Search Results - "Sharma, K. Venkatesh"
-
1
Securing IoT Devices from DDoS Attacks through Blockchain and Multi-Code Trust Framework
Published in E3S web of conferences (01-01-2024)“…In an era where IoT devices are integral components of numerous systems, their security from prevalent DDoS attacks has become imperative. The traditional…”
Get full text
Journal Article -
2
Enhancing query relevance: leveraging SBERT and cosine similarity for optimal information retrieval
Published in International journal of speech technology (2024)“…Whether the information is related to a concept or a product, queries are frequently employed to find out information. Different people will use different…”
Get full text
Journal Article -
3
Mining the data using aggregator from the dynamic web page
Published in Materials today : proceedings (2018)“…Typically a user wishes to acquire the value of some aggregation gathering over distributed data items, for example, to know value of collection for a client;…”
Get full text
Journal Article -
4
Orthogonal Taguchi-Based Grey Wolf Optimization Algorithm for Task Scheduling in Cloud Environment
Published in 2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT) (01-12-2018)“…Recently, Cloud Computing (CC) is a well-developed business model in distributed computing environment. In cloud computing, the user tasks are organized and…”
Get full text
Conference Proceeding -
5
An efficient goal oriented risk analysis in requirement engineering
Published in 2013 3rd IEEE International Advance Computing Conference (IACC) (01-02-2013)“…In the field of software engineering, the requirement engineering is getting special attention as it is based on the stakeholder's interests. The main factors…”
Get full text
Conference Proceeding -
6
Data security in cloud computing and outsourced databases
Published in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) (01-03-2016)“…We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses…”
Get full text
Conference Proceeding -
7
Big-data: Acid versus base for database transactions
Published in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) (01-03-2016)“…Database developers all know the ACID acronym. It says that database transactions should be: Atomic, Consistent, Isolated, and Durable. These qualities seem…”
Get full text
Conference Proceeding -
8
Implementing privacy mechanisms for data using anonymization algorithms
Published in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) (01-03-2016)“…In today's digital world, with the increase of using internet, personal data is collected with online activities for analysis or for surveillance. So there is…”
Get full text
Conference Proceeding -
9
An efficient risk analysis in requirement engineering
Published in 2012 Nirma University International Conference on Engineering (NUiCONE) (01-12-2012)“…The requirement engineering is one of the emerging sections in software engineering. The main factors that a requirement engineering process considers are…”
Get full text
Conference Proceeding -
10
An Efficient Risk Analysis using Modified Goal Risk Model
Published in ARTCom 2012 : fourth International Conference on Advances in Recent Technologies in Communication and Computing : 19-20 October 2012 (2012)“…In the field of software engineering, the requirement engineering is getting special attention as it is based on the stakeholder's interests. The main factors…”
Get full text
Conference Proceeding