A SURVEY ON DELAY AND NEIGHBOR NODE MONITORING BASED WORMHOLE ATTACK PREVENTION AND DETECTIONSudhir T Bagade1, Vijay T Raisinghani2
|
A PERFORMANCE COMPARISON ON DIFFERENTIAL PREDICTION BASED ALGORITHMS IN H.264/AVCD. Malarvizhi, R. Vanitha, A. Nandha Kumar
|
SECURE AND ENERGY AWARE TASK SCHEDULING IN CLOUD USING DEEP LEARNING AND CRYPTOGRAPHIC TECHNIQUESS Rekha1, C Kalaiselvi2
|
AI POWER ALLOCATION AND USER FAIRNESS IN 6G NOMA NETWORKS USING MACHINE LEARNINGN. Vijayaraghavan1, R. Thiagarajan2
|
ENSEMBLE DESIGN OF MASQUERADER DETECTION SYSTEMS FOR INFORMATION SECURITYT. Subbulakshmi1, S. Mercy Shalinie2, A. Ramamoorthi3
|
PRICE PROGNOSTICATION OF CURRENCY WITH DEEP LEARNINGManisha Patil, Sunita Nandgave, Gayatri Bedre, Shubhangi Ingale
|