Now showing items 1-3 of 3

    • Detection of malicious URLs in big data using RIPPER algorithm 

      Thakur, S.; Meenakshi, E.; Priya, A. (Institute of Electrical and Electronics Engineers Inc., 2018)
      'Big Data' is the term that describes a large amount of datasets. Datasets like web logs, call records, medical records, military surveillance, photography archives, etc. are often so large and complex, and as the data is ...
    • Polymer electrolytes for lithium ion batteries: a critical study 

      Arya, A.; Sharma, A. L. (Institute for Ionics, 2017)
      Polymer electrolytes (PEs) are an essential component being used in most energy storage/conversion devices. The present review article on a brief history, advantage, and their brief application of polymer electrolyte ...
    • Wireless sensor network: Routing protocols and attacks - A survey 

      Purohit, R.; Sidhu, N. (Institute of Electrical and Electronics Engineers Inc., 2015)
      Based on end user application a network of hundreds or even thousands of sensor nodes, also known as wireless sensor network, can collect valuable data from an unassisted environment and transmit the information to the ...