Weed Detection and Segmentation Using Deep Learning

WDS using DL

V . S. Naresh - ISBN: 978-620-6-79198-0

An effective password protection technique using decoy passwords

Decoy Passwords

Srinivasa Naresh Vankamamidi - ISBN: 978-620-6-79182-9

Digital Workflow In Orthodontics

Priyal Jain, Kimi Mittal, Kamal Bajaj - ISBN: 978-620-6-79191-1

Exploring the Politics of Transcendentalism in the English Poetry

A Literary Theological Analysis

Jayaraj Jebastian - ISBN: 978-620-6-79194-2

"CBCT-Guided Implantology: The Path to Success"

Role of CBCT in Implantology

Saltanat Khan, Rajeev Srivastava, Raveena Makker - ISBN: 978-620-6-79181-2

3D Evaluation of Pharyngeal Airway in Individuals

With Various Growth Pattern using Cone Beam Computerized Tomography

Akanksha Soni - ISBN: 978-620-6-79187-4

Exploring Automata Theory's Fundamentals and Framework

Navigating the Realm of Formal Languages and Automata Theory

Y. Jahnavi, P. Nagendra Kumar, M. Srinivasa Prasad - ISBN: 978-620-6-79153-9

Wormhole Isolation Method in MANET using Threshold Technique

Vikrant Sharma, Rajiv Vasudev, Gagandeep Singh - ISBN: 978-620-6-79190-4

STUDY OF THE ALKALOIDS OF NITRARIA SIBIRICA

Termiz State University Monograph

Allaberdiev Farkhod Khamraevich - ISBN: 978-620-6-78872-0