-
1دورية أكاديمية
المؤلفون: G. Padmashree, Karunakar A. Kotegar
المصدر: IEEE Access, Vol 12, Pp 51056-51072 (2024)
مصطلحات موضوعية: Deep learning, disguised faces, skin segmentation, Sejong face dataset, region-based marker-controlled watershed algorithm, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
2مؤتمر
المؤلفون: G, Padmashree M, K, Ranjitha S, S, Arunalatha J, R, Venugopal K
المصدر: 2020 IEEE 7th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON) Electrical, Electronics and Computer Engineering (UPCON), 2020 IEEE 7th Uttar Pradesh Section International Conference on. :1-6 Nov, 2020
Relation: 2020 IEEE 7th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)
-
3دورية أكاديمية
المؤلفون: G., Padmashree, A. K., Karunkar
المصدر: IAENG International Journal of Computer Science; Dec2023, Vol. 50 Issue 4, p1279-1289, 11p
مصطلحات موضوعية: DEEPFAKES, MACHINE learning, DEEP learning, ARTIFICIAL intelligence, FEATURE extraction, SUPPORT vector machines
-
4
المؤلفون: G. Padmashree, Shruti G. Wagle, A. K. Karunakar
المصدر: Human-Centric Smart Computing ISBN: 9789811954023
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::2562df0daead8d97de52a27fbe2306d3
https://doi.org/10.1007/978-981-19-5403-0_26 -
5
المؤلفون: K R Venugopal, J S Arunalatha, M G Padmashree
المساهمون: Blue Eyes Intelligence Engineering and Sciences Publication(BEIESP)
المصدر: International Journal of Innovative Technology and Exploring Engineering. 10:20-28
مصطلحات موضوعية: Key establishment, Authentication, General Computer Science, business.industry, Computer science, Computer security, computer.software_genre, Authentication, Key Establishment, Internet of Things, Key Management, Light-Weight Cryptography Session Key Establishment, Mechanics of Materials, Session key, 2278-3075, 100.1/ijitee.K946109101121, Electrical and Electronic Engineering, Internet of Things, business, Key management, computer, Civil and Structural Engineering
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d8e4fec41084c9d3a11c7b1eaff3ed1b
https://doi.org/10.35940/ijitee.k9461.09101121 -
6
المؤلفون: J S Arunalatha, K R Venugopal, M G Padmashree
المصدر: International Journal of Computer Applications. 183:1-9
مصطلحات موضوعية: Elliptic curve, business.industry, Computer science, Point (geometry), Cryptography, Internet of Things, business, Algorithm, Inversion (discrete mathematics)
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::6c7ce2eef86e783f7e74890ed5a739e7
https://doi.org/10.5120/ijca2021921655 -
7
المؤلفون: J S Arunalatha, M G Padmashree, K R Venugopal
المصدر: International Journal of Engineering and Advanced Technology. 10:92-103
مصطلحات موضوعية: Lightweight cryptography, Authentication, Environmental Engineering, business.industry, Computer science, General Engineering, Computer security, computer.software_genre, Computer Science Applications, Identity (object-oriented programming), Data Protection Act 1998, Internet of Things, business, Key management, computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::93f9f6af1bcc8116ba27d30efd8a1b1c
https://doi.org/10.35940/ijeat.f3020.0810621 -
8
المؤلفون: M G Padmashree, Shahela Khanum, J S Arunalatha, K. R. Venugopal
المصدر: International Journal of Information Technology. 13:1481-1494
مصطلحات موضوعية: Key generation, Computer Networks and Communications, Computer science, business.industry, Applied Mathematics, 020206 networking & telecommunications, Access control, 02 engineering and technology, Shared secret, Permission, Computer security, computer.software_genre, Encryption, Computer Science Applications, Computational Theory and Mathematics, Artificial Intelligence, 0202 electrical engineering, electronic engineering, information engineering, Key (cryptography), 020201 artificial intelligence & image processing, Attribute-based encryption, Electrical and Electronic Engineering, business, computer, Information Systems, Key size
-
9
المؤلفون: M. G. Padmashree, null Mallikarjun, J. S. Arunalatha, K. R. Venugopal
المصدر: Intelligent Systems ISBN: 9789811909009
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::9f3997f58b1165a656d4f4769c340851
https://doi.org/10.1007/978-981-19-0901-6_1 -
10
المؤلفون: M G Padmashree, J S Arunalatha
المساهمون: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
مصطلحات موضوعية: Access Restriction, Authentication, Identity, Key Management, Lightweight Cryptography, Security, 2249-8958, 100.1/ijeat.F30200810621
URL الوصول: https://explore.openaire.eu/search/publication?articleId=od______2659::bc0af8801b4dd5d7b008c15c964903e8
https://zenodo.org/record/5412081