CERTAIN INVESTIGATIONS ON VARIOUS ALGORITHMS THAT IS USED TO CLASSIFY MALWARE AND GOODWARE IN ANDROID APPLICATIONSB.P. Sreejith Vignesh1, M. Rajesh Babu2
|
MOVEMENT CONTROL OF AMPHIBIOUS ROBOT USING IMC BASED PID CONTROLLER WITH FUZZY LOGIC OPTIMIZATIONGargi Phadke, Shamal Salunkhe, Supriya Bhuran
|
AN EFFICIENT DATA MINING METHOD TO FIND FREQUENT ITEM SETS IN LARGE DATABASE USING TR- FCTMSaravanan Suba1, T. Christopher2
|
PERFORMANCE EVALUATION OF LEADING FMCG FIRMSsSri Ayan Chakraborty
|
BAC: BANDWIDTH BASED ADMISSION CONTROL SCHEME FOR GATEWAY RELOCATION IN IEEE 802.16e NETWORKSM. Deva Priya1, M.L. Valarmathi2, K. Jaya Bharathi3 and M. Deepa4
|
A NEW APPROACH ON SHORTEST PATH IN FUZZY ENVIRONMENTA. Nagoorgani1, A. Mumtaj Begam2
|