scispace - formally typeset
J

Jithina Jose

Researcher at Sathyabama University

Publications -  18
Citations -  72

Jithina Jose is an academic researcher from Sathyabama University. The author has contributed to research in topics: Cloud computing & Computer science. The author has an hindex of 4, co-authored 16 publications receiving 33 citations.

Papers
More filters
Proceedings ArticleDOI

Implementation of a Privacy Preserving and Loss Data Retrieval System for Cloud Environment

TL;DR: Here Hash-Solomon code calculation is intended to isolate information into various parts to secure the information data and afterward, it can show the security and proficiency in the plan.
Proceedings ArticleDOI

IoT based Smart Warehouse and Crop Monitoring System

TL;DR: In this article, a sensing element based mostly module that monitors and additionally controls the deposition system is proposed to assist the farmer, in order to protect the crops that are stored in a warehouse, an IoT enabled observation system is planned to be deployed in remote areas, wherever the accessibility is incredibly minimum for farmers with smart storage facilities.
Book ChapterDOI

Breast Cancer Detection Using Machine Learning

TL;DR: The current technique does not detect breast cancer reliably in the early stages, and most women have suffered from this, so an integrated system that can help diagnose earlier breast cancer is proposed.
Journal ArticleDOI

Movie success prediction using recommendation techniques

TL;DR: A film advice network that has capability to suggest films to a recent consumer also the others is advocated, which mines film databases that have to gather all of the important information, which include reputation and attractiveness, required for recommendation.
Proceedings ArticleDOI

Analysing Android App Privacy Using Classification Algorithm

TL;DR: It has been proposed that, an individual who needs to perform the establishment and utilize any 1/3 festival application doesn't perceive the significance and which methods for the consents mentioned by method for an application, and along these lines sincerely gives all the authorizations as a final product of which unsafe applications furthermore get set up and work their malevolent leisure activity in the rear of the scene.