2020
DOI: 10.1007/978-981-15-1480-7_8
|View full text |Cite
|
Sign up to set email alerts
|

UIP—A Smart Web Application to Manage Network Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…A Twin Rotor Axial Flux Machine based Power Electronic differential has been suggested in the present work to sweep out the short comings of existing topology (Ezhilarasi, 2020). This proposed novel differential system efficiently and effectively utilizes the energy resources.…”
Section: Proposed Topologymentioning
confidence: 99%
“…A Twin Rotor Axial Flux Machine based Power Electronic differential has been suggested in the present work to sweep out the short comings of existing topology (Ezhilarasi, 2020). This proposed novel differential system efficiently and effectively utilizes the energy resources.…”
Section: Proposed Topologymentioning
confidence: 99%
“…A multiple dependent state variable sampling plans with process loss consideration was designed by AslamYen and Chang in the year 2014 (Aslam, 2014;Garikapati, 2020;Ezhilarasi, 2020) .In the year 2015, a flexible process-capability-qualified resubmission-allowed acceptance sampling scheme was made (Wu,2015; by Shu, Nugroho, and Kurniati , A repetitive group sampling plan based on the process capability index for the lot acceptance problem was introduced by Nezhad and Seifi in 2017 (Nezhad, 2017;Deepthi;Aroulanandam, 2020).Againin 2018 and 2019, Aslam has done a multiple dependent state repetitive sampling plans for one-Sided process capability indices (Aslam, 2019;DevaArul, 2011;Rebecca, 2019;Yen,2018;Sneha, 2020). Deva Arul , Edna and Jemmy designed mixed sampling plans for costly or destructive items in the year 2011 and 2019.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Accordingly, identical details will be encrypted using various security techniques such as cryptographic algorithms and the Advanced Encryption Standard (AES) algorithm.Established protective systems use cryptography, steganalysis, or a combination of the two. There is a unique, protected, and optimal means of image encryption that keeps unauthorized communications at bay [16][17][18][19][20][21][22][23].…”
Section: Research Gapmentioning
confidence: 99%