SECURE AND TRANSPARENT MODEL DEPLOYMENT USING ADDRESSING VULNERABILITIES IN INCEPTION-RESNET FOR AUTONOMOUS ROBOTICS AND MANUFACTURINGJohn Chembukkavu1, P.C. Remya2, M.K. Rachana3, P. Santhi4, P.S. Suvitha5
|
BRAIN MR IMAGE SEGMENTATION BY MODIFIED ACTIVE CONTOURS AND CONTOURLET TRANSFORMP Nageswara Reddy1, C P V N J Mohan Rao2, Ch Satyanarayana3
|
AN ADAPTIVE PATTERN-DRIVEN OPTIMIZATION - TAILOR-INSPIRED METAHEURISTIC FOR SOLVING CONSTRAINED REAL-WORLD OPTIMIZATION PROBLEMSKarthik Chandran1, Vishal Sharad Hingmire2
|
ARM BASED SECURITY SYSTEM USING LINEAR DISCRIMINANT ANALYSISF Maria Hadria, S Jayanthy
|
DATA ENCRYPTION STANDARD FOR AUDITING APPLICATION IN CLOUD STORAGEM Ramkumar, R Krishnakumar
|
MULTI-LEVEL NETWORK RESILIENCE: TRAFFIC ANALYSIS, ANOMALY DETECTION AND SIMULATIONAngelos Marnerides1, Cyriac James2, Alberto Schaeffer-Filho3, Saad Yunus Sait4, Andreas Mauthe5 and Hema Murthy6
|