Zobrazeno 1 - 10
of 65
pro vyhledávání: '"T Manjula"'
Publikováno v:
Aircraft Engineering and Aerospace Technology, 2021, Vol. 94, Issue 4, pp. 623-632.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/AEAT-04-2021-0104
Autor:
H. T. Manjula, Neha Mangla
Publikováno v:
Materials Today: Proceedings. 80:3492-3499
Distributed Denial of service (DDoS) attacks is an enormous threat to today’s cyber world, cyber networks are compromised by the attackers to distribute attacks in a large volume by denying the service to legitimate users. The toughest and challeng
Autor:
T. Manjula, T. Sudha
Publikováno v:
International journal of health sciences. :4840-4845
Mother Language is the important means of communication and speech is its main medium. In human machine interface speech technologies are vastly used and has unlimited uses. Advances of ASRs in English language have lead to the evolution of the Speec
Autor:
T. Manjula, K.G. Jayarama Naik
Publikováno v:
KIIT Journal of Library and Information Management. 9:91-96
Autor:
Bharathi S. Rai, K T Manjula
Publikováno v:
International Journal of Management, Technology, and Social Sciences. :133-146
Purpose: The Mahabharata by Vyasa and the Iliad by Homer both have a surfeit of Heroes. The two great heroes are Karna from the Mahabharata and Achilles from the Iliad. They have a few things in common as their lives are heavily influenced by fate. A
Publikováno v:
Aircraft Engineering and Aerospace Technology. 94:623-632
Purpose The purpose of this paper is to assess the application of graph coloring and domination to solve the airline-scheduling problem. Graph coloring and domination in graphs have plenty of applications in computer, communication, biological, socia
Autor:
T. Manjula, M. Krishnappa
Publikováno v:
AGRICULTURAL RESEARCH JOURNAL. 57:937-942
Autor:
T. Manjula, Bulusu Anand
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing. 12:3621-3631
As related to environments which possess non-malicious nodes contained in a network, the well-known protocols that are provides by the existing researchers for routing are designed. There are several security threats which are prevented the mobile ne
Publikováno v:
Artificial Intelligence in Healthcare ISBN: 9789811662645
Image processing, speech recognition, object detection etc. are the huge number of areas that have big data and the powerful tool used for the analysis of big data can be deep learning technology. The recent area where this technology is introduced i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::729e5c01cbe69f04d3785156b4c67a5c
https://doi.org/10.1007/978-981-16-6265-2_6
https://doi.org/10.1007/978-981-16-6265-2_6
Autor:
Syed Shameem, T. Manjula, Kedarasipalli Prakeerth, Kollipara Revanth, Chintakayala Naga Sai Balaji
Publikováno v:
2021 International Conference on Simulation, Automation & Smart Manufacturing (SASM).