A COMPARATIVE STUDY ON CYBER SECURITY THREATS DETECTION IN INTERNET OF THINGSP Vijayalakshmi1, D Karthika2
|
A PROCESS IMPROVEMENT MODEL BASED ON QUANTITATIVE MANAGEMENT FOR SMALL AND MEDIUM SIZED SOFTWARE ORGANIZATIONSIl Nam Mun, Ki Son Ryang, Ryong Su Kim, Chol Ryong Choe
|
NON-PERFORMING ASSETS IN INDIAN BANKING AND THE ROLE OF ASSET RECONSTRUCTION COMPANIESAbhijit Sinha
|
DEEP LEARNING AND MACHINE LEARNING BASED HYBRID OPTIMIZATION FRAMEWORK FOR ENHANCED WEBSITE PERFORMANCE TUNINGP.C. Geethu1, Deena Jose2, N.M. Shejina3, M.B. Meethu4
|
DECENTRALIZED BLOCKCHAIN WITH CONVOLUTIONAL NEURAL NETWORK MODEL FOR SECURITY ATTACK MITIGATIONC. Berin Jones1, D. Jeba Kingsley2
|
IMAGE SEGMENTATION ANALYSIS BASED ON K-MEANS PSO BY USING THREE DISTANCE MEASURESElindra Ambar Pambudi, Pulung Nurtantio Andono, Ricardus Anggi Pramunendar
|