EFFECTUAL HUMAN AUTHENTICATION FOR CRITICAL SECURITY APPLICATIONS USING RETINAL IMAGESL. Latha, M. Pabitha, S. Thangasamy
|
VIDEO FRAME OBJECT DETECTION IN MULTIMEDIA APPLICATIONS USING GENERATIVE ADVERSARIAL NETWORKH.C. Kantharaju1, Vatsala Anand2
|
ICT AND HIGHER EDUCATION: TEACHERS TECHNOLOGICAL DRIVEN ECOSYSTEM AND A PARADIGM SHIFT IN LEARNING ENVIRONMENTN Boobalakrishnan, C Pichandy
|
ADAPTIVE DIMENSIONAL SEARCH BASED IMPROVISED ENSEMBLE METHOD FOR COGNITIVE RADIO IN SOFTWARE-DEFINED NETWORKSB. Lalitha1, S. Poongothai2
|
PERFORMANCE EVALUATION AND COMPARATIVE ANALYSIS OF WATERMARKING ALGORITHM BASED ON ADAPTIVE PREDICTION METHODChetna Sharma, Neeraj Jain
|
AN ANALYTICAL STUDY ON RETAILERS’ PREFERENCE TOWARDS MASALA PRODUCTSL. Ivan Kenny Raj, S. Ramesh Babu, T. Manoj Kumar, B. Shanmugapriya
|