|
Issue |
Title |
|
Vol 4, No 1 (2022) |
Attendance System using RFID Technology |
Abstract
|
Smit Patel, Atharva Pawar, Rushil Shah, Santosh Rathod |
|
Vol 5, No 2 (2023) |
Automated Precautions for Fugitive Emission |
Abstract
|
Basavaraj Neelagund, Pooja ., Prajna ., Pooja R Shettigar, Muhammed Salman |
|
Vol 6, No 3 (2024) |
Autonomix: Empowering Network Security with DRLA for Anomaly Detection |
Abstract
|
Suma S.G |
|
Vol 7, No 1 (2025) |
“AI-Based Heart Disease Prediction System” |
Abstract
|
Pavan Narayan L, Rohan Reddy R, Punith Gowda K S, Sagar P V |
|
Vol 7, No 3 (2025) |
BALASURAKSHA: A web application with Reporting system and aims to spread awareness on child safety |
Abstract
|
Dr. Bollu Bhavya Sri, Dudala Amoolya, Dr.K. Sreekala, Mrs. K Sunitha, Mrs. G Naga Sujini, Dr. A. Nagesh |
|
Vol 1, No 2 (2019) |
BCT in the Agricultural Supply Chain |
Abstract
|
P. Jagtap |
|
Vol 6, No 1 (2024) |
CHRONIC KIDNEY DISEASE DETECTION SYSTEM USING DEEP LEARNING |
Abstract
|
Akshay Ramesh, Ashwin Babu, Binoy Pious, Rahul R S, Jasna K |
|
Vol 2, No 1 (2020) |
Classification of Network Cyberattacks for Efficient Cognitive Fog Computing |
Abstract
|
Prof. A. V. Deorankar, Shiwani S. Thakare |
|
Vol 5, No 1 (2023) |
CYBERTIVITY |
Abstract
|
I Pavan Kumar |
|
Vol 7, No 1 (2025) |
Decentralized Trust Management in Web 3.0: A Comprehensive Approach to Network Security |
Abstract
|
Vinod Veeramachaneni |
|
Vol 7, No 2 (2025) |
Defending Against Ransomware Attacks with DKIM and SPF |
Abstract
|
D.Suvarna Lakshmi Manikanteswari, N. Hiranmayee, M.N.V Surekha, S. Shanthi Rupa |
|
Vol 4, No 2 (2022) |
Design and Development of a Hybrid Intrusion Detection and Prevention System for Cloud Computing and Internet of Things Environment |
Abstract
|
Safayet Hossain, Sanzida Islam, Ahsan Ullah, Afzal Hossain |
|
Vol 3, No 1 (2021) |
Design and Development of a Hybrid Intrusion Detection and Prevention System for Cloud Computing and the Internet of Things Environment |
Abstract
|
Afzal Hossain |
|
Vol 7, No 3 (2025) |
Digital Classroom: A Learning Management Platform for Teachers and Students |
Abstract
|
Thammineni Medari Nikilesh Kumar, Samaleti Trishul Chakra, Dr. K. Sreekala, K. Sirisha, Mr. Sathya Shekar Varma |
|
Vol 3, No 1 (2021) |
Digital India Digital Governance using BCT |
Abstract
|
Madhuri Patil, Pratiksha Pednekar, Jyoti Sawant, Pratiksha Salunkhe, G.B. Yadav |
|
Vol 3, No 1 (2021) |
Digital India Digital Governance Using BCT |
Abstract
|
Jyoti Sawant |
|
Vol 3, No 2 (2021) |
Direction Age Based on Sensors Used in Driver Help |
Abstract
|
Akkriti Sharma |
|
Vol 6, No 3 (2024) |
E-Commerce Website for Online Book Sale |
Abstract
|
B. Deekshitha Prasanna, Chinthala Sweety, Dr. Meera Alphy, Ms. K. Shrisha |
|
Vol 2, No 1 (2020) |
ECSDA-based Security Approach to Blockchain for Online Transactions Using Cryptocurrency |
Abstract
|
Arifa . |
|
Vol 1, No 2 (2019) |
Efficient Noise Aware Level Based Routing Protocol for UWSNs |
Abstract
|
Md. Meraj Ali |
|
Vol 3, No 2 (2021) |
Efficient Noise-Aware Level-Based Routing Protocol for UWSN |
Abstract
|
Meraj Aslam |
|
Vol 5, No 2 (2023) |
Electricity Theft Detection |
Abstract
|
Sandali Patil, Vaishnavi Babar, Priyal Ingale, Chandrakant Kokane |
|
Vol 5, No 3 (2023) |
Email classification system using ontology-base binary tree |
Abstract
|
Aruna Kumara B, Sanjana V, Sumukha B G, Vishal S Hiremath, Naveen S Narayanan |
|
Vol 5, No 3 (2023) |
Enforced Security Technologies with Utilities |
Abstract
|
Arunachalam K |
|
Vol 3, No 1 (2021) |
Enhanced Authentication Mechanism using Negative Password: An Approach for Intrusion Detection |
Abstract
|
Shiva Kumar G V, Dr Devananda S N, Suhas G K |
|
26 - 50 of 108 Items |
<< < 1 2 3 4 5 > >> |