Zobrazeno 1 - 10
of 33
pro vyhledávání: '"T. Avudaiappan"'
Publikováno v:
Materials Today: Proceedings. 69:710-715
Autor:
Ashit Kumar Dutta, Jenyfal Sampson, Sultan Ahmad, T. Avudaiappan, Kanagaraj Narayanasamy, Irina V. Pustokhina, Denis A. Pustokhin
Publikováno v:
Computers, Materials & Continua. 72:1157-1172
Publikováno v:
Virtual and Augmented Reality for Automobile Industry: Innovation Vision and Applications ISBN: 9783030941017
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::16f8219ae9d11fb809286bf55502d4d1
https://doi.org/10.1007/978-3-030-94102-4_9
https://doi.org/10.1007/978-3-030-94102-4_9
Autor:
R. Punithavathi, M. Sharmila, T. Avudaiappan, I. Infant Raj, S. Kanchana, Samson Alemayehu Mamo
Publikováno v:
Evidence-Based Complementary and Alternative Medicine.
Over the past few decades, the rate of diagnosing depression and mental illness among youths in both genders has been emerging as a challenging issue in the present society. Adequate numbers of cases that have been prevailing had unheard of symptoms
Autor:
K. Kalaiarasan, Lavanya Prathap, M. Ayyadurai, P. Subhashini, T. Tamilselvi, T. Avudaiappan, I. Infant Raj, Samson Alemayehu Mamo, Amine Mezni
Publikováno v:
Evidence-Based Complementary and Alternative Medicine.
Cranial base tactics comprise the regulation of tiny and complicated structures in the domains of otology, rhinology, neurosurgery, and maxillofacial medical procedure. Basic nerves and veins are in the nearness of these buildings. Increased the trut
Publikováno v:
Cluster Computing. 22:9815-9823
Cloud computing is a growing and excellent technology, as exponentially increasing the interest among users to utilize cloud applications; they need to depend on any one of the particular service provider. Now a day’s number of service providers al
Autor:
S. Sundara Pandiyan, R. Balasubramanian, M. Saravanan, T. Avudaiappan, K. Shankar, S. K. Lakshmanaprabu
Publikováno v:
Journal of Medical Systems. 42
Security is the most critical issue amid transmission of medical images because it contains sensitive information of patients. Medical image security is an essential method for secure the sensitive data when computerized images and their relevant pat
Publikováno v:
i-manager's Journal on Image Processing. 1:36-42
Publikováno v:
International Journal of Signal Processing, Image Processing and Pattern Recognition. 7:239-248
Various kinds of images and pictures are required as sources of information for analysis and interpretation. When an image is converted from one form to another such as scanning, transmitting, digitizing, storing etc., degradation occurs to the outpu
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.