The Novel Life Cycle Model for Component Based Software System Based on Architecture Quality Using KCW Framework S Kaliraj, N Premkumar, A Bharathi International Journal of Information Technology and Computer Science (IJITCS …, 2014 | 5 | 2014 |
Challenges and issues of E-health applications in cloud and fog computing environment N Premkumar, R Santhosh Mobile Computing and Sustainable Informatics: Proceedings of ICMCSI 2021 …, 2022 | 2 | 2022 |
Maximizing the Network Lifetime by using Mobile Data Gathering in Wireless Sensor Networks MK S.Vanitha, N.PremKumar, A.Kanimozhi SSRG International Journal of Computer Science and Engineering 4 (10), 15, 2017 | 2 | 2017 |
Automatic software bug prediction using adaptive golden eagle optimizer with deep learning R Siva, K S, B Hariharan, N Premkumar Multimedia Tools and Applications 83 (1), 1261-1281, 2024 | 1 | 2024 |
Automatic Software Bug Prediction Using Adaptive Artificial Jelly Optimization With Long Short-Term Memory R Siva, B Hariharan, N Premkumar Wireless Personal Communications, 1-24, 2023 | 1 | 2023 |
Picture Of Data Warehouse Portrayed With Thought For Challenges, Modernization, And Improvement Of A Conventional Data Warehouse, As Well As Its Possible Future Perspectives GD Saxena, DNRE Parmod, DS David, ST Kumbhar, N Premkumar Journal of Pharmaceutical Negative Results, 8244-8254, 2022 | 1 | 2022 |
Secure authentication scheme with Archimedes optimization algorithm for load balancing technique in fog computing N Premkumar, R Santhosh International Journal of Information Technology, 1-9, 2024 | | 2024 |
Pelican optimization algorithm with blockchain for secure load balancing in fog computing N Premkumar, R Santhosh Multimedia Tools and Applications, 1-23, 2023 | | 2023 |
Secured and Efficient Data Transmission in Manets Against Malicious Attack using DSR Routing and BCS Clustering with Hybrid AES-ECC Cryptanalysis KNNP G.Murugesan, M.Padmaa International Journal of Innovative Technology and Exploring Engineering 8 …, 2019 | | 2019 |
Reality Exposure of Package Reducing Attacks in Networks NP E.Vinodha International Journal of Innovative Research in Computer and Communication …, 2016 | | 2016 |
Public auditing and user revocation in dynamic cloud environment RC Nandhini S, Premkumar N Discovery Engineering 4 (14), 500, 2016 | | 2016 |
MANETs Using Advance DSR Algorithm and Improve the Secure Transmission PN Sivasakthi. S, Seramannan. S, Rajesh. S, Thamilselvan. S International Journal of Emerging Technology and Advanced Engineering 3 (7), 213, 2013 | | 2013 |
Secured and Efficient Data Transmission in Manets Against Malicious Attack using DSR Routing and BCS Clustering with Hybrid AES-ECC Cryptanalysis G Murugesan, M Padmaa, K Nagarajan, N Premkumar | | |