Secure ATM Door Locking System Using RFID
|
2016 |
Rawat, Sandeep Singh |
Comparing the Capacity, NCC, and Fidelity of Various Quantization Intervals on DWT
|
2016 |
Sekhar, Velpuru Muni |
A Proposal for Searching Desktop Data
|
2016 |
Kayest, Mamta |
Image Resolution Enhancement Technique Using Lifting Wavelet and Discrete Wavelet Transforms
|
2016 |
Rao, M. Venkateshwar |
A Concept-Based Model for Query Management in Service Desks
|
2016 |
Veena, G. |
NUNI (New User and New Item) Problem for SRSs Using Content Aware Multimedia-Based Approach
|
2016 |
Chaudhary, Pankaj |
Data Fusion Approach for Enhanced Anomaly Detection
|
2016 |
Reddy, R. Ravinder |
A Recent Study of Emerging Tools and Technologies Boosting Big Data Analytics
|
2016 |
Pole, Govind |
Low-Power Analog Bus for System-on-Chip Communication
|
2016 |
Jillella, Venkateswara Rao |
A Shoulder-Surfing Resistant Graphical Password Authentication Scheme
|
2016 |
Rao, M. Kameswara |
Link Quality-Based Multi-hop Relay Protocol for WiMedia Medium Access Control
|
2016 |
Umadevi, K. S. |
Image Correspondence Using Affine SIFT Flow
|
2016 |
Dedeepya, P. |
A Proof-of-Concept Model for Vehicular Cloud Computing Using OMNeT++ and SUMo
|
2016 |
Pasha, Mohammad |
A Real-Time Implementation of Face and Eye Tracking on OMAP Processor
|
2016 |
Biradar, Vijayalaxmi |
Registration Plate Recognition Using Dynamic Image Processing and Genetic Algorithm
|
2016 |
Joseph, Glence |
Enhancing Cloud Computing Server to Use Cloud Safely and to Produce Infrastructure of High Performance Computing
|
2016 |
Sultanpure, Kavita |
Performance Analysis of Network Virtualization in Cloud Computing Infrastructures on OpenStack
|
2016 |
Van, Vo Nhan |
Text Clustering and Text Summarization on the Use of Side Information
|
2016 |
Raut, Shilpa S. |
Reliable Propagation of Real-Time Traffic Conditions in VANETS to Evade Broadcast Storm
|
2016 |
Farooq, Mohd Umar |
Password Reuse Behavior: How Massive Online Data Breaches Impacts Personal Data in Web
|
2016 |
Poornachandran, Prabaharan |