A VIDEO WATERMARKING ALGORITHM BASED ON TURBO CODES IN THE MULTI-TRANSFORM DOMAINGaoyan Lv1, Yongping Zhang2, FanzhiKong3, Zhongkun He4
|
TAWS: TABLE ASSISTED WALK STRATEGY IN CLONE ATTACK DETECTIONJ Sybi Cynthia1, D Shalini Punithavathani2
|
SCHEDULING AND OPTIMIZATION OF RESOURCES IN EDGE COMPUTING USING RANDOM ALLOCATION AND MAX FIT ALLOCATIONP. Priya Ponnuswamy, C.P. Shabariram
|
A STUDY ON ASSIGNING PERFORMERS TO PRACTICE AREAS IN SMALL SIZE SOFTWARE ORGANIZATIONS COMBINED CMMI AND XPKi Son Ryang1,Il Nam Mun2,Chol Nam Om3,Jang Su Kim4
|
DIGITAL IDENTITY MODELLING FOR DIGITAL FINANCIAL SERVICES IN ZAMBIAWakwinji Inambao1, Jackson Phiri2, Douglas Kunda3
|
AN EXPLORATORY ANALYSIS ON THE IMPACT OF INSTITUTIONAL-SPECIFIC CUM MACROECONOMIC INDICATORS ON THE NON-PERFORMING ASSETS OF SBI AND ASSOCIATE BANKS IN INDIAS. Gokul Kumar1, M. Jayanthi2, K. Subramani3, A. Prasanth4
|