ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORKS. C. Dutta1, Sudha Singh2, D. K. Singh3
|
LOAD PROFILE CLUSTERING: AN ALGORITHMIC APPROACH WITH IMPROVED REPLACEMENT IN BEE OPTIMIZATION ALGORITHMK. Kalyani1, T. Chakravarthy2
|
A FACTORIAL MODEL ON PROPAGATION OF AKSHAYA TELECENTRES AMONG GRAMA-PANCHAYATHS IN KERALAS. Sreejith1, S. Ganesan2, Hareesh N Ramanathan3
|
CLASSIFICATION OF BRAIN TUMOR USING BEES SWARM OPTIMISATIONM Ramkumar1, M Babu2, R Lakshminarayanan3
|
MEL-SPECTROGRAM-BASED DEEPFAKE AUDIO DETECTION USING CONVOLUTIONAL NEURAL NETWORKS: A NOVEL APPROACHG. Fathima, S. Kiruthika, M. Malar, T. Nivethini
|
HARDWARE SECURITY MODEL WITH VEDIC MULTIPLIER BASED ECC ALGORITHM ON HIGH-PERFORMANCE FPGA DEVICESaurabh Singh, Sunita Soni
|