-
1تقرير
المؤلفون: Arul, Rajakumar, Raja, Gunasekaran, Almagrabi, Alaa Omran, Alkatheiri, Mohammed Saeed, Hussain, Chauhdary Sajjad, Bashir, Ali Kashif
مصطلحات موضوعية: Computer Science - Cryptography and Security
الوصول الحر: http://arxiv.org/abs/1911.00692Test
-
2تقرير
المصدر: IEEE Transactions on Industrial Informatics, 2017
مصطلحات موضوعية: Computer Science - Networking and Internet Architecture, Computer Science - Distributed, Parallel, and Cluster Computing
الوصول الحر: http://arxiv.org/abs/1905.07607Test
-
3دورية أكاديمية
المؤلفون: Arul, Rajakumar1 (AUTHOR), Alroobaea, Roobaea2 (AUTHOR) r.robai@tu.edu.sa, Tariq, Usman3 (AUTHOR), Almulihi, Ahmed H.4 (AUTHOR), Alharithi, Fahd S.4 (AUTHOR), Shoaib, Umar5 (AUTHOR)
المصدر: Personal & Ubiquitous Computing. Feb2024, Vol. 28 Issue 1, p43-57. 15p.
-
4دورية أكاديمية
المؤلفون: Arul, Rajakumar1 (AUTHOR) rajakumararul@ieee.org, Al-Otaibi, Yasser D.2 (AUTHOR), Alnumay, Waleed S.3 (AUTHOR), Tariq, Usman4 (AUTHOR), Shoaib, Umar5 (AUTHOR), Piran, M. D. Jalil6 (AUTHOR)
المصدر: Personal & Ubiquitous Computing. Feb2024, Vol. 28 Issue 1, p3-15. 13p.
-
5دورية أكاديمية
المؤلفون: Doraisamy, Radha, Moharir, Minal, Arul, Rajakumar
المصدر: Indonesian Journal of Electrical Engineering and Computer Science 28(2) 962-972
مصطلحات موضوعية: Congestion management, Game theory, Network on chip, Odd-even routing, Stag hunt
العلاقة: https://zenodo.org/record/7312915Test; https://doi.org/10.11591/ijeecs.v28.i2.pp962-972Test; oai:zenodo.org:7312915
-
6دورية أكاديميةMine safety and risk prediction mechanism through nanocomposite and heuristic optimization algorithm
المؤلفون: Latchoumi, T.P., Raja, K., Jyothi, Y., Balamurugan, K., Arul, Rajakumar
المصدر: Measurement: Sensors ; volume 23, page 100390 ; ISSN 2665-9174
مصطلحات موضوعية: Electrical and Electronic Engineering, Industrial and Manufacturing Engineering, Mechanics of Materials, Electronic, Optical and Magnetic Materials
الإتاحة: https://doi.org/10.1016/j.measen.2022.100390Test
https://api.elsevier.com/content/article/PII:S2665917422000241?httpAccept=text/xmlTest
https://api.elsevier.com/content/article/PII:S2665917422000241?httpAccept=text/plainTest -
7كتاب
المصدر: Lecture Notes in Electrical Engineering ; Machine Learning and Computational Intelligence Techniques for Data Engineering ; page 279-289 ; ISSN 1876-1100 1876-1119 ; ISBN 9789819900466 9789819900473
-
8دورية أكاديمية
المؤلفون: Bashir, Ali Kashif, Arul, Rajakumar, Basheer, Shakila, Raja, Gunasekaran, Jayaraman, Ramkumar, Qureshi, Nawab Muhammad Faseeh
وصف الملف: text
العلاقة: https://e-space.mmu.ac.uk/622940Test/; https://e-space.mmu.ac.uk/622940/1/Final%20Version.pdfTest; Bashir, Ali Kashif , Arul, Rajakumar , Basheer, Shakila , Raja, Gunasekaran , Jayaraman, Ramkumar and Qureshi, Nawab Muhammad Faseeh (2019) An optimal multitier resource allocation of cloud RAN in 5G using machine learning. Transactions on Emerging Telecommunications Technologies, 30 (8). e3627. ISSN 2161-3915
-
9
المؤلفون: Dutta, Ashutosh, Hammad, Eman, Enright, Michael, Behmann, Fawzi, Chorti, Arsenia, Cheema, Ahmad, Kadio, Kassi, Urbina-Pineda, Julia, Alam, Khaled, Limam, Ahmed, Chu, Fred, Lester, John, Park, Jong-Geun, Bio-Ukeme, Joseph, Pawar, Sanjay S, Layton, Roslyn, Ramchandran, Prakash, Okonkwo, Kingsley, Ong, Lyndon, Emmelmann, Marc, Issa, Omneya, Arul, Rajakumar, Malik, Sireen, Krishnan, Sivarama, Sugumar, Suresh, Lala, Tk, Borst, Matthew, Kloza, Brad, Kurt, Gunes Karabulut
المصدر: Dutta, A, Hammad, E, Enright, M, Behmann, F, Chorti, A, Cheema, A, Kadio, K, Urbina-Pineda, J, Alam, K, Limam, A, Chu, F, Lester, J, Park, J-G, Bio-Ukeme, J, Pawar, S S, Layton, R, Ramchandran, P, Okonkwo, K, Ong, L, Emmelmann, M, Issa, O, Arul, R, Malik, S, Krishnan, S, Sugumar, S, Lala, T, Borst, M, Kloza, B & Kurt, G K 2022, Security and Privacy . in 2022 IEEE Future Networks World Forum (FNWF) ., 10056734, IEEE, IEEE Future Networks World Forum (FNWF), pp. 1-71, 2022 IEEE Future Networks World Forum (FNWF), 10/10/2022 . https://doi.org/10.1109/FNWF55208.2022.00131Test
مصطلحات موضوعية: Network function virtualization, Risk management, Complexity theory, 5G mobile communication, Security, Computer network reliability, Computer architecture
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ad546419072d7e00abddc09a791248faTest
https://doi.org/10.1109/fnwf55208.2022.00131Test -
10كتاب
المؤلفون: Michael, Auxilia, Raja, K, Kaliyan, Kannan, Arul, Rajakumar
المصدر: Proceedings of International Conference on Computing and Communication Networks ; Lecture Notes in Networks and Systems ; page 419-425 ; ISSN 2367-3370 2367-3389 ; ISBN 9789811906039 9789811906046