NIL
Enhanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction and Elliptic Curve Cryptography
Mitigating the Knock-on-Effect of DDoS Attacks on Application Layer using Deep Learning Multi-Layer Perception
Consensus Based Formation Control of Multiple UAVs
PRODUCT-PAIR RECOMMENDATION FOR CUSTOMERS USING MACHINE LEARNING TECHNIQUE
Identification of Discourse Boundaries Using Anaphorically Annotated Text