AN INVESTIGATION OF SECURITY TECHNIQUES FOR CONCEALED DDOS EXPOSURE ATTACKSK Praghash1, M Masthan2, R Ravi3
|
AN IMPROVED GRU BASED ON RECURRENT ATTENTION UNIT AND SELF- ATTENTION TECHNIQUE FOR TEXT SENTIMENT ANALYSISDhurgham Ali Mohammed1, Kalyani A. Patel2
|
FUSION OF VENTURI AND ULTRASONIC FLOW METER FOR ENHANCED FLOW METER CHARACTERISTICS USING FUZZY LOGICK.V. Santhosh
|
A SWITCHING ALGORITHM USING MODIFIED SELECTION SORT FOR THE REDUCTION OF IMPULSE NOISEK. Vasanth1, S. Karthik2
|
CUSTOMER SERVICE IN BANKS AND ITS IMPORTANCE IN TAMILNADUN Selvaraj1
|
A STATE OF THE ART SURVEY ON POLYMORPHIC MALWARE ANALYSIS AND DETECTION TECHNIQUESEmmanuel Masabo1, Kyanda Swaib Kaawaase2, Julianne Sansa-Otim3, John Ngubiri4, Damien Hanyurwimfura5
|