Title | Area of Research | Auther Name | Action |
Detection of Phishing Website Using Machine Learning and Features Extraction | Computer security | Amaefule I.A |
Download
|
CAR RENTAL MANAGEMENT SYSTEM | Computer Engineering | Divyashree.K |
Download
|
Data Mining Application In Ayurveda Therapy For Treatment Of Cancer | Computer Engineering | Dr. Deepa Nyayadhish |
Download
|
BRAIN TUMOR DETECTION AND CLASSIFICATION | Computer Engineering | R Yashodara |
Download
|
Mouse Control Using Hand Gesture Recognition | Computer Engineering | Divyashree.K |
Download
|
AVATAR GENERATORS | Computer Engineering | R Yashodara |
Download
|
A Novel Method for Intrusion Detection in Autonomous Distributed IoT Systems Utilise Stochastic Petri Net Modeling | Computer Engineering | Mr. Darshan K Revankar |
Download
|
Review on Network Security and Cryptography | Computer Science and Engineering | Mr. Pradeep Nayak |
Download
|
A REVIEW NETWORK SECURITY IN CLOUD COMPUTING ENVIRONMENT | Computer Engineering | Jishnu Raj V K |
Download
|
A Review of Blockchain Technology in Knowledge-Defined Networking, Its Application, Benefits, and Challenges | Computer science | Suneel P K |
Download
|
THE FIRST COMPUTER COMMUNICATION NETWORK BETWEEN EAST AND WEST | Computer science | Sreedeep P |
Download
|
IMAGE STEGANOGRAPHY INSPIRED BY CNN BASED ENCODER-DECODER MODEL | Computer Engineering, | Erla lavanya |
Download
|
Eco Ledger: An Improved Wildlife Monitoring System Using Blockchain | Information Science & Engineering | Sathwik K D |
Download
|
The Role of Blockchain Technology in Enhancing Network Security and Privacy | Computer Engineering | PRAJWAL S.B |
Download
|
Blockchain-Enabled Supply Chain For Agricultural Products | Information Science & Engineering | Manjunath R |
Download
|
|