EFFECTIVE CLUSTERING AND CERTIFICATELESS ENCRYPTION TECHNIQUES IN THE MILITARY DOMAIN FOR ATTACK DETECTIONS. Rajesh1, M.S. Premapriya2, A. Jayasmruthi3, V. Muthu Lakshmi4
|
ANALYSE THE PERFORMANCE OF ENSEMBLE CLASSIFIERS USING SAMPLING TECHNIQUES M. Balamurugan, S. Kannan
|
PEAK-TO-AVERAGE POWER RATIO REDUCTION USING CODING AND HYBRID TECHNIQUES FOR OFDM SYSTEMBahubali K. Shiragapur, Uday Wali
|
A COMPARATIVE STUDY ON CYBER SECURITY THREATS DETECTION IN INTERNET OF THINGSP Vijayalakshmi1, D Karthika2
|
OBJECT DETECTION USING SEMI SUPERVISED LEARNING METHODSShymala Gowri Selvaganapathy, N. Hema Priya, P.D. Rathika and K. Venkatachalam
|
ANALYSIS OF STACKED ANTENNA IN SATELLITE APPLICATIONS Jayasri1, A Daniel2
|