ITERATIVE COLLABORATIVE ROUTING AMONG EQUIVARIANT CAPSULES FOR TRANSFORMATION-ROBUST CAPSULE NETWORKSSai Raam Venkataraman, S. Balasubramanian, . Raghunatha Sarma
|
CLOUD DATA PROTECTION FOR PERSONAL HEALTH RECORDS USING PROXY- ENCRYPTION BASED RABIN CERTIFICATELESS SIGNCRYPTIONJ. Mala
|
DWT SVD BASED SEGMENTED WATERMARKING SCHEME USING GENETIC ALGORITHMN. Mohananthini, G. Yamuna
|
ENHANCED CYBERATTACK DETECTION IN INTERNET OF VEHICLES USING DEEP RESIDUAL NEURAL NETWORKSA.P. Janani, J. Thimmiaraja
|
AI-DRIVEN ANALOG CIRCUIT DESIGN FOR LOW POWER AND HIGH-SPEED PERFORMANCE IN EMERGING TECHNOLOGIESYogita Deepak Mane, Neeta P. Patil
|
FRAMING HYPOTHESIZED MODEL FOR CRM PRACTICES IN BANKS: APPLICATION OF CONFIRMATORY FACTOR ANALYSISS. Sheik Abdullah, R. Manohar, M. Manikandan
|