EFFICIENCY AND EFFECTIVENESS ANALYSIS OVER ECC-BASED DIRECT AND INDIRECT AUTHENTICATION PROTOCOLS: AN EXTENSIVE COMPARATIVE STUDYK. Thilagavathi1 and P.G.Rajeswari2
|
ULTRA-LOW POWER VOLTAGE REFERENCE CIRCUIT UTILIZING A THRESHOLD VOLTAGE DIFFERENCE BETWEEN TWO CNFETSS B Rahane1, A K Kureshi2, G K Kharate3
|
DETECTION AND CLASSIFICATION OF COMPLEX POWER QUALITY DISTURBANCES USING DISCRETE WAVELET TRANSFORM AND RULE BASED DECISION TREENitin Kumar Suyan1,Mahendra Kumar2, Fateh L Lohar3, Deepak Agrawal4
|
CERTAIN INVESTIGATIONS ON VARIOUS ALGORITHMS THAT IS USED TO CLASSIFY MALWARE AND GOODWARE IN ANDROID APPLICATIONSB.P. Sreejith Vignesh1, M. Rajesh Babu2
|
SWARM OPTIMIZATION BASED IMPOSTER NODES AND RESOURCE LIMITATION AWARE NODE FAILURE DETECTIONK B Manikandan
|
A COMPARATIVE STUDY ON THE PERCEIVED APPLICABILITY OF HONEY BEE MATING OPTIMIZATION ALGORITHM (HBMO) AND PARTICLE SWARM OPTIMIZATION (PSO) ALGORITHM BY APPLYING THREE FACTOR THEORY AMONG RESEARCHERS IN TAMIL NADUK. Kalyani, T. Chakravarthi
|