A COMPARATIVE STUDY ON CYBER SECURITY THREATS DETECTION IN INTERNET OF THINGSP Vijayalakshmi1, D Karthika2
|
ORDERING OF FOOD THROUGH ONLINE - AN EMPIRICAL STUDY AMONG YOUNG ADULTSS Ramesh Babu1, R Arthy2
|
IMPROVING THE PERFORMANCE OF SOLAR POWER PLANTS IN GRID CONNECTED MODES USING ALTRUISTIC TRANSFORMATIVE ALGORITHMR Palanisamy1, K Sathiyasekar2, P L N Ramesh3, K G Parthiban4
|
SUPPORT VECTOR MACHINE BASED INTRUSION DETECTION SYSTEM IN FOG COMPUTINGM Ramkumar
|
SCENE TEXT SEGMENTATION BY APPLYING TRIMMED MEDIAN FILTER USING ENERGETIC EDGET Beula Bell1, BM K Jeya Kumar2
|
AN EMPIRICAL ANALYSIS OF TRADING STRATEGY BASED ON SIMPLE MOVING AVERAGE CROSSOVERSP Arumugam, R Saranya
|