PUBLIC AUDITING USING IDENTITY BASED CRYPTOSYSTEMS ON MULTI-COPY DATA INTEGRITY IN CLOUDR. Hariharan1,G. Komarasamy2,S. Daniel Madan Raja3
|
SECURE AND TRANSPARENT MODEL DEPLOYMENT USING ADDRESSING VULNERABILITIES IN INCEPTION-RESNET FOR AUTONOMOUS ROBOTICS AND MANUFACTURINGJohn Chembukkavu1, P.C. Remya2, M.K. Rachana3, P. Santhi4, P.S. Suvitha5
|
IMPLEMENTATION AND ANALYSIS OF DAC’S STATIC AND FUNCTIONAL TESTING WITH MULTI-FREQUENCYBasavaraj Rabakavi1,Saroja V Siddamal2
|
NOVEL MULTI-LEVEL ASPECT BASED SENTIMENT ANALYSIS FOR IMPROVED ROOT-CAUSE ANALYSISNaveenkumar Seerangan1, Vijayaragavan Shanmugam2
|
AI-IMAGE REPRESENTATION AND LINEAR REPRENDER RENDERINGB.K. Harsha1, B. Srinivasa Rao2, S. Tamijeselvan3, M. Ganesha4, Nihar Ranjan Behera5
|
A COMPARATIVE EVALUATION AND ANALYSIS OF D FLIP FLOP FOR HIGH SPEED AND LOW POWER APPLICATIONKajul Sahu, Owais Ahmad Shah
|