DETECTING MALICIOUS VEHICLE IN A VANET SCENARIO BY INCORPORATING SECURITY IN AODV PROTOCOLV. Lakshmi Praba1 and A. Ranichitra2
|
SECURE CONTENT DE-DUPLICATION UTILIZING EFFICIENT CONTENT DISCOVERY AND PRESERVING DE-DUPLICATION (ECDPDA Mathew Branesh, S Johnson, F Antony Xavier Bronson
|
SCHEDULING AND OPTIMIZATION OF RESOURCES IN EDGE COMPUTING USING RANDOM ALLOCATION AND MAX FIT ALLOCATIONP. Priya Ponnuswamy, C.P. Shabariram
|
METHODS, APPROACHES, PRINCIPLES, GUIDELINES AND APPLICATIONS ON MULTILINGUAL ONTOLOGIES: A SURVEYRavi Lourdusamy, Joseph Merlin Florrence
|
MULTIMEDIA CONTENT ANALYSIS FOR ALZHEIMER’S DISEASE DIAGNOSIS USING MRI SCANS AND DEEP LEARNINGRoomana Hasan1, V. Vijaya Kumar Raju2, M. Pratussha3, Munigeti Benjmin Jashva4, S. Pavithra5
|
DETECTION AND CLASSIFICATION OF BREAST CANCER USING SUPPORT VECTOR MACHINE AND ARTIFICIAL NEURAL NETWORK USING CONTOURLET TRANSFORMSoumya Hundekar, Saritha Chakrasali
|