|
Issue |
Title |
|
Vol 1, No 1, 2, 3 (2016) |
A Big Data for Apache Cassandra |
Abstract
PDF
|
Anika Gupta |
|
Vol 4, No 1 (2019) |
A Comparative Study of Supervised Machine Learning Algorithms for Fruit Prediction |
Abstract
PDF
|
Mr. Razat Agarwal, Prof. Parth Sagar |
|
Vol 3, No 1 (2018) |
A Self-Diagnosis Medical Chatbot Using Artificial Intelligence |
Abstract
PDF
|
Divya S, Indumathi V, Ishwarya S, Priyasankari M, Kalpana Devi S |
|
Vol 4, No 2 (2019) |
A Study on Advanced Cross Site Request Forgery Attacks and its Prevention |
Abstract
PDF
|
Ms. Sahana M P, Ms. Sonali Joyce Lobo |
|
Vol 3, No 1 (2018) |
A Survey on Spatial Indexing |
Abstract
PDF
|
Shaik Abdul Nusrath Begum, K. P. Supreethi |
|
Vol 1, No 1, 2, 3 (2016) |
A Survey Report on Extracting Frequent Patterns using FP-Growth Algorithm and Apriori Algorithm |
Abstract
PDF
|
Kannasani Srinivasa Rao, M Krishnamurthy, A Kannan |
|
Vol 4, No 2 (2019) |
An Analytical Study of Rumoured Tweets by Using Twitter Data |
Abstract
PDF
|
Mr. Shubham Sharma, Mr. Kunal Rathore, Ms. Shally Mittal, Dr. Sanjay Srivastava |
|
Vol 2, No 1, 2, 3 (2017) |
An E-learning Technology Conceptually |
Abstract
PDF
|
Deepali Pande (Gosavi), Dr. V. M. Thakare, Dr. V. M. Wadhai |
|
Vol 3, No 3 (2018) |
Analysis of Hardware and Software Security Challenges in IoT |
Abstract
PDF
|
Ms. Pooja V. Chavan, Prof. Mansi Kambli |
|
Vol 3, No 2 (2018) |
Analysis of Hybrid Recommendation System for E-commerce Application |
Abstract
PDF
|
Jayashree Salunke, Anagha Chaudhari |
|
Vol 3, No 3 (2018) |
By using Internet of Things Analysis of Waste Monitoring System |
Abstract
PDF
|
Ms. Senthur Selvi V, Ms Fathima Mubarakkaa M |
|
Vol 4, No 3 (2019) |
Campus Examination System Automation |
Abstract
PDF
|
Mr. Sourabh Rathor, Mr. Nikhil J U, Mr. Srinivasa H P |
|
Vol 1, No 1, 2, 3 (2016) |
Change Detection using Fast Subpixel Mapping Algorithms |
Abstract
PDF
|
S. Rajesh, K. Jeyavani, M. Surya, R. Swathi |
|
Vol 2, No 1, 2, 3 (2017) |
Cloud Computing Models: Background, Data security, & Security Issues |
Abstract
PDF
|
Shashi ., Dr. Anuranjan Mishra |
|
Vol 1, No 1, 2, 3 (2016) |
Contribution of Internet of Things: A Survey |
Abstract
PDF
|
S. Devipriya |
|
Vol 4, No 2 (2019) |
Deep Reinforcement Learning for Action Based Object Tracking in Video Sequences |
Abstract
PDF
|
Ms. Aishwarya N Inamdar, Ms. Vindhya M .P |
|
Vol 3, No 1 (2018) |
Deploying OpenStack on CentOS for Personalized Cloud Environment Using the KVM Hypervisor |
Abstract
PDF
|
Rajat Sharma, Mayur Deshmukh, Swapnil Pote |
|
Vol 4, No 1 (2019) |
Detecting Phishing Attack and Spam Email Classification |
Abstract
PDF
|
Ms. Sandhya S. Dhakane, Ms. Apurva S. Badgujar, Mr. Sohel Bagwan, Mr. Bharti Kudle |
|
Vol 1, No 1, 2, 3 (2016) |
Enhanced LSB Algorithm For Stegano Communication |
Abstract
PDF
|
Avi Kumar R, Keerthi Kumar K M |
|
Vol 2, No 1, 2, 3 (2017) |
Evaluation of Voice over Internet Protocol Quality of Service |
Abstract
PDF
|
Fasiku Ayodeji Ireti, Obasanya Tayo Dorcas |
|
Vol 2, No 1, 2, 3 (2017) |
Figurine Key Based User Authentication Using Bright Pass Method |
Abstract
PDF
|
Nirosha ., Priyanka ., Deepa. R |
|
Vol 3, No 1 (2018) |
Implementation Of E-Learning System on Full-Stack concept |
Abstract
PDF
|
Nitish Kumar, Chaitali Alhat, Rupali Bachhav |
|
Vol 2, No 1, 2, 3 (2017) |
Implementation of Friendbook: A Recommendation System for Social Networks |
Abstract
PDF
|
Mrs.Jayashree Salunke, Ms. Anagha Chaudhari |
|
Vol 1, No 1, 2, 3 (2016) |
Incident Management Using Lightning Connect To Connect External Databases |
Abstract
PDF
|
Arpita Aman, Arushi Kaul, Kaushikee ., Rishika Priya, Prajakta Deshpande, Rinkle Kapur |
|
Vol 3, No 3 (2018) |
Intrusion Detection System for Home Security by using Internet of Things |
Abstract
PDF
|
Ms. K. Monica Rachel |
|
1 - 25 of 44 Items |
1 2 > >> |