SECURING IT NETWORKING ENVIRONMENT IN CRAN USING DEHAENE–CHANGEUX MODEL DRIVEN MOTH-FLAME OPTIMIZATIONRahul Laxmanrao Paikrao1, Prashant Laxmanrao Paikrao2
|
SYSTEM FRAMEWORK AND DATA COMMUNICATION FOR NAMED DATA NETWORKING: NDNT Vinodh Kannan1, M Vijayalakshmi2, N V Kousik3, M R Manu4
|
A STUDY OF ONLINE PURCHASE BEHAVIOUR OF CUSTOMERS IN INDIAUpasana Kanchan1, Naveen Kumar2, Abhishek Gupta3
|
A STUDY ON IMPACT OF TOP MANAGEMENT COMMITMENT ON ISO 9001 STANDARD IN MANUFACTURING ORGANISATIONSS R Bharamanaikar1, Suryakumar N. Khanai2
|
A METHOD FOR OBTAINING SECURE AND EFFICIENT GROUP KEY OVER WIRELESS AD-HOC NETWORKS BASED ON A VIRTUAL SUBNET MODELPJ A Alphonse, Y Venkatramana Reddy
|
EFFICIENTNET FOR HUMAN FER USING TRANSFER LEARNINGRajesh Singh1, Himanshu Sharma2, Naval Kishore Mehta3, Anil Vohra4, Sanjay Singh5
|