|
Issue |
Title |
|
Vol 3, No 1 (2017) |
A Drive towards the Technological Advancement of Nigeria: Adequate Representation of Female Folk in Stem a Must |
Abstract
PDF
|
Femi-Jemilohun O. J, Obasanya T. D |
|
Vol 3, No 2,3 (2017) |
A LabVIEW based system for sorting of ripening stages of banana |
Abstract
PDF
|
V. Kulkarni, B. Chipade, M. S. Kasbe, S. S. Mule, T. H. Mujawar |
|
Vol 3, No 1 (2017) |
A Research Issues in Supply Chain Management (SCM) towards Information Technology (IT) |
Abstract
PDF
|
K. Thamizhmaran, K. Prabu |
|
Vol 4, No 3 (2018) |
A Review Study - In Image Retrieval Bridging of Semantic Gap |
Abstract
PDF
|
Mr. Rajat Pratap, Ms. Arti Gautam, Ms. Annu Malik, Ms. Reshu Agarwal, Mr. Govind Kumar Rahul, Ms. Shylaja Karatangi |
|
Vol 3, No 1 (2017) |
A Survey on Computational Offloading Models in Mobile Cloud Computing |
Abstract
PDF
|
Shalini Lakshmi A J, Vijayalakshmi M |
|
Vol 4, No 3 (2018) |
A Survey Paper on Audio Security |
Abstract
PDF
|
Mr. Trishala Sawant, Mr. Ajinkya Khurud, Mr. Saurav Das, Mr. Sushant Jillawar, Ms. Jayashree Katti |
|
Vol 2, No 1, 2, 3 (2016) |
A Survey Paper on Visual Cryptography Technique |
Abstract
PDF
|
B. Venkateswara Rao, T. Venu Gopal, Ch. Suresh Babu |
|
Vol 5, No 2 (2019) |
An Application of Voice Mail: Email Services for the Visually Challenged Individual |
Abstract
PDF
|
Mr. Rohit Rastogi, Ms. Anshika Rajput, Ms. Archana, Ms. Komal |
|
Vol 1, No 1, 2, 3 (2015) |
An Assessment of Video Quality using Watermark |
Abstract
PDF
|
Jyothi Lakshmi S, Smitha S |
|
Vol 2, No 1, 2, 3 (2016) |
An Efficient Authentication Scheme for Mitigating Maliciously Dropped Packets |
Abstract
PDF
|
Karthik. S, Dharmaraj. M, Mustak Ahamed. A, S. Manikandan |
|
Vol 2, No 1, 2, 3 (2016) |
An Overview on Creating an Alert System for Road Accident |
Abstract
PDF
|
Priyanka Jaiswal, Kartik Khot, Gayatri Chepurwar, Utsav Bhakre |
|
Vol 1, No 1, 2, 3 (2015) |
Analysis of Program Outcomes Attainment for Engineering Graduates for NBA Accreditation |
Abstract
PDF
|
Therese Yamuna Mahesh, Yalena Thomas, K. L. Shunmuganathan |
|
Vol 3, No 1 (2017) |
Analyzing Mao and Jihad Terror in India |
Abstract
PDF
|
Gopika Bhardwaj, Rishabh Kaushal |
|
Vol 4, No 2 (2018) |
Application of Real-Time Vehicle Detection |
Abstract
PDF
|
Rahul Badekar, Nilesh Uke |
|
Vol 5, No 3 (2019) |
Automated Cumulative Update Approach for Organizations |
Abstract
PDF
|
Ms. Shivani H, Mr. Kshitiz Jain, Ms. Veena Gadad |
|
Vol 4, No 3 (2018) |
Automated Traffic Signals using Real-Time Traffic Densities |
Abstract
PDF
|
Mr. Raj Kumar Shrivastava, Mr. Rakesh Yadav |
|
Vol 4, No 2 (2018) |
Bitcoin Fraud Detection using Data Mining Approach |
Abstract
PDF
|
Valmik Ravindra Patil, Avinash Pandharinath Nikam, Jayashri Sanjay Pawar, Minakshi Sudhakar Pardhi |
|
Vol 3, No 2,3 (2017) |
Breaking a Stick to form a Heptagon with Positive Integers |
Abstract
PDF
|
S.N.R.G. Bharat Iragavarapu, Annangi Yedukondalu |
|
Vol 4, No 2 (2018) |
Cardless Payment – A Secure Purchase Transaction Method Utilizing Fingerprint |
Abstract
PDF
|
Yashaswini Jogi |
|
Vol 2, No 1, 2, 3 (2016) |
Change Detection Using Fast Subpixel Mapping Algorithms for LISS IV Imagery |
Abstract
PDF
|
S. Rajesh, M. Usha Nandhini |
|
Vol 1, No 1, 2, 3 (2015) |
Comparative Study of Test Data Generation Techniques |
Abstract
PDF
|
Anuranjan Misra |
|
Vol 2, No 1, 2, 3 (2016) |
Comprehensive Analysis of Big Data and its Tools |
Abstract
PDF
|
Sarumathi Sengottaian, Shanthi Natesan, Ranjetha Palanisamy |
|
Vol 5, No 1 (2019) |
Data Analysis In Real Estate for Recommendation |
Abstract
PDF
|
Ms. Ritika Shelkar, Ms. Vaishnavi Sambare, Mr. Ramkrishna Vadali, Ms. Kaveri Yerge |
|
Vol 2, No 1, 2, 3 (2016) |
Design and Implementation of Computerizing the Dealership Management Software |
Abstract
PDF
|
Sasikumar Gurumoorthy |
|
Vol 2, No 1, 2, 3 (2016) |
Efficient Hybrid MAES Encryption Algorithm for Mobile Device Data Security at Rest in Cloud Environment |
Abstract
PDF
|
Sujithra. M, Padmavathi. G |
|
1 - 25 of 58 Items |
1 2 3 > >> |