DMAC-AN INTEGRATED ENCRYPTION SCHEME WITH RSA FOR AC TO OBSTRUCT INFERENCE ATTACKSR. Jeeva
|
HARDWARE IMPLEMENTATION OF SECURE AODV FOR WIRELESS SENSOR NETWORKSS. Sharmila1, G. Umamaheshwari2, M. Ruckshana3
|
EMOGAN LABEL-CHANGING APPROACH FOR EMOTIONAL STATE ANALYSIS IN MOBILE COMMUNICATION USING MONKEY ALGORITHMP. Ramesh Babu1, R. Nandhi Kesavan2, A. Sivaramakrishnan3, G. Sai Chaitanya Kumar4
|
NEUROIMAGING AND PATTERN RECOGNITION TECHNIQUES FOR AUTOMATIC DETECTION OF ALZHEIMER’S DISEASE: A REVIEWRupali Kamathe1, Kalyani Joshi2
|
DIMENSIONALITY REDUCTION BASED CLASSIFICATION USING GENERATIVE ADVERSARIAL NETWORKS DATASET GENERATIONG. Narendra1,D. Sivakumar2
|
PERFORMANCE ENHANCEMENTS OF ENTERPRISE INFORMATION SYSTEMS BASED ON INTRANET CORPORATE NETWORK MODELB. Sreelekha
|