PERFORMANCE ANALYSIS OF AN EFFICIENT FRAMEWORK FOR INTRUSION DETECTION SYSTEM USING DATA MINING TECHNIQUESC Amali Pushpam1,J Gnana Jayanthi2
|
CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERYSowmiya Murthy
|
FOUR-LAYER SPHERICAL SELF-ORGANIZED MAPS NEURAL NETWORKS TRAINED BY RECIRCULATION TO FOLLOW THE PHASE EVOLUTION OF A NEARLY FOUR-YEAR RAINFALL SIGNALDario Alberto Huggenberger
|
PERFORMANCE COMPARISON AMONG LOCAL AND FOREIGN UNIVERSITIES WEBSITES USING SEO TOOLSKamran Rasheed1, Muhammad Noman2, Muhammad Imran3, Muhammad Iqbal4, Zujaj Misbah Khan5, Malik Muneeb Abid6
|
CLASSIFICATION OF DIABETES DISEASE USING MACHINE LEARNING ALGORITHMSNirjharini Mohanty, Soumen Nayak, Monarch Saha, Vishal Baral, Imlee Rout
|
MQARR-AODV: A NOVEL MULTIPATH QOS AWARE RELIABLE REVERSE ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORKSK.G. Santhiya1 and N. Arumugam2
|