D2D COMMUNICATION ON LTE FOR DISASTER MANAGEMENT AND EMERGENCY RESCUE OPERATIONSJ T Devaraju1, Swetha2
|
CLOUD DATA PROTECTION USING WEIBULL DISTRIBUTED RECURRENT NEURAL ERGODIC SIGNCRYPTIONJ. Mala
|
ICA BASED DIGITAL IMAGE WATERMARKING BASED ON REDUNDANT DISCRETE WAVELET TRANSFORMG. Thirugnanam1 and S. Arulselvi2
|
MULTI-LEVEL NETWORK RESILIENCE: TRAFFIC ANALYSIS, ANOMALY DETECTION AND SIMULATIONAngelos Marnerides1, Cyriac James2, Alberto Schaeffer-Filho3, Saad Yunus Sait4, Andreas Mauthe5 and Hema Murthy6
|
APPLICATION OF SVM AND SOFT FEATURES TO AZERBAIJANI TEXT RECOGNITIONElviz A Ismayilov
|
ADDRESSING THE INVESTORS DILEMMA USING PAIRS TRADING - CO-INTEGRATIONAL STUDY OF INDIAN STOCKSRajib Bhattacharya1, Shuvashish Roy2, Sarmistha Sarma3
|