THE INTELLIGENT PERSONNEL SCHEDULE MANAGEMENT ANALYSIS FOR NORMALIZED NUMBER OF EMPLOYEES IN INTERNAL LABOR ACTIVITIESKrishna Bikram Shah1
|
IMPLEMENTATION OF A CRYPTOGRAPHY TECHNIQUE TO PREVENT WORMHOLE ATTACKK Sundaravadivel
|
THE IDENTIFICATION OF PILL USING FEATURE EXTRACTION IN IMAGE MININGA. Hema1, E. Anna Saro2
|
COMPARISON OF NAIVE BAYES AND SVM CLASSIFIERS FOR DETECTION OF SPAM SMS USING NATURAL LANGUAGE PROCESSINGN Krishnaveni1, V Radha2
|
A COMPARATIVE ANALYSIS OF IMAGE COMPRESSION TECHNIQUES: K MEANS CLUSTERING AND SINGULAR VALUE DECOMPOSITIONR Gomathi, R Aparna
|
POST-QUANTUM CRYPTOGRAPHY FOR SECURE 5G AND IOT: LATTICE-BASED ENCRYPTION SCHEMESM Poomani1, Bikash Chandra Saha2
|