Jaiganesh, M.
~ 100  results:
Search for persons X
?
2

Detecting Wildlife Trapped Images Using Automatically Share..:

, In: Inventive Computation and Information Technologies; Lecture Notes in Networks and Systems,
 
?
3

The Use of Privacy-Preserving Techniques in Edge-Cloud Comp..:

, In: 2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT),
 
?
5

Secure Outlook View of Trustworthiness and Attacks in Cloud..:

, In: Inventive Computation Technologies; Lecture Notes in Networks and Systems,
Mercy, S. ; Nagaraja, R. ; Jaiganesh, M. - p. 794-800 , 2019
 
?
6

A Perspective view of Resource-based Capacity planning in C..:

, In: 2019 1st International Conference on Advances in Information Technology (ICAIT),
Anupama, K.C. ; Nagaraja, R. ; Jaiganesh, M. - p. 358-363 , 2019
 
?
9

B3: Fuzzy-Based Data Center Load Optimization in Cloud Comp..:

Jaiganesh, M. ; Antony Kumar, A. Vincent
Mathematical Problems in Engineering.  2013 (2013)  - p. 1-11 , 2013
 
?
11

Intrusion Optimal Path Attack detection using ACO for Cloud..:

Jaiganesh M ; ShivajiRao G ; Dhivya P..
https://www.e3s-conferences.org/articles/e3sconf/pdf/2024/02/e3sconf_icregcsd2023_02009.pdf.  , 2024
 
?
14

A VLSI Perspective on Encryption Algorithm Analysis:

, In: 2024 International Conference on Communication, Computing and Internet of Things (IC3IoT),
Srinivasan, K ; Akash, A ; Jaiganesh, P. - p. 1-6 , 2024
 
?
 
1-15