manage, elastic and powerful resources over the internet is provided to the users by cloud environment. The resource pooling allows…”
Get full text
Conference Proceeding -
12
Body area network - The driving technology for M-health with a novel scheduling scheme
Published in 2015 Global Conference on Communication Technologies (GCCT) (01-04-2015)“…The m-health is a novel technology that uses smart phones as a device to communicate through the doctor and patient. Now a days the application performs a…”
Get full text
Conference Proceeding -
13
Asymetric key based data communication under mobile cloud system
Published in 2015 Global Conference on Communication Technologies (GCCT) (01-04-2015)“…Cloud computing is getting more popular in the field of computer science because of its reliability in storing and assessing data remotely. In the presence…”
Get full text
Conference Proceeding -
14
A novel Routing and service migration scheme for communication among heterogeneous devices in pervasive environment
Published in 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET) (01-03-2011)“…In pervasive environment various devices with varying medium of access, mobility and connectivity have different types of services available among themselves…”
Get full text
Conference Proceeding -
15
Vertical handover in Vehicular ad-hoc network using multiple parameters
Published in 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (01-07-2014)“…Reliability and timely information delivery are highly concerned factors in Vehicular ad-hoc network. A better handover mechanism plays an important role in…”
Get full text
Conference Proceeding -
16
A scalable cloud enabled mobile governance framework
Published in 2014 IEEE Global Humanitarian Technology Conference - South Asia Satellite (GHTC-SAS) (01-09-2014)“…M-Governance is today's mantra as it has innocuously taken a steady lead over e-Governance! Statistics have proven all assumptions on the scope of Internet and…”
Get full text
Conference Proceeding -
17
Security in data forwarding through elliptic curve cryptography in cloud
Published in 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (01-07-2014)“…Cloud is an emerging trend in IT which moves the data along its computing away from handy systems into large remote data centers where the management of those…”
Get full text
Conference Proceeding -
18
Optimization of scheduling and decision making in elderly homecare system using particle swarm optimization
Published in 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (01-07-2014)“…The development of body Area Network and wireless sensor system had made drastic changes in the healthcare concept of human life. It is very usefull for elder…”
Get full text
Conference Proceeding -
19
An optimized network selection for coverage under cellular network
Published in 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (01-07-2014)“…Cellular network is the wireless network where the user wants to be connected anytime, anywhere, anyhow throughout the world. It requires strict Quality of…”
Get full text
Conference Proceeding -
20
Customizing Linux operating system for implementing various services in cloud environment
Published in 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (01-07-2014)“…A cloud operating system or cloud OS provides an operating system(OS), which can be accessed from anywhere, that has objects and all sorts of resources for…”
Get full text
Conference Proceeding