A COMPARATIVE STUDY ON CYBER SECURITY THREATS DETECTION IN INTERNET OF THINGSP Vijayalakshmi1, D Karthika2
|
A SOLUTION TO THE DOUBLE DUMMY CONTRACT BRIDGE PROBLEM INFLUENCED BY SUPERVISED LEARNING MODULE ADAPTED BY ARTIFICIAL NEURAL NETWORKM. Dharmalingam, R. Amalraj
|
AGE INVARIANT FACE RECOGNITION USING QUADRATIC SUPPORT VECTOR MACHINE – PRINCIPAL COMPONENT ANALYSISDeepika1, Priyanka2
|
ELECTRONICALLY TUNABLE LC HIGH PASS LADDER FILTER USING OTRANeeta Pandey, Venkatesh Kumar, Aayush Goel, Ankit Gupta
|
CONSTRUCTING LOW-DENSITY PARITY-CHECK CODES IN DIGITAL COMMUNICATION SYSTEMP Dhivya Lakshmi
|
PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORMS. Prasanna1, M. Gobi2
|