INNOVATIVE DATA HIDING SECURITY MODEL USING FORENSIC AUDIO VIDEO CRYPTO-STEGANOGRAPHYSunil K Moon1, Rajeshree D Raut2
|
DETERMINANTS OF CUSTOMER RETENTION IN MOBILE INDUSTRY - EVIDENCE FROM TIGO AND VODACOM CUSTOMERS IN ILALA DISTRICT, DAR ES SALAAM-TANZANIADavid Mosoma 1, Damas Mfundiri2
|
AI BASED MACHINE LEARNING ALGORITHM IN VLSI TECHNOLOGY APPLICATIONG.R. Thippeswamy1, R. Jayadurga2, Suresh Kumar Sharma3
|
GATE ENGINEERING OF DOUBLE GATE In0.53Ga0.47As TUNNEL FETC. S. Praveen, Ajith Ravindran, Shajimon K John, Susan Abe
|
IS SOCIAL MEDIA AN EFFECTIVE STRATAGEM FOR INDIAN LAW FIRMSKundhavai Santharam1, Thillairajan2
|
DESIGN ENTERPRISE ARCHITECTURE FOR INDUSTRY OF TEXTILE USING ZACHMAN FRAMEWORKJefry Leonardo, Johanes Fernandes Andry
|