SECURE AND TRANSPARENT MODEL DEPLOYMENT USING ADDRESSING VULNERABILITIES IN INCEPTION-RESNET FOR AUTONOMOUS ROBOTICS AND MANUFACTURINGJohn Chembukkavu1, P.C. Remya2, M.K. Rachana3, P. Santhi4, P.S. Suvitha5
|
METHODS, APPROACHES, PRINCIPLES, GUIDELINES AND APPLICATIONS ON MULTILINGUAL ONTOLOGIES: A SURVEYRavi Lourdusamy, Joseph Merlin Florrence
|
DESIGN OF TWO DIMENSIONAL PHOTONIC CRYSTAL RING RESONATOR BASED DEMULTIPLEXERR. Masilamani, S. Robinson
|
SECURE ASSOCIATION RULE MINING ON VERTICALLY PARTITIONED DATA USING FULLY HOMOMORPHIC ENCRYPTIONM Yogasini 1, B N Prathibha2
|
BROADBAND CPW FED POLARIZATION RECONFIGURABLE ANTENNA FOR UNIVERSAL UHF RFID READERSateesh Virothu, M Satya Anuradha
|
QUANTUM-RESISTANT CRYPTOGRAPHIC ALGORITHMS FOR SECURE COMMUNICATIONS. Vijay1, S. Priya2, C.N. Harshavardhana3, R. Kemparaju4
|