BLOCKCHAIN-POWERED INTRUDER IDENTIFICATION IN IOT NETWORKS - METHODOLOGY AND IMPLEMENTATIONV. Thiruppathy Kesavan1, D. Danalakshmi2, R.Gopi3
|
IMPROVING THE REQUIREMENTS BASED BANDWIDTH ALLOCATION IN 5G POINT TO POINT NETWORKSJagannath Jadhav1, L.P. Sajitha2, M.P. Haripriya3, Mohammad Shahnawaz Shaikh4
|
A SELF-ORGANIZED RESOURCE ALLOCATION USING INTER-CELL INTERFERENCE COORDINATION (ICIC) IN RELAY-ASSISTED CELLULAR NETWORKSMahima Mehta1, Osianoh Glenn Aliu2, Abhay Karandikar3 and Muhammad Ali Imran4
|
QUANTUM-RESISTANT CRYPTOGRAPHIC ALGORITHMS FOR SECURE COMMUNICATIONS. Vijay1, S. Priya2, C.N. Harshavardhana3, R. Kemparaju4
|
MULTI MODAL ONTOLOGY SEARCH FOR SEMANTIC IMAGE RETRIEVALR.I. Minu1 and K.K. Thyagharajan2
|
ENHANCING ATM SECURITY USING FINGERPRINTS Jathumithran, V Thamilarasan, A Piratheepan, P Rushanthini, J Mercy veniancya, P Nirupa, K Thiruthanigesan
|