DETECTING THE SIDE CHANNEL ATTACK IN EMBEDDED PROCESSORS USING FEDERATED MODELJ. Seetha1, Ananda Ravuri2, Yamini Tondepu3, T. Kuntavai4
|
PERFORMANCE ANALYSIS OF ANOMALOUS DETECTION SCEHMES BASED ON MODIFIED SUPPORT VECTOR MACHINE AND ENHANCED RELEVANCE VECTOR MACHINES Senthil Kumar, S Mythili
|
DESIGN OF H-SHAPE MICROSTRIP PATCH ANTENNA FOR WEARABLE APPLICATIONS TO DETECT THE THYROID GLAND CANCER CELLSJ Jenisha, K Madhan Kumar
|
THE MODERATING ROLE OF JOB SATISFACTION IN THE RELATION BETWEEN PERSONALITY TRAITS AND ORGANIZATIONAL CITIZENSHIP BEHAVIORR. Uma
|
PERFORMANCE ANALYSIS OF AN EFFICIENT FRAMEWORK FOR INTRUSION DETECTION SYSTEM USING DATA MINING TECHNIQUESC Amali Pushpam1,J Gnana Jayanthi2
|
COMPARATIVE ANALYSIS OF EV-MOGA AND GODLIKE MULTIOBJECTIVE EVOLUTIONARY ALGORITHMS FOR RISK BASED OPTIMAL POWER SCHEDULING OF A VIRTUAL POWER PLANTMahesh S. Narkhede1, S. Chatterji2, Smarajit Ghosh3
|