SOIL CLASSIFICATION USING ENSEMBLE DEEP LEARNING APPROACHES
1KOPPINENI SATYA SAI KUMAR, 2Dr. B V S Varma
1-9
PDF MODELLING AND STATIC ANALYSIS OF ALLOY WHEEL RIM USING CARBON EPOXY COMPOSITE, AL6061 AND STAINLESS 1Dr. G. Venkateswarlu,2Mandha Ajay 10-17 PDF MODELLING AND STATIC ANALYSIS OF DENTAL IMPLANT USING DIFFERENT BIOMEDICAL MATERIALS 1Dr.Ch. Shashikanth,2Gattu Shivakiran 18-24 PDF MODELLlNG AND STRUCTURAL ANALYSIS OF DISC ROTOR USING VARIOUS MATERIALS 1Dr. G. Venkateswarlu, 2Dusa Poornachandra 25-33 PDF MODELING AND STATIC MODAL ANALYSIS OF GANTRY CRANE USING VARIOUS MATERIALS 1Mrs. T.Madhavi,2Kothagattu Sai Kumar 34-42 PDF SIMULATION METHODS IN THE ANALYSIS OF THE HEXA ALLEN WRENCH 1Mr. M.Sathish Kumar, 2Gollapally Raviteja 43-49 PDF MODELLING AND STATIC THERMAL ANALYSIS OF MULTI CLUTCH PALTE BY USING DIFFERENT MATERIALS 1Mr.M.Saraiah, 2Nagapuri Akhil Sai 50-57 PDF MODAL ANALYSIS OF NACA 4412 AIRFOIL BASED AIR-WING USING DIFFERENT COMPOSITE MATERIALS 1Mr. I.VENU,2MOHAMMAD FAIZANUDDIN 58-67 PDF CMOS 28-NM WIRELINE RECEIVER WITH 6-GB/S INTRAPAIR SKEW COMPENSATION AND 3-TAP DECISION-FEEDBACK EQUALIZER 1N.PRANEETH,2N.UMAPATHI 68-74 PDF FINITE FIELD MULTIPLIER REDUNDANT DESIGN REPRESENTATION WITH SERIAL INPUT AND PARALLEL OUTPUT 1J. SAMATHA,2N.UMAPATHI,3G.KARTHICK 75-82 PDF DETERMINATION OF PROTON-LIGAND STABILITY CONSTANT BY USING THE POTENTIOMETRIC TITRATION METHOD Ganesh B. Akat1 & B.K.Magare2 83-87 PDF COMPOSITE TWISTED PANELS: VIBRATION AND BUCKLING UNDER HYGROTHERMAL LOADING: A RECENT STUDY 1Dr. P Lakshmaiah Chowdary,2Megha Yadav,3Dr. B. Suvarna,4Hariprasad G 88-101 PDF ANOMOLY DETECTION AND ATTACK CLASSIFICATION FOR TRAIN REAL- TIME ETHERNET MURALI PONAGANTI 102-109 PDF A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE CLOUD COMPUTING ENVIRONMENTS 1Y.RAKESH,2SAIKRISHNA.D 110-115 PDF CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS 1AILA REKHA,2MURALI PONAGANTI 116-119 PDF CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING 1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR 120-123 PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
MODELLING AND STATIC ANALYSIS OF ALLOY WHEEL RIM USING CARBON EPOXY COMPOSITE, AL6061 AND STAINLESS
1Dr. G. Venkateswarlu,2Mandha Ajay
10-17
PDF MODELLING AND STATIC ANALYSIS OF DENTAL IMPLANT USING DIFFERENT BIOMEDICAL MATERIALS 1Dr.Ch. Shashikanth,2Gattu Shivakiran 18-24 PDF MODELLlNG AND STRUCTURAL ANALYSIS OF DISC ROTOR USING VARIOUS MATERIALS 1Dr. G. Venkateswarlu, 2Dusa Poornachandra 25-33 PDF MODELING AND STATIC MODAL ANALYSIS OF GANTRY CRANE USING VARIOUS MATERIALS 1Mrs. T.Madhavi,2Kothagattu Sai Kumar 34-42 PDF SIMULATION METHODS IN THE ANALYSIS OF THE HEXA ALLEN WRENCH 1Mr. M.Sathish Kumar, 2Gollapally Raviteja 43-49 PDF MODELLING AND STATIC THERMAL ANALYSIS OF MULTI CLUTCH PALTE BY USING DIFFERENT MATERIALS 1Mr.M.Saraiah, 2Nagapuri Akhil Sai 50-57 PDF MODAL ANALYSIS OF NACA 4412 AIRFOIL BASED AIR-WING USING DIFFERENT COMPOSITE MATERIALS 1Mr. I.VENU,2MOHAMMAD FAIZANUDDIN 58-67 PDF CMOS 28-NM WIRELINE RECEIVER WITH 6-GB/S INTRAPAIR SKEW COMPENSATION AND 3-TAP DECISION-FEEDBACK EQUALIZER 1N.PRANEETH,2N.UMAPATHI 68-74 PDF FINITE FIELD MULTIPLIER REDUNDANT DESIGN REPRESENTATION WITH SERIAL INPUT AND PARALLEL OUTPUT 1J. SAMATHA,2N.UMAPATHI,3G.KARTHICK 75-82 PDF DETERMINATION OF PROTON-LIGAND STABILITY CONSTANT BY USING THE POTENTIOMETRIC TITRATION METHOD Ganesh B. Akat1 & B.K.Magare2 83-87 PDF COMPOSITE TWISTED PANELS: VIBRATION AND BUCKLING UNDER HYGROTHERMAL LOADING: A RECENT STUDY 1Dr. P Lakshmaiah Chowdary,2Megha Yadav,3Dr. B. Suvarna,4Hariprasad G 88-101 PDF ANOMOLY DETECTION AND ATTACK CLASSIFICATION FOR TRAIN REAL- TIME ETHERNET MURALI PONAGANTI 102-109 PDF A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE CLOUD COMPUTING ENVIRONMENTS 1Y.RAKESH,2SAIKRISHNA.D 110-115 PDF CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS 1AILA REKHA,2MURALI PONAGANTI 116-119 PDF CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING 1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR 120-123 PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
MODELLING AND STATIC ANALYSIS OF DENTAL IMPLANT USING DIFFERENT BIOMEDICAL MATERIALS
1Dr.Ch. Shashikanth,2Gattu Shivakiran
18-24
PDF MODELLlNG AND STRUCTURAL ANALYSIS OF DISC ROTOR USING VARIOUS MATERIALS 1Dr. G. Venkateswarlu, 2Dusa Poornachandra 25-33 PDF MODELING AND STATIC MODAL ANALYSIS OF GANTRY CRANE USING VARIOUS MATERIALS 1Mrs. T.Madhavi,2Kothagattu Sai Kumar 34-42 PDF SIMULATION METHODS IN THE ANALYSIS OF THE HEXA ALLEN WRENCH 1Mr. M.Sathish Kumar, 2Gollapally Raviteja 43-49 PDF MODELLING AND STATIC THERMAL ANALYSIS OF MULTI CLUTCH PALTE BY USING DIFFERENT MATERIALS 1Mr.M.Saraiah, 2Nagapuri Akhil Sai 50-57 PDF MODAL ANALYSIS OF NACA 4412 AIRFOIL BASED AIR-WING USING DIFFERENT COMPOSITE MATERIALS 1Mr. I.VENU,2MOHAMMAD FAIZANUDDIN 58-67 PDF CMOS 28-NM WIRELINE RECEIVER WITH 6-GB/S INTRAPAIR SKEW COMPENSATION AND 3-TAP DECISION-FEEDBACK EQUALIZER 1N.PRANEETH,2N.UMAPATHI 68-74 PDF FINITE FIELD MULTIPLIER REDUNDANT DESIGN REPRESENTATION WITH SERIAL INPUT AND PARALLEL OUTPUT 1J. SAMATHA,2N.UMAPATHI,3G.KARTHICK 75-82 PDF DETERMINATION OF PROTON-LIGAND STABILITY CONSTANT BY USING THE POTENTIOMETRIC TITRATION METHOD Ganesh B. Akat1 & B.K.Magare2 83-87 PDF COMPOSITE TWISTED PANELS: VIBRATION AND BUCKLING UNDER HYGROTHERMAL LOADING: A RECENT STUDY 1Dr. P Lakshmaiah Chowdary,2Megha Yadav,3Dr. B. Suvarna,4Hariprasad G 88-101 PDF ANOMOLY DETECTION AND ATTACK CLASSIFICATION FOR TRAIN REAL- TIME ETHERNET MURALI PONAGANTI 102-109 PDF A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE CLOUD COMPUTING ENVIRONMENTS 1Y.RAKESH,2SAIKRISHNA.D 110-115 PDF CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS 1AILA REKHA,2MURALI PONAGANTI 116-119 PDF CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING 1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR 120-123 PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
MODELLlNG AND STRUCTURAL ANALYSIS OF DISC ROTOR USING VARIOUS MATERIALS
1Dr. G. Venkateswarlu, 2Dusa Poornachandra
25-33
PDF MODELING AND STATIC MODAL ANALYSIS OF GANTRY CRANE USING VARIOUS MATERIALS 1Mrs. T.Madhavi,2Kothagattu Sai Kumar 34-42 PDF SIMULATION METHODS IN THE ANALYSIS OF THE HEXA ALLEN WRENCH 1Mr. M.Sathish Kumar, 2Gollapally Raviteja 43-49 PDF MODELLING AND STATIC THERMAL ANALYSIS OF MULTI CLUTCH PALTE BY USING DIFFERENT MATERIALS 1Mr.M.Saraiah, 2Nagapuri Akhil Sai 50-57 PDF MODAL ANALYSIS OF NACA 4412 AIRFOIL BASED AIR-WING USING DIFFERENT COMPOSITE MATERIALS 1Mr. I.VENU,2MOHAMMAD FAIZANUDDIN 58-67 PDF CMOS 28-NM WIRELINE RECEIVER WITH 6-GB/S INTRAPAIR SKEW COMPENSATION AND 3-TAP DECISION-FEEDBACK EQUALIZER 1N.PRANEETH,2N.UMAPATHI 68-74 PDF FINITE FIELD MULTIPLIER REDUNDANT DESIGN REPRESENTATION WITH SERIAL INPUT AND PARALLEL OUTPUT 1J. SAMATHA,2N.UMAPATHI,3G.KARTHICK 75-82 PDF DETERMINATION OF PROTON-LIGAND STABILITY CONSTANT BY USING THE POTENTIOMETRIC TITRATION METHOD Ganesh B. Akat1 & B.K.Magare2 83-87 PDF COMPOSITE TWISTED PANELS: VIBRATION AND BUCKLING UNDER HYGROTHERMAL LOADING: A RECENT STUDY 1Dr. P Lakshmaiah Chowdary,2Megha Yadav,3Dr. B. Suvarna,4Hariprasad G 88-101 PDF ANOMOLY DETECTION AND ATTACK CLASSIFICATION FOR TRAIN REAL- TIME ETHERNET MURALI PONAGANTI 102-109 PDF A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE CLOUD COMPUTING ENVIRONMENTS 1Y.RAKESH,2SAIKRISHNA.D 110-115 PDF CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS 1AILA REKHA,2MURALI PONAGANTI 116-119 PDF CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING 1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR 120-123 PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
MODELING AND STATIC MODAL ANALYSIS OF GANTRY CRANE USING VARIOUS MATERIALS
1Mrs. T.Madhavi,2Kothagattu Sai Kumar
34-42
PDF SIMULATION METHODS IN THE ANALYSIS OF THE HEXA ALLEN WRENCH 1Mr. M.Sathish Kumar, 2Gollapally Raviteja 43-49 PDF MODELLING AND STATIC THERMAL ANALYSIS OF MULTI CLUTCH PALTE BY USING DIFFERENT MATERIALS 1Mr.M.Saraiah, 2Nagapuri Akhil Sai 50-57 PDF MODAL ANALYSIS OF NACA 4412 AIRFOIL BASED AIR-WING USING DIFFERENT COMPOSITE MATERIALS 1Mr. I.VENU,2MOHAMMAD FAIZANUDDIN 58-67 PDF CMOS 28-NM WIRELINE RECEIVER WITH 6-GB/S INTRAPAIR SKEW COMPENSATION AND 3-TAP DECISION-FEEDBACK EQUALIZER 1N.PRANEETH,2N.UMAPATHI 68-74 PDF FINITE FIELD MULTIPLIER REDUNDANT DESIGN REPRESENTATION WITH SERIAL INPUT AND PARALLEL OUTPUT 1J. SAMATHA,2N.UMAPATHI,3G.KARTHICK 75-82 PDF DETERMINATION OF PROTON-LIGAND STABILITY CONSTANT BY USING THE POTENTIOMETRIC TITRATION METHOD Ganesh B. Akat1 & B.K.Magare2 83-87 PDF COMPOSITE TWISTED PANELS: VIBRATION AND BUCKLING UNDER HYGROTHERMAL LOADING: A RECENT STUDY 1Dr. P Lakshmaiah Chowdary,2Megha Yadav,3Dr. B. Suvarna,4Hariprasad G 88-101 PDF ANOMOLY DETECTION AND ATTACK CLASSIFICATION FOR TRAIN REAL- TIME ETHERNET MURALI PONAGANTI 102-109 PDF A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE CLOUD COMPUTING ENVIRONMENTS 1Y.RAKESH,2SAIKRISHNA.D 110-115 PDF CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS 1AILA REKHA,2MURALI PONAGANTI 116-119 PDF CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING 1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR 120-123 PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
SIMULATION METHODS IN THE ANALYSIS OF THE HEXA ALLEN WRENCH
1Mr. M.Sathish Kumar, 2Gollapally Raviteja
43-49
PDF MODELLING AND STATIC THERMAL ANALYSIS OF MULTI CLUTCH PALTE BY USING DIFFERENT MATERIALS 1Mr.M.Saraiah, 2Nagapuri Akhil Sai 50-57 PDF MODAL ANALYSIS OF NACA 4412 AIRFOIL BASED AIR-WING USING DIFFERENT COMPOSITE MATERIALS 1Mr. I.VENU,2MOHAMMAD FAIZANUDDIN 58-67 PDF CMOS 28-NM WIRELINE RECEIVER WITH 6-GB/S INTRAPAIR SKEW COMPENSATION AND 3-TAP DECISION-FEEDBACK EQUALIZER 1N.PRANEETH,2N.UMAPATHI 68-74 PDF FINITE FIELD MULTIPLIER REDUNDANT DESIGN REPRESENTATION WITH SERIAL INPUT AND PARALLEL OUTPUT 1J. SAMATHA,2N.UMAPATHI,3G.KARTHICK 75-82 PDF DETERMINATION OF PROTON-LIGAND STABILITY CONSTANT BY USING THE POTENTIOMETRIC TITRATION METHOD Ganesh B. Akat1 & B.K.Magare2 83-87 PDF COMPOSITE TWISTED PANELS: VIBRATION AND BUCKLING UNDER HYGROTHERMAL LOADING: A RECENT STUDY 1Dr. P Lakshmaiah Chowdary,2Megha Yadav,3Dr. B. Suvarna,4Hariprasad G 88-101 PDF ANOMOLY DETECTION AND ATTACK CLASSIFICATION FOR TRAIN REAL- TIME ETHERNET MURALI PONAGANTI 102-109 PDF A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE CLOUD COMPUTING ENVIRONMENTS 1Y.RAKESH,2SAIKRISHNA.D 110-115 PDF CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS 1AILA REKHA,2MURALI PONAGANTI 116-119 PDF CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING 1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR 120-123 PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
MODELLING AND STATIC THERMAL ANALYSIS OF MULTI CLUTCH PALTE BY USING DIFFERENT MATERIALS
1Mr.M.Saraiah, 2Nagapuri Akhil Sai
50-57
PDF MODAL ANALYSIS OF NACA 4412 AIRFOIL BASED AIR-WING USING DIFFERENT COMPOSITE MATERIALS 1Mr. I.VENU,2MOHAMMAD FAIZANUDDIN 58-67 PDF CMOS 28-NM WIRELINE RECEIVER WITH 6-GB/S INTRAPAIR SKEW COMPENSATION AND 3-TAP DECISION-FEEDBACK EQUALIZER 1N.PRANEETH,2N.UMAPATHI 68-74 PDF FINITE FIELD MULTIPLIER REDUNDANT DESIGN REPRESENTATION WITH SERIAL INPUT AND PARALLEL OUTPUT 1J. SAMATHA,2N.UMAPATHI,3G.KARTHICK 75-82 PDF DETERMINATION OF PROTON-LIGAND STABILITY CONSTANT BY USING THE POTENTIOMETRIC TITRATION METHOD Ganesh B. Akat1 & B.K.Magare2 83-87 PDF COMPOSITE TWISTED PANELS: VIBRATION AND BUCKLING UNDER HYGROTHERMAL LOADING: A RECENT STUDY 1Dr. P Lakshmaiah Chowdary,2Megha Yadav,3Dr. B. Suvarna,4Hariprasad G 88-101 PDF ANOMOLY DETECTION AND ATTACK CLASSIFICATION FOR TRAIN REAL- TIME ETHERNET MURALI PONAGANTI 102-109 PDF A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE CLOUD COMPUTING ENVIRONMENTS 1Y.RAKESH,2SAIKRISHNA.D 110-115 PDF CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS 1AILA REKHA,2MURALI PONAGANTI 116-119 PDF CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING 1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR 120-123 PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
MODAL ANALYSIS OF NACA 4412 AIRFOIL BASED AIR-WING USING DIFFERENT COMPOSITE MATERIALS
1Mr. I.VENU,2MOHAMMAD FAIZANUDDIN
58-67
PDF CMOS 28-NM WIRELINE RECEIVER WITH 6-GB/S INTRAPAIR SKEW COMPENSATION AND 3-TAP DECISION-FEEDBACK EQUALIZER 1N.PRANEETH,2N.UMAPATHI 68-74 PDF FINITE FIELD MULTIPLIER REDUNDANT DESIGN REPRESENTATION WITH SERIAL INPUT AND PARALLEL OUTPUT 1J. SAMATHA,2N.UMAPATHI,3G.KARTHICK 75-82 PDF DETERMINATION OF PROTON-LIGAND STABILITY CONSTANT BY USING THE POTENTIOMETRIC TITRATION METHOD Ganesh B. Akat1 & B.K.Magare2 83-87 PDF COMPOSITE TWISTED PANELS: VIBRATION AND BUCKLING UNDER HYGROTHERMAL LOADING: A RECENT STUDY 1Dr. P Lakshmaiah Chowdary,2Megha Yadav,3Dr. B. Suvarna,4Hariprasad G 88-101 PDF ANOMOLY DETECTION AND ATTACK CLASSIFICATION FOR TRAIN REAL- TIME ETHERNET MURALI PONAGANTI 102-109 PDF A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE CLOUD COMPUTING ENVIRONMENTS 1Y.RAKESH,2SAIKRISHNA.D 110-115 PDF CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS 1AILA REKHA,2MURALI PONAGANTI 116-119 PDF CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING 1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR 120-123 PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
CMOS 28-NM WIRELINE RECEIVER WITH 6-GB/S INTRAPAIR SKEW COMPENSATION AND 3-TAP DECISION-FEEDBACK EQUALIZER
1N.PRANEETH,2N.UMAPATHI
68-74
PDF FINITE FIELD MULTIPLIER REDUNDANT DESIGN REPRESENTATION WITH SERIAL INPUT AND PARALLEL OUTPUT 1J. SAMATHA,2N.UMAPATHI,3G.KARTHICK 75-82 PDF DETERMINATION OF PROTON-LIGAND STABILITY CONSTANT BY USING THE POTENTIOMETRIC TITRATION METHOD Ganesh B. Akat1 & B.K.Magare2 83-87 PDF COMPOSITE TWISTED PANELS: VIBRATION AND BUCKLING UNDER HYGROTHERMAL LOADING: A RECENT STUDY 1Dr. P Lakshmaiah Chowdary,2Megha Yadav,3Dr. B. Suvarna,4Hariprasad G 88-101 PDF ANOMOLY DETECTION AND ATTACK CLASSIFICATION FOR TRAIN REAL- TIME ETHERNET MURALI PONAGANTI 102-109 PDF A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE CLOUD COMPUTING ENVIRONMENTS 1Y.RAKESH,2SAIKRISHNA.D 110-115 PDF CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS 1AILA REKHA,2MURALI PONAGANTI 116-119 PDF CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING 1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR 120-123 PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
FINITE FIELD MULTIPLIER REDUNDANT DESIGN REPRESENTATION WITH SERIAL INPUT AND PARALLEL OUTPUT
1J. SAMATHA,2N.UMAPATHI,3G.KARTHICK
75-82
PDF DETERMINATION OF PROTON-LIGAND STABILITY CONSTANT BY USING THE POTENTIOMETRIC TITRATION METHOD Ganesh B. Akat1 & B.K.Magare2 83-87 PDF COMPOSITE TWISTED PANELS: VIBRATION AND BUCKLING UNDER HYGROTHERMAL LOADING: A RECENT STUDY 1Dr. P Lakshmaiah Chowdary,2Megha Yadav,3Dr. B. Suvarna,4Hariprasad G 88-101 PDF ANOMOLY DETECTION AND ATTACK CLASSIFICATION FOR TRAIN REAL- TIME ETHERNET MURALI PONAGANTI 102-109 PDF A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE CLOUD COMPUTING ENVIRONMENTS 1Y.RAKESH,2SAIKRISHNA.D 110-115 PDF CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS 1AILA REKHA,2MURALI PONAGANTI 116-119 PDF CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING 1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR 120-123 PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
DETERMINATION OF PROTON-LIGAND STABILITY CONSTANT BY USING THE POTENTIOMETRIC TITRATION METHOD
Ganesh B. Akat1 & B.K.Magare2
83-87
PDF COMPOSITE TWISTED PANELS: VIBRATION AND BUCKLING UNDER HYGROTHERMAL LOADING: A RECENT STUDY 1Dr. P Lakshmaiah Chowdary,2Megha Yadav,3Dr. B. Suvarna,4Hariprasad G 88-101 PDF ANOMOLY DETECTION AND ATTACK CLASSIFICATION FOR TRAIN REAL- TIME ETHERNET MURALI PONAGANTI 102-109 PDF A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE CLOUD COMPUTING ENVIRONMENTS 1Y.RAKESH,2SAIKRISHNA.D 110-115 PDF CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS 1AILA REKHA,2MURALI PONAGANTI 116-119 PDF CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING 1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR 120-123 PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
COMPOSITE TWISTED PANELS: VIBRATION AND BUCKLING UNDER HYGROTHERMAL LOADING: A RECENT STUDY
1Dr. P Lakshmaiah Chowdary,2Megha Yadav,3Dr. B. Suvarna,4Hariprasad G
88-101
PDF ANOMOLY DETECTION AND ATTACK CLASSIFICATION FOR TRAIN REAL- TIME ETHERNET MURALI PONAGANTI 102-109 PDF A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE CLOUD COMPUTING ENVIRONMENTS 1Y.RAKESH,2SAIKRISHNA.D 110-115 PDF CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS 1AILA REKHA,2MURALI PONAGANTI 116-119 PDF CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING 1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR 120-123 PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
ANOMOLY DETECTION AND ATTACK CLASSIFICATION FOR TRAIN REAL- TIME ETHERNET
MURALI PONAGANTI
102-109
PDF A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE CLOUD COMPUTING ENVIRONMENTS 1Y.RAKESH,2SAIKRISHNA.D 110-115 PDF CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS 1AILA REKHA,2MURALI PONAGANTI 116-119 PDF CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING 1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR 120-123 PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE CLOUD COMPUTING ENVIRONMENTS
1Y.RAKESH,2SAIKRISHNA.D
110-115
PDF CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS 1AILA REKHA,2MURALI PONAGANTI 116-119 PDF CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING 1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR 120-123 PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS
1AILA REKHA,2MURALI PONAGANTI
116-119
PDF CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING 1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR 120-123 PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING
1GUNDOJU RAJASHEKAR,2S.VIJAY KUMAR
120-123
PDF CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE 1SRIRAM SAGAR,2MURALI PONAGANTI 124-130 PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE
1SRIRAM SAGAR,2MURALI PONAGANTI
124-130
PDF CURRENCY RECOGNITION SYSTEM 1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM 131-136 PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
CURRENCY RECOGNITION SYSTEM
1KOTHAKONDA MANISHA,2Dr P. VELAYUTHAM
131-136
PDF E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS 1TELU SAI KIRAN,2S.VIJAY KUMAR 137-139 PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
E-ASSESSMENT USING IMAGE PROCESSING IN 8EXAMS
1TELU SAI KIRAN,2S.VIJAY KUMAR
137-139
PDF EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION 1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR 140-142 PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION
1MUDIGANTI NAVEEN REDDY,2S.VIJAY KUMAR
140-142
PDF EYE BALL CURSOR MOVEMENT USING OPENCV 1SAMREEN,2MURALI PONAGANTI 143-147 PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
EYE BALL CURSOR MOVEMENT USING OPENCV
1SAMREEN,2MURALI PONAGANTI
143-147
PDF MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY 1BAIRAVENI SAMATHA,2MURALI PONAGANTI 148-154 PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
MACHINE LEARNING FOR WEB VULNERABILITY DETECTION THE CASE OF CROSS-SITE REQUEST FORGERY
1BAIRAVENI SAMATHA,2MURALI PONAGANTI
148-154
PDF PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING 1KAMARAPU VASAVI,2MURALI PONAGANTI 155-160 PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
PREDICTING AND DEFINING B2B SALES SUCCESS WITH MACHINE LEARNING
1KAMARAPU VASAVI,2MURALI PONAGANTI
155-160
PDF SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS 1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D 161-165 PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
SECURE CHANNEL FREE CERTIFICATE-BASED SEARCHABLE ENCRYPTION WITHSTANDING OUTSIDE AND INSIDE KEYWORD GUESSING ATTACKS
1KARMAKONDA PRATHIBHA,2SAIKRISHNA.D
161-165
PDF SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL 1KONDA AKHILA,2MURALI PONAGANTI 166-173 PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
SECURE IOT DATA OUT SOURCING WITH AGGREGATE STATISTICS AND FINE-GRAINED ACCESS CONTROL
1KONDA AKHILA,2MURALI PONAGANTI
166-173
PDF TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM 1MD. JOHN,2S.VIJAY KUMAR 174-178 PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
TOWARD DETECTION AND ATTRIBUTION OF CYBER-ATTACKS IN IOT-ENABLED CYBER-PHYSICAL SYSTEM
1MD. JOHN,2S.VIJAY KUMAR
174-178
PDF EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS #1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR 179-183 PDF
EVALUATING DEEP LEARNING AND MACHINE LEARNING APPROACHES FOR INTRUSION DETECTION SYSTEMS
#1KANDUKURI CHANDRASENA CHARY,#2Dr. SATISH NARAYAN GUJAR
179-183
PDF