A Novel Approach for Sentiment Analysis of Public Posts
|
2019 |
Devi, J. Sirisha |
Efficient Network Security Virtualization Scheme
|
2019 |
Ghelani, Dharmesh |
Congestion Control in Backhaul Network Using Strongly Typed Genetic Programming
|
2019 |
Shahi, Bimlendu |
Privacy-Preserving Feature Learning on Cloud for Big Data
|
2019 |
Kulkarni, Varsha G. |
Topology Hiding of Connected Network Elements Using Diameter Protocol
|
2019 |
Jha, Divya |
Refinement of Manually Built Bayesian Networks Created by Domain Experts Based on Markov Assumption
|
2019 |
Bhimagavni, Naveen Kumar |
Comb Needle Model for Data Compression Based on Energy-Efficient Technique
|
2019 |
Abdul Raheem, Syed |
Quality of Service-Based Cloud Models in Manufacturing Process Automation
|
2019 |
Potluri, Sirisha |
Detection and Categorization of OnPlant Prunus Persica: A Novel Approach
|
2019 |
Jena, Junali Jasmine |
Threshold-Based Clustering of SAR Image Using Gaussian Kernel and Mean-Shift Methods
|
2019 |
Yadav, Sangeeta |
Design and Implementation of a Hacker Detection Scheme: A Network Security Measure in Heterogeneous WSN
|
2019 |
Srinivasa Rao, B. |
Performance Analysis of Image Denoising with Curvelet Transform in Detecting the Stego Noise
|
2019 |
Hemalatha, J. |
An Efficient Approach to Finger Vein Pattern Extraction Using Fuzzy Rule-Based System
|
2019 |
Joseph, Rose Bindu |
Terrain Smart Safety System with Data Hub Establishment
|
2019 |
Banik, Sayantika |
Bus Alert System for Blind in Real-Time Environment
|
2019 |
Patil, Sunita |
A Provable and User Revocable Ciphertext-Policy Attribute-Based Encryption with Updatable Ciphertext
|
2019 |
Aqeel, Humera |
Providing End-to-End Secure Communication in Wireless Network Using BGP Routing Technique
|
2019 |
Pandey, Varsha |
Stock Trading Bot Using Deep Reinforcement Learning
|
2019 |
Azhikodan, Akhil Raj |
WebGL-Based Game Engine
|
2019 |
Grandhi, Ritesh |
DDoS Attacks - Analysis and Prevention
|
2019 |
Dayanandam, G. |