DECENTRALIZED BLOCKCHAIN WITH CONVOLUTIONAL NEURAL NETWORK MODEL FOR SECURITY ATTACK MITIGATIONC. Berin Jones1, D. Jeba Kingsley2
|
SINGLE PORT SENSING AND COMMUNICATING ANTENNA FOR COGNITIVE RADIO APPLICATIONSY Srinivas1, N V Koteswara Rao2
|
AN ENHANCED CLIENT CENTRIC SOFTWARE DEVELOPMENT LIFE CYCLE MODEL WITH COST AND EFFORT ESTIMATIONVanshika Rastogi, G. Swetha, E. Anantha Lakshmi, M. Pauline
|
AN ANALYSIS OF UNIFIED PAYMENTS INTERFACE (UPI): PAYER AND PAYEE PSP PERFORMANCE, UPI APPS, AND P2P AND P2M TRANSACTION TRENDS IN INDIAM. Dinesh Kumar
|
REVIEW OF PARALLEL GENETIC ALGORITHM BASED ON COMPUTING PARADIGM AND DIVERSITY IN SEARCH SPACEA. J. Umbarkar1, M. S. Joshi2
|
ANALYSIS OF DEEP LEARNING INTRUSION DETECTION SYSTEMS USING PRIVACY-PRESERVING TECHNIQUEMayank Hindka
|