A Proficient Model for High End Security in Cloud ComputingR. Bala Chandar1, M. S. Kavitha2, K. Seenivasan3
|
PSYCHOLOGICAL READINESS AND INTEGRATION OF DIGITAL TECHNOLOGIES FOR TEACHING IN GOVERNMENT AIDED PRIMARY SCHOOLS IN UGANDAKyeyune Robert, Katarahweire Edgart Atwo, Engotoit Benard, Kasule Abdal, Kituyi G. Mayoka
|
BER EVALUATION OF LDPC CODES WITH GMSK IN NAKAGAMI FADING CHANNELSurbhi Sharma, Rajesh Khanna
|
DESIGNING OF VARIATIONS TOLERANT SENSING AMPLIFIER CIRCUIT FOR DEEP SUB-MICRON MEMORIESVivek Harshey1, S K Bansal2
|
COMPARATIVE ANALYSIS OF VARIOUS APPROXIMATE FULL ADDERS UNDER RTL CODESChinna V Gowdar1, M C Parameshwara2, Savita Sonoli3
|
PREDICTION OF COMPACTION PARAMETERS OF SOIL USING GA AND PSO OPTIMIZED RELEVANCE VECTOR MACHINE (RVM)Jitendra Khatti, Kamaldeep Singh Grover
|