AN INVESTIGATION OF SECURITY TECHNIQUES FOR CONCEALED DDOS EXPOSURE ATTACKSK Praghash1, M Masthan2, R Ravi3
|
A DYNAMIC SPECTRUM ACCESS OPTIMIZATION MODEL FOR COGNITIVE RADIO WIRELESS SENSOR NETWORKT V Saroja1, Lata L Ragha2, Satyendra Kumar Sharma3
|
A RELIABLE FAST AND IDEAL TRAFFIC AWARE SECURE ROUTING PROTOCOL BASED ON MULTI-HOP CROSS SITE LEAPING FOR EFFICIENT PACKET TRANSMISSION IN WSNA Ambeth Raja1, A Udhaya Kumar2
|
SKIN CANCER DETECTION USING SUPPORT VECTOR MACHINE WITH HISTOGRAM OF ORIENTED GRADIENTS FEATURESG Neela Krishna Babu 1, V Joseph Peter 2
|
FAILURE RATE ESTIMATION IN FIELD FOR A DEFECT, IN FUNCTION OF MANUFACTURING DEFECTIVITY DENSITY - CASE STUDY FOR A GATE OXIDE RUPTURE ON VALVE DRIVER IN AUTOMOTIVE SEMICONDUCTORCorinne Berges
|
FAULT TOLERANCE IN JOB SCHEDULING THROUGH FAULT MANAGEMENT FRAMEWORK USING SOA IN GRIDV. Indhumathi1, G.M. Nasira2
|