ACCEPTANCE OF AI IN ACADEMIC LIBRARIES IN ENGINEERING COLLEGES ACROSS INDIAS. Reshma, K. Rekha
|
A STUDY ON CREDIT MECHANISM OF PNBG. Madan Mohan, K.P. Ajina
|
EFFECTIVE ROBUST PATCHWORK METHOD TO THE VULNERABLE ATTACK FOR DIGITAL AUDIO WATERMARKINGY D Chincholkar, Shalaka Pravin Kude
|
PERFORMANCE ANALYSIS OF REED-SOLOMON CODES IN DIGITAL COMMUNICATION SYSTEM USING LABVIEWG Durga Priyadharshini, G Suchitra
|
PERSONAL AUTHENTICATION USING PALMPRINT WITH SOBEL CODE, CANNY EDGE AND PHASE CONGRUENCY FEATURE EXTRACTION METHODJyoti Malik1, G. Sainarayanan2 and Ratna Dahiya3
|
A SMART ANALYSIS OF HUMAN RESOURCE MANAGEMENT FOR MNC COMPANIES IN WORK FROM HOME ENVIRONMENTS. Aradhana and K. Harshini
|