POST-QUANTUM CRYPTOGRAPHY FOR SECURE 5G AND IOT: LATTICE-BASED ENCRYPTION SCHEMESM Poomani1, Bikash Chandra Saha2
|
SARCASM DETECTION ON TWITTER DATA USING SUPPORT VECTOR MACHINEAshima Garg, Neelam Duhan
|
DESIGN OF MICROSTRIP RADIATOR USING PARTICLE SWARM OPTIMIZATION TECHNIQUEYogesh Kumar Choukiker1 and Santanu Kumar Behera2
|
CLOSED FORM MODELING OF CROSSTALK FOR DISTRIBUTED RLCG ON-CHIP INTERCONNECTS USING DIFFERENCE MODEL APPROACHRajib Kar, Vikas Maheshwari, Md. Maqbool, A.K.Mal, A.K. Bhattacharjee
|
ATTACK DETECTION IN EDGE NETWORKS WITH CONVOLUTIONAL NEURAL NETWORK BASED INSTRUCTION DETECTION SYSTEMM Keerthana
|
DESIGN AND DEVELOPMENT OF TWO ELEMENT SERIES-FED TWO DIPOLE ANTENNA FOR WLAN BASE STATION APPLICATIONSG Geetharamani, T Aathmanesan
|