BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINESV. Dheepa1 , R. Dhanapal2
|
AN EFFICIENT ENVIRONMENTAL CHANNEL MODELLING IN 802.11P MAC PROTOCOL FOR V2IS Neelambike1, J Chandrika2
|
IMPLEMENTATION OF SOFT PROCESSOR BASED SOC FOR JPEG COMPRESSION ON FPGAK.S.V. Swarna1, Y. David Solomon Raju2
|
AN INTEGRATIVE REVIEW ON FACTORS AFFECTING KAIZEN IMPLEMENTATION IN PRIVATE AND GOVERNMENT OWNED ORGANIZATIONS IN ETHIOPIA - GAPS ON EXISTING LITERATURES AND INSIGHTS FOR FUTURE RESEARCHERSMelkamu Temesgen Tariku, Abdurohman Awol Adem
|
ANNA: A UNIFIED FRAMEWORK FOR DATA SECURITY IN HEALTHCARE INTERNET OF THINGSR Shantha Mary Joshitta, L Arockiam
|
DESIGN OF CARRY DEPENDENT SUM ADDER USING REVERSIBLE LOGICM C Parameshwara
|