Title | Area of Research | Auther Name | Action |
DETECTION AND EXTRACTION OF SEA MINES USING CNN | Information Science and Engineering | Sheethal S |
Download
|
TRANFORMERS BASED MULTI-LABEL IMAGE CLASSIFICATION AND NAMING - A LITERATURE SURVEY | Computer Engineering | JERIN JACOB |
Download
|
THE IMPACT OF SOCIAL MEDIA ON STUDENTS’ ACADEMIC PERFORMANCE AT THE KURUTIE CAMPUS, NIGERIA MARITIME UNIVERSITY, DELTA STATE, NIGERIA | Computer Science and Engineering, Information Technology | Akosubo Iwekumo Stevyn |
Download
|
FACE MASK AND SOCIAL DISTANCING VIOLATION DETECTION- A COMPUTER VISION APPROACH | Computer Engineering | MAHSHIYA V.M |
Download
|
Transformer architecture for image capturing using deep learning approach | Computer Engineering | AJITH P J |
Download
|
SURFACE DEFECT DETECTION SYSTEM WITH MACHINE LEARNING | Information Science Engineering | SIRITH N |
Download
|
Intelligent E-Business to Increase Online Sales Using Web Mining | Computer Science and Engineering | Sachin Balvir |
Download
|
A REAL TIME APPLICATION TO REDUCE TRAFFIC ACCIDENTS | Information Science and Engineering | Abhishek R Dalawai |
Download
|
TRANFORMERS BASED MULTI-LABEL IMAGE CLASSIFICATION AND NAMING | Computer Engineering | JERIN JACOB |
Download
|
Literature survey of Blockexchange | computer science Engineering | SHAHANAS M S |
Download
|
Real Time Writing With Fingers On Webcam | Computer Science and Engineering | Jeet Patel |
Download
|
A REVIEW ON VEHICLE SPEED CONTROLLING AND POTHOLE DETECTION SYSTEM | Computer Science | Mustapha Lawal Abdulrahman |
Download
|
QUANTITATIVE EVALUATION OF AN AUTOMATED CONE-BASED BREAST ULTRASOUND SCANNER FOR MRI 3D US IMAGE FUSION | Computer Engineering | Lidhi P |
Download
|
Prevention of Wormhole Attack in WSN using Energy Optimized Scheme based on Hop | Computer Engineering | Yogesh Hassani |
Download
|
DIFFERENT TECHNIQUES USED FOR CREDIT CARD FRAUD DETECTION – A LITERATURE SURVEY | Computer Engineering | Bushara Hamza |
Download
|
|