PRIVACY PRESERVING DATA MINING USING MULTIPLE OBJECTIVE OPTIMIZATIONV. Shyamala Susan1, T. Christopher2
|
IMPLEMENTATION AND COMPARISON OF DIFFERENT CIC FILTER STRUCTURE FOR DECIMATIONM. Madheswaran1, V. Jayaprakasan2
|
MEL-SPECTROGRAM-BASED DEEPFAKE AUDIO DETECTION USING CONVOLUTIONAL NEURAL NETWORKS: A NOVEL APPROACHG. Fathima, S. Kiruthika, M. Malar, T. Nivethini
|
A NOVEL HYBRID SCHEME FOR CONTENTION MINIMIZATION IN OPTICAL BURST SWITCHED NETWORKDilip H. Patel1, Kiritkumar Bhatt2, Jaymin Bhalani3
|
AN ANALYTICAL STUDY ON THE LATENT FINGERPRINT RECOGNITION TECHNIQUESTarun Kumar, Ravi Shankar Garg
|
DETECTION OF INTRUSION IN WIRELESS SENSOR NETWORKS USING AI APPROACHK. Periyakaruppan1,M.S. Kavitha2,B. Chellaprabha3,D. Manohari4
|