SECURING WIRELESS SENSOR NETWORKS USING DEEP LEARNING-BASED APPROACH FOR ELIMINATING DATA MODIFICATION IN SENSOR NODESS. Karthigai1, Sushiladevi B. Vantamuri2, C. Arunpriya3, Vinod Desai4, A. Nicholas Daniel5
|
A NOVEL APPROACH OF DESIGNING RFID AUTHENTICATION PROTOCOL BASED ON SIMPLE SYMMETRIC KEY (SSK) ALGORITHMPrakash Kuppuswamy1, Shanmugasundaram2, Rajan John3
|
CAUSAL CONVOLUTION EMPLOYING ALMEIDA–PINEDA RECURRENT BACKPROPAGATION FOR MOBILE NETWORK DESIGNVidyabharathi Dakshinamurthi1, Syed Ibad Ali2, T. Karthikeyan3, Nanda Satish Kulkarni4
|
AUTOMATIC LICENSE PLATE LOCALISATION AND IDENTIFICATION VIA SIGNATURE ANALYSISLorita Angeline, Hou Pin Yoong, Hui Keng Lau, Ismail Saad, Kenneth Tze Kin Teo
|
OPTIMIZATION OF GRID RESOURCE SCHEDULING USING PARTICLE SWARM OPTIMIZATION ALGORITHMS. Selvakrishnan, V. Perumal
|
A PROPOSED NOVEL ARCHITECTURE OF EC CONTROL SYSTEM USING IEEE 802.11n NETWORK AT ITER-INDIA GYROTRON TEST FACILITYDeepak Mandge1, Nagendra P Gajjar2, Vipal Rathod3, Ronak Shah4, Rajvi Parmar5, S Laxmikanth Rao6
|