DETECTING DECEPTIVE REVIEWS: AN INTEGRATED MACHINE LEARNING APPROACHAnusuya Krishnan1, Kennedyraj2
|
GENETIC ALGORITHM WITH LEACH PROTOCOL FOR CLUSTER HEAD SELECTION IN WIRELESS SENSOR NETWORKSAjay Khunteta, Anurag Bajpai
|
STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHMR.S. Gutte1, Y.D. Chincholkar2 and P.U. Lahane3
|
OPTIMIZATION OF MANET WITH MIMO FOR FOREST APPLICATION USING ADVANCED ANTENNA MODELSK Periyakaruppan1, D Manohari2, M S Kavitha3, B Chellaprabha4
|
PERFORMANCE AND RELIABILITY ANALYSIS FOR VLSI CIRCUITS USING 45nm TECHNOLOGYNavaid Zafar Rizvi, Herman Al Ayubi
|
SECURE TRANSMISSION OF BIO-MEDICAL DATA USING STEGANOGRAPHYS Thenmozhi, P Sureka, Ramgopal Segu
|