IP PROTECTION USING WATERMARKING WITH OBFUSCATIONNisha Elma Koshy, Binu K Mathew
|
HYBRID POSITIONAL EMBEDDINGS IN TRANSFORMER MODELS FOR CYBERATTACK DETECTION IN INDUSTRIAL CONTROL SYSTEMSSyed Minhaz Ul Hassan, Meena Chaudhary
|
IMAGE SEGMENTATION USING MULTI-THRESHOLD TECHNIQUE BY HISTOGRAM SAMPLINGSangyal Lama Tamang1 and Amit Gurung2
|
DETECTION AND CLASSIFICATION OF COMPLEX POWER QUALITY DISTURBANCES USING DISCRETE WAVELET TRANSFORM AND RULE BASED DECISION TREENitin Kumar Suyan1,Mahendra Kumar2, Fateh L Lohar3, Deepak Agrawal4
|
THE INNOVATION DEVELOPMENT OF DATA TRANSPORTATION MODEL TO ANALYZE THE COMPLEX BIG DATA ENVIRONMENT IN PUBLIC SECTOR COMPANIESS. Nawin
|
PREDICTION OF CROP GROWTH USING MACHINE LEARNING BASED ON SEED FEATURESN. Nandhini, J. Gowri Shankar
|