RESTORING DISTORTED DOCUMENTS BY COMBINING NNKSOM WITH ICA AND DFDM TECHNIQUESR. Indra Gandhi1, K. Iyakutti2
|
DIGITAL COLOR IMAGE ENCRYPTION BASED ON INVERTIBLE MATRIX WITH SECRET SHARINGW.R. Sam Emmanuel1 and C. Edward Jaya Singh2
|
RETAILERS'''' PREFERENCE FOR BISCUITS AND THE ROLE OF THE MARKETING MIX - A SURVEY STUDYL. Ivan Kenny Raj, S. Ramesh Babu, S.M. Atchaya Eswari
|
ADAPTIVE EDGE-ASSISTED FRAMEWORK FOR LOW-LATENCY EMERGENCY COMMUNICATIONS IN DISASTER ZONESManjula Pattnaik1, Thamari Thankam2
|
PRESERVING DATABASE SCHEMA PRIVACY WHILE GENERATING SQL QUERIES USING GENERATIVE AIJitesh Prasad Khatick1, Soumitra Kumar Mandal2
|
SOLVING FLOWSHOP SCHEDULING PROBLEMS USING A DISCRETE AFRICAN WILD DOG ALGORITHMM. K. Marichelvam, M. Geetha
|