Rabindranath tagore Biography
AODV protocol and Black Hole attack
Hidden Surface Removal using Z-buffer
AODV protocol
Overlapping community Detection Using Bayesian NMF
Authentication in Different Scenarios
Least squares support Vector Machine Classifier