A STATE OF THE ART SURVEY ON POLYMORPHIC MALWARE ANALYSIS AND DETECTION TECHNIQUESEmmanuel Masabo1, Kyanda Swaib Kaawaase2, Julianne Sansa-Otim3, John Ngubiri4, Damien Hanyurwimfura5
|
A WAVELET TRANSFORM BASED WATERMARKING ALGORITHM FOR PROTECTING COPYRIGHTS OF DIGITAL IMAGESDivya A, Priya H. K
|
FINANCIAL RATIO ANALYSIS OF SBI [2009 - 2016]S Subalakshmi1, S Grahalakshmi2, M Manikandan3
|
DESIGN AND SIMULATION OF DRIFT-DIFFUSION AND HYDRODYNAMIC MODELS FOR AlGaN/GaN HEMTsSunil Kumar1, Vimal Kumar Agrawal2
|
PERFORMANCE ANALYSIS OF DSR ROUTING PROTOCOL UNDER ENERGY BASED SELFISH ATTACK IN MOBILE AD HOC NETWORKST.V.P.Sundararajan, A.Shanmugam
|
DYNAMIC BANDWIDTH ALLOCATION SCHEME FOR ENHANCED PERFORMANCE IN 5G POINT-TO-POINT NETWORKSK.S. Tanuja1, C.V. Shanmukaswamy2, H.B. Gurushankar3, H.A. Dinesh4
|