FOG ENABLED PRIVATE BLOCKCHAIN-BASED IDENTITY AUTHENTICATION SCHEME FOR OIL AND GAS FIELD MONITORINGAbdulla J. Y. Aldarwish1, Kalyani Patel2, Aqeel A. Yaseen3, Ali A. Yassin4, Zaid Ameen Abduljabbar5
|
INTELLIGENT TRAFFIC MANAGEMENT FOR VEHICULAR NETWORKS USING MACHINE LEARNINGVaishali Shirsath1, Vikas Kaul2, R. Sampath Kumar3, Bhushankumar Nemade4
|
AN EVALUATION OF PERFORMANCE INDICATORS OF EMPLOYEE MOTIVATION OF THE DISSERTATION WORK IN A MODERN ORGANIZATIONM Sandeep Reddy
|
ADVANCING INFORMATION TECHNOLOGY WITH IMMUNOLOGICAL COMPUTING – SOFT COMPUTING TECHNIQUES FOR ADAPTIVE AND ROBUST SYSTEMSS. Kaliswaran1, R. Sivasankari2, Attru Hanumantharao3, V. Saravanan4, G. Gokul Kumari5
|
USE OF ATTRIBUTE BASED ENCRYPTION FOR SECURE DATA ACCESS CONTROL IN MOBILE CLOUD COMPUTING - A CASE STUDYU Sujatha1, U Saranya2, C P Boopathy3
|
SSD DISCORE - A SCORING METHOD FOR SSD'S DATA INTEGRITY VALIDATION USING DIFFERENT SMART ATTRIBUTES IN THE DIGITAL FORENSICS PROCESSAbdul Shareef Pallivalappil , S.N. Jagadeesha
|