MISSING VALUE IMPUTATION AND NORMALIZATION TECHNIQUES IN MYOCARDIAL INFARCTIONK Manimekalai1, A Kavitha2
|
BLOCKCHAIN-ENHANCED SECURE AUTHENTICATION FOR WIRELESS SENSOR NETWORKS USING CONSORTIUM BLOCKCHAIN AND FUZZY EXTRACTOR Mary Vasanthi Soosaimariyan
|
PERFORMANCE EVALUATION OF INTEGRATED MACRO AND MICRO MOBILITY PROTOCOLS FOR WIDE AREA WIRELESS NETWORKSR.Gunasundari1, A.R.Gunabarathy2
|
DESIGN AND ANALYSIS OF LEAKY WAVE ANTENNA TO GENERATE THE BESSEL BEAMNikita Nikam, S S Narkhede
|
APPLYING SOFT COMPUTING METHODS IN BUSINESS ANALYTICS USING HYBRID GENETIC ALGORITHMSP. Senthil Pandian1, Sudhir Anakal2, C. Padmavathy3, Nagarjuna Pitty4
|
LOAD BALANCING IN CLOUD USING META-HEURISTIC BEES SWARM SCHEDULINGM Ramesh
|