ADVANCING FACE SPOOFING DETECTION WITH LBP, PCA, AND SVM: A ROBUST AI SECURITY APPROACHAparna Pandey, Arvind Kumar Tiwari
|
CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS - A SURVEYAmol H Shinde1, A J Umbarkar2, N R Pillai3
|
WORD SENSE DISAMBIGUATION METHOD USING SEMANTIC SIMILARITY MEASURES AND OWA OPERATORKanika Mittal1, Amita Jain2
|
AN IMPROVED NANOSCALE QUASI-BALLISTIC DOUBLE GATE (DG) MOSFET MODEL WITH DRAIN BIAS DEPENDENCY ON CRITICAL CHANNEL LENGTH NEAR THE LOW FIELD SOURCE REGION BY SEMI-EMPIRICAL APPROACHVyas R Murnal1, C Vijaya2
|
AI POWER ALLOCATION AND USER FAIRNESS IN 6G NOMA NETWORKS USING MACHINE LEARNINGN. Vijayaraghavan1, R. Thiagarajan2
|
ENERGY EFFICIENT BASED SECURE DATA TRANSMISSION FOR MULTI HOP TRUST MANAGEMENT TECHNIQUE USING WIRELESS SENSOR NETWORKS Gayathri1,A Senthilkumar2
|