IMPLEMENTATION OF A CRYPTOGRAPHY TECHNIQUE TO PREVENT WORMHOLE ATTACKK Sundaravadivel
|
OPTIMIZING BLOCKCHAIN SCALABILITY WITH A DYNAMIC FRAMEWORK INTEGRATING SHARDING, SIDECHAINS AND HYBRID CONSENSUSSurendra Singh
|
ANALYZING THE SOFTWARE QUALITY IN IMAGE PROCESSING SOFTWARE IN INDUSTRY USING MACHINE LEARNINGB Gopinathan1, R Kesavan2, J Senthil Murugan3, M A Mukunthan4
|
IMPROVED IMPERIALIST COMPETITIVE ALGORITHM FOR SELECTION PROBLEMS IN COMBINATORIAL OPTIMIZATIONLaxmikant, C. Vasantha Lakshmi, C. Patvardhan
|
U-SLOT MULTIBAND ANTENNA WITH PRUNED EDGES FOR WLAN, WI-MAX, X AND KU BAND APPLICATIONSMegha Shringi, Rajveer Singh, M L Meena
|
ANNOTATION SUPPORTED OCCLUDED OBJECT TRACKINGDevinder Kumar1 and Amarjot Singh2
|