A Survey on Different Scheduling Algorithms in Operating System
|
2021 |
Chitralekha, G. |
Ayurvedic Plant Recognition Using Multi-learners Model
|
2021 |
Sonia, Annie |
Smart Twitter Analysis on Location Using Kali Linux
|
2021 |
Sikri, Nishant |
Video Steganography: Storing Data in the Transition of Frames
|
2021 |
Paranjape, Tejas |
A Data Privacy Approach Using Shamir’s Secret Scheme in Permissioned Blockchain
|
2021 |
Kumar, K. Sunil |
Shape and Texture Features Extraction Using Segmented Histopathological Images
|
2021 |
Rajyalakshmi, U. |
An Overview of Blockchain-Based Smart Contract
|
2021 |
Kushwaha, Satpal Singh |
IoT: A Novel Method for White Coat Effect (WCE) Detection from Cloud for Improving Patient’s Treatments
|
2021 |
Madhan, E. S. |
Detection and Classification of Distributed DoS Attacks Using Machine Learning
|
2021 |
Usha, G. |
Host Platform Security and Mobile Agent Classification: A Systematic Study
|
2021 |
Acharya, Ayushi |
Narrow Band Spectrum Sensing of Cognitive Radio for Wireless Services
|
2021 |
Aswini, T. V. N. L. |
Reliable Mechanism to Detect Traditional Cyber Attack Using Artificial Neural Networks
|
2021 |
Ahanger, Tariq Ahamed |
IoT-Based Water Quality Monitoring System Using LoRaWAN
|
2021 |
Sreelekha, Liloja M. |
Top Threats to Cloud: A Three-Dimensional Model of Cloud Security Assurance
|
2021 |
Kumar, Rakesh |
Analysis of E-learning Effectiveness in Higher Education
|
2021 |
Gowda, Ramya S. |
AHB Protocol Verification Using Reusable UVM Framework and System Verilog
|
2021 |
Harshavardhan, Manoj |
Attendance Automation Using Computer Vision and Biometrics-Based Authentication-A Review
|
2021 |
Raj, Suraj |
Vehicle Identification Using Automotive LIDAR VLP-16 and Deep Learning
|
2021 |
Keertheeswaran, M. P. |
A Study on Human Face Recognition Techniques
|
2021 |
Ranjani, S. |
Impact of Cyberattacks on Electronic Patient Health/Medical Records
|
2021 |
Kumar, B. R. Arun |