Title | Area of Research | Auther Name | Action |
A Comprehensive Survey of Information Security Governance Models and Frameworks | CSE | Aslam Rashid Khan |
Download
|
DIRECTING CUSTOMERS TO SUBSCRIPTION THROUGH APP BEHAVIOR ANALYSIS | Computer Engineering | RITHANYA P |
Download
|
ATTENDANCE USING FACIAL RECOGNITION SYSTEM | Computer Engineering | Amith K V |
Download
|
HYBRID DEEP LEARNING MODEL WITH ENHANCED ACCURACY FOR PNEUMONIA | Computer Engineering | SWETHA S |
Download
|
REVIEW ON EMBEDDED WEB TECHNOLOGY AND INDUSTRIAL COMMUNICATION | TECHNOLOGY | Bharath |
Download
|
Search Engine Optimization with Google Updates 2022 | Computer Science and Engineering | DHAMOTHIRAN V |
Download
|
A Review Paper on Networking Topologies | Computer Science | Sanjay GK |
Download
|
Deep Neural Networks are used to identify theft of energy in systems for managing energy. | MCA | Shubha R |
Download
|
Writing Overview on Huge Information about De-duplication of Data in Large Firms using Cloud Computing | Computer Science & Engineering | Mohd Naseerruddin |
Download
|
Redundancy in Cloud Server De-duplication of Data in Big Data (Hadoop) | Computer Science & Engineering | Abdul Ahad Afroz |
Download
|
Multi-threshold image segmentation based on an improved differential evolution | data mining | Zahid Hussaen |
Download
|
OBJECT DETECTION USING CNN | Master Of Computer Application | Vinay L |
Download
|
Working Phenomena Distributer | Computer Engineering | M.D Akbar Ali |
Download
|
A Three Layer Privacy Preserving Cloud Storage Scheme | Computer Engineering | Saud Ahmed Khan |
Download
|
Plant Disease Prediction using the Internet Of Things. (IOT) and Machine Learning - Blister Blight in the Tea Plant. | MCA (MASTER OF COMPUTER APPLICATION) | Simran M |
Download
|
|