COMPARISON OF PERFORMANCES OF DIFFERENT SVM IMPLEMENTATIONS WHEN USED FOR AUTOMATED EVALUATION OF DESCRIPTIVE ANSWERSC. Sunil Kumar1, R. J. Rama Sree2
|
HARDWARE SECURITY MODEL WITH VEDIC MULTIPLIER BASED ECC ALGORITHM ON HIGH-PERFORMANCE FPGA DEVICESaurabh Singh, Sunita Soni
|
ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS – A SURVEYK. Sankar
|
ENHANCED DEEP LEARNING-BASED TRUST MANAGEMENT FOR UNRELIABLE SERVICE DISCOVERY IN HIGHLY DYNAMIC SOC-MANET ENVIRONMENTSP. Ramya1, S. Venkatesh Babu2, D. Jebakumar Immanuel3
|
IMPLEMENTATION OF QOS BASED INNOVATIVE FRAMEWORK FOR WEB SERVICES SELECTION AND COMPOSITIONKhozema Shabbar1, Tarun Shrimali2, Ajay Chaudhary3
|
A CASE STUDY OF ELECTROMAGNETIC EXPOSURE FOR HIGH TENSION POWER LINES AND TRANSFORMER WITH AND WITHOUT BASE STATION ANTENNAKousik Roy1,Pratik Dey2, Naimul Hasan3, Susanta Kumar Parui4
|