CROSS DOMAIN RECOMMENDATION USING VECTOR MODELING AND GENRE CORRELATIONSMala Saraswat, Shampa Chakraverty, Sakshi Garg, Sweta Nandal, Vibhav Agarwal
|
EFFECTUAL HUMAN AUTHENTICATION FOR CRITICAL SECURITY APPLICATIONS USING RETINAL IMAGESL. Latha, M. Pabitha, S. Thangasamy
|
CROSS-LAYER DESIGN AND OPTIMIZATION IN NETWORKING LEVERAGING AI AND DEEP LEARNING ALGORITHMS FOR ENHANCED PERFORMANCEB. Priya
|
TRANSPORT TUNNELING SYSTEM WITH A COMMUNICATION HACKING FRAMEWORKSatoshi Kodama, Rei Nakagawa
|
DESIGN AND IMPLEMENTATION OF CACHE MEMORY USING CMOS TRANSISTORSG Chinavenkateswararao, M Kamaraju, P V Subbarao
|
CHALLENGES, OPPORTUNITIES AND RISK ANALYSIS OF ADOPTION OF DECENTRALIZED FINANCE APPLICATIONSRupali Ahuja, Janhavi Khandelwal, Anjali
|