Survey on Cloud Computing Security
|
2020 |
Sinchana, M. K. |
Performance Analysis on the Basis of Learning Rate
|
2020 |
Vidushi |
A Model for Real-Time Biometric Authentication Using Facial and Hand Gesture Recognition
|
2020 |
Pandey, Astitva Narayan |
Network Quality of Service
|
2020 |
Gandhi, Dherya |
Image Enhancement Filter
|
2020 |
Jha, Alok Nath |
Bharatanatyam Hand Mudra Classification Using SVM Classifier with HOG Feature Extraction
|
2020 |
Varsha, K. S. |
Analysis of Success of Digital Marketing Using Vernacular Contents
|
2020 |
Sharma, Agrim |
A Review on Blockchain and Its Necessitate in Industrial IoT
|
2020 |
Rathee, Geetanjali |
Fuzzy Resembler: An Approach for Evaluation of Fuzzy Sets
|
2020 |
Sivakumar, Roshan |
A Novel Approach to Identify Facial Expression Using CNN
|
2020 |
Mareeswari, V. |
Study and Review of Learning Management System Software
|
2020 |
Sharma, Mahima |
Identifying User’s Interest in Using E-Payment Systems
|
2020 |
Srinivas, K. |
Steganalysis of Very Low Embedded JPEG Image in Spatial and Transform Domain Steganographic Scheme Using SVM
|
2020 |
Shankar, Deepa D. |
Approaches for Efficient Query Optimization Using Semantic Web Technologies
|
2020 |
Mukkamala, Rambabu |
IoT-Based Data Logger for Environmental Monitoring
|
2020 |
Mishra, Ved P. |
A Hybrid Approach for Protecting Mobile Agents Against Malicious Hosts
|
2020 |
Kumar, Kanduru Phani |
A Futuristic Development in the Sanatorium Domain to Enhance Human Life in Secure and Safeguarded Technique with the Aid of IoT
|
2020 |
Basavaraju, Bhavan Kumar |
A Brief Literature on Optimization Techniques and Their Applications
|
2020 |
Kumar, Alok |
Vehicular Collision Avoidance at Intersection Using V2I Communications for Road Safety
|
2020 |
Pasha, Mohammad |
Smart Device Challenges and Security Channels
|
2020 |
Singh, Paramveer |