USE OF ATTRIBUTE BASED ENCRYPTION FOR SECURE DATA ACCESS CONTROL IN MOBILE CLOUD COMPUTING - A CASE STUDYU Sujatha1, U Saranya2, C P Boopathy3
|
OPTIMIZING AUTOMATIC SPEECH RECOGNITION WITH MODIFICATIONS OF PCA AND CNN ARCHITECTURES USING IN REAL-TIME SYSTEMSM. Kathiresh, A. Uthiramoorthy, M. Ramaraj
|
A GENETIC ALGORITHM BASED LEACH PROTOCOL FOR CLUSTER HEAD SELECTION TO ENHANCE THE NETWORK LIFETIME OF WIRELESS SENSOR NETWORKManisha Kumari1, Gurjinder Kaur 2
|
IMPROVED IMPERIALIST COMPETITIVE ALGORITHM FOR SELECTION PROBLEMS IN COMBINATORIAL OPTIMIZATIONLaxmikant, C. Vasantha Lakshmi, C. Patvardhan
|
A STUDY ON CREDIT MECHANISM OF PNBG. Madan Mohan, K.P. Ajina
|
STRATEGIC HUMAN RESOURCE PRACTICES TOWARDS INDUSTRY INNOVATION AND EMPLOYEE PERFORMANCE IN ORGANIZATION WITH SPECIAL REFERENCE TO EDUCATIONAL SECTORA. Vanitha
|