PERSONAL AUTHENTICATION USING PALMPRINT WITH SOBEL CODE, CANNY EDGE AND PHASE CONGRUENCY FEATURE EXTRACTION METHODJyoti Malik1, G. Sainarayanan2 and Ratna Dahiya3
|
THE EFFECT OF ICT SERVICES ON BUSINESS PERFORMANCE IN THE INFORMAL SECTOR IN KENYA - A CASE OF INFORMAL ENTERPRISES IN MLOLONGO TOWNSHIPJediel Caroline Makena, Michael W. Kimwele, Wario Guyo
|
COMPUTATIONAL APPROACHES FOR HEART DISEASE PREDICTION - A REVIEWR Manavalan, S Saranya
|
A NOVEL FINFET BASED APPROACH FOR THE REALIZATION OF TERNARY GATESMakani Nailesh Kishor1, Satish S. Narkhede2
|
CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURESrivatsan Sridharan, Gorthy Ravi Kiran
|
SUPPORT VECTOR MACHINE BASED INTRUSION DETECTION SYSTEM IN FOG COMPUTINGM Ramkumar
|