A COMPARATIVE STUDY ON INTRUSION DETECTION SYSTEMS FOR SECURED COMMUNICATION IN INTERNET OF THINGSR Anushiya1, V S Lavanya2
|
EFFECTUAL HUMAN AUTHENTICATION FOR CRITICAL SECURITY APPLICATIONS USING RETINAL IMAGESL. Latha, M. Pabitha, S. Thangasamy
|
MULTI-AGENT INDEPENDENT NON-COOPERATIVE REINFORCEMENT LEARNING FOR LOAD BALANCING IN CLOUD HETEROGENEOUS NETWORKSTanu Kaistha1, Kiran Ahuja2
|
MACHINE LEARNING ALGORITHM FOR FINTECH INNOVATION IN BLOCKCHAIN APPLICATIONSV. Lakshmana Narayanan1, G. Ramesh Pandi2, K. Kaleeswari3, S. Veni4
|
ANALYSIS OF IMAGE PREPROCESSING TECHNIQUES TO IMPROVE OCR OF GARHWALI TEXT OBTAINED USING THE HINDI TESSERACT MODELSukhbindra Singh Rawat1,Ashutosh Sharma 2,Rachana Gusain3
|
AN ANALYSIS OF CLOUD COMPUTING SECURITY CHALLENGES - A CONCEPTUAL FRAMEWORK FOR CLOUD COMPUTING EARLY ADOPTERS AS A TECHNOLOGY MODELT Vinodh Kannan, M Arvindhan
|