EFFICIENCY AND EFFECTIVENESS ANALYSIS OVER ECC-BASED DIRECT AND INDIRECT AUTHENTICATION PROTOCOLS: AN EXTENSIVE COMPARATIVE STUDYK. Thilagavathi1 and P.G.Rajeswari2
|
FUZZY BASED OPTIMIZATION FOR IMPROVING THE TRUST SCORE IN MANETSK. Karunambiga1, M. Sathiya2, S. Bhaggiaraj3, K.C. Rajheshwari4
|
SUPERVISED ALIAS NAME VALIDATION USING STATISTICAL SIMILARITY COEFFICIENTSA. Suruliandi, P. Selvaperumal, T. Dhiliphan Rajkumar
|
NEUROIMAGING AND PATTERN RECOGNITION TECHNIQUES FOR AUTOMATIC DETECTION OF ALZHEIMER’S DISEASE: A REVIEWRupali Kamathe1, Kalyani Joshi2
|
RADIANCE DOMAIN COMPOSITING FOR HIGH DYNAMIC RANGE IMAGINGM.R. Renu
|
CODEVECTOR MODELING USING LOCAL POLYNOMIAL REGRESSION FOR VECTOR QUANTIZATION BASED IMAGE COMPRESSIONP. Arockia Jansi Rani, V. Sadasivam
|