A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKSU. Latha1 , K. Ramesh Kumar2
|
ROAD DETECTION USING MORPHOLOGICAL OPERATIONS IN A COMPLEX SCENARIONeetha Joseph, Jyotsna E
|
AUTONOMOUS MOVEMENT OF MOBILE RELAYS IN WIRELESS SENSOR NETWORK TO ENHANCE NETWORK LIFETIMERegis W. Anne1, Elijah Blessing Rajsingh2
|
AI-ENABLED PREDICTIVE ANALYTICS FOR EMPLOYEE WELL-BEING: A CLUSTER-BASED APPROACH TO PROACTIVE HR STRATEGIES IN THE DIGITAL ERAAbhishek Suvarna
|
INNOVATIVE DATA HIDING SECURITY MODEL USING FORENSIC AUDIO VIDEO CRYPTO-STEGANOGRAPHYSunil K Moon1, Rajeshree D Raut2
|
ANALYSIS ON THE PERFORMANCE OF BILATERAL FILTERS IN MULTI FOCUSED IMAGE FUSIONK Kannan
|