CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERYSowmiya Murthy
|
FAULT TOLERANCE IN JOB SCHEDULING THROUGH FAULT MANAGEMENT FRAMEWORK USING SOA IN GRIDV. Indhumathi1, G.M. Nasira2
|
A STUDY ON THE INTERNET USAGE PATTERN AND INTERNET ADDICTION AMONG THE PEOPLES Cindhana, A Amalimary
|
DEEP GENERATIVE DISCRETE COSINE TRANSFORM FOR SPECTRAL IMAGE PROCESSINGMary Florida1, S.Vadhana Kumar2, A.J. Deepa3, M.L. Sworna Kokila4, S. Brilly Sangeetha5
|
THE SMART DETECTION AND ANALYSIS ON SKIN TUMOR DISEASE USING BIO IMAGING DEEP LEARNING ALGORITHMJ. Seetha1, D. Nagaraju2, T. Kuntavai3, K. Gurnadha Gupta4
|
REDUCING RUN-TIME FOR MOVING OBJECT DETECTION IN BACKGROUND BUFFERING APPROACHA.R. Revathi1, Dhananjay Kumar2
|