|
Issue |
Title |
|
Vol 3, No 3 (2020) |
A Car-bot Waiter for Providing Services of Restaurants to Limit Human in Pandemics like COVID-19 |
Abstract
|
A. A. Md. Monzur-Ul-Akhir, Md. Ismail Jabiullah, Shomitro Kumar Ghosh |
|
Vol 1, No 3 (2018) |
A Fieldwork on Valuation Techniques for Property Acquired by the Government for Rehabilitation and Resettlement Purpose |
Abstract
|
Sreekantha Desai Karanam, Naina Kalyanshetti |
|
Vol 1, No 2 (2018) |
A Model for Implementing Secured IoT Devices in Public Platform |
Abstract
|
Morsa Chitanya |
|
Vol 7, No 3 (2024) |
A Modern Vehicle Management System for Smooth Communication |
Abstract
|
Emon Tahsin Eyon, Md. Ismail Jabiullah |
|
Vol 1, No 2 (2018) |
A Modified Filtering Approach of LSB Image Steganography Using Stream Builder along with AES Encryption |
Abstract
|
Md. Palash Uddin |
|
Vol 6, No 3 (2023) |
A review on Fortidrop: Cloud-based secure file-sharing tool using Cryptography |
Abstract
|
Sumit Bakane, Abhijeet Lande, Prof. Vinayak Sathe |
|
Vol 4, No 2 (2021) |
A Review on Security Sensor Alert System |
Abstract
|
Eshaa Gogia, Ananya Dixit, Shubhangi Mahato, Karuna Dhruve, Kauleshwar Prasad |
|
Vol 1, No 2 (2018) |
A Summary of Literature Review: Face Recognition |
Abstract
|
Jinu Celine |
|
Vol 6, No 1 (2023) |
A Survey on Machine Learning-based Self-Monitoring of Bloom from Expert Perspectives and Student Experiences |
Abstract
|
Khallikkunaisa ., Amani Nazir, Arbiya Fathima, Arshiya Tabassum, Fathima Fida TV |
|
Vol 8, No 1 (2025) |
An Adaptive Learning Path Optimization Algorithm for Personalized E-Learning |
Abstract
|
Praveenkumar Babu, M. Thangamani, Dr. Chandra Sekar P |
|
Vol 4, No 3 (2021) |
Analysis of Network Security Issues and Dangers Investigation on 5G Remote Networks |
Abstract
|
Tusher Chandra Ghosh, Md. Ismail Jabiullah |
|
Vol 4, No 3 (2021) |
Analysis of Scientific Research Productivity of Amrita University Bengaluru: A Scientometrics Study of Eminence University |
Abstract
|
Mr Duragappa, Dr Sheshadri K N |
|
Vol 1, No 3 (2018) |
Analysis of Variance Carried Out For Software Defect Prediction |
Abstract
|
Swathi. K, arun Birader |
|
Vol 4, No 1 (2021) |
Analyzing Tweets to Rank FIFA Players using Named Entity Recognition |
Abstract
|
Md. Niaz Imtiaz, Md. Toukir Ahmed, Golum Rabby |
|
Vol 1, No 3 (2018) |
Android Based Picture Steganography |
Abstract
|
Chiranjeevi H |
|
Vol 1, No 2 (2018) |
Applications of IoT in Smart City: A Study |
Abstract
|
Anita Mariet Gonsalves |
|
Vol 4, No 3 (2021) |
Arthritis Detection using AI |
Abstract
|
Suneetha J, Prasanjit Singh, Krishmal Shrestha, Abhijeet Singh, Pallavi Bhagat |
|
Vol 5, No 2 (2022) |
Attendance System using NodeMCU |
Abstract
|
Nimit Bhinde, Punit Dama, Karan Gori, Santosh Rathod |
|
Vol 2, No 2 (2019) |
Automated Smart Greenhouse System |
Abstract
|
Aradhana P |
|
Vol 7, No 1 (2024) |
Automatic Car Parking Assistance using Arduino |
Abstract
|
Anisha Mishra, Alokita Sahu, Ashish Kumar Dass, Manjushree Nayak |
|
Vol 3, No 1 (2020) |
Automatic Railway Gate Controlling and Smart System of Railway Gate Crossing using IoT |
Abstract
|
Akash Waghmare, Himanshu Ghate, Gaurav Maske, Pradarshit Kurzekar |
|
Vol 2, No 2 (2019) |
Biometric Authentication Based Security System |
Abstract
|
Hardik Kumar, Kshitij Nim |
|
Vol 8, No 1 (2025) |
Bite-Sized Innovations: An In-Depth Review of Deep Learning Approaches to Food Recognition |
Abstract
|
R. Sanjana, J. Umesh Chandra, M. Nikesh, M. Bharathi |
|
Vol 6, No 3 (2023) |
Block-Bazaar Blockchain enabled E-commerce |
Abstract
|
Shivam Gupta, Shatakshi Singh, Shreya Maheshwari, Sonam Gupta, Dr.Anupama Sharma |
|
Vol 7, No 2 (2024) |
Byte Battle: A Swift Overview of Security Challenges of Blockchain Technology |
Abstract
|
M. Bhuvaneswari |
|
1 - 25 of 121 Items |
1 2 3 4 5 > >> |