Title | Area of Research | Auther Name | Action |
E-User verification using Blockchain | Information Technology Engineering | Prashanth Gone |
Download
|
REAL-TIME FACE DETECTION AND SECURITY SYSTEM FOR ATM MACHINE | Information Technology | Mr. Rahul Fere |
Download
|
Soil based Crop Prediction and Whether Forecasting | Information Technology | Akshay Jadhav |
Download
|
Requirement analysis in rfp | Information technology | KEERTHANA S |
Download
|
Obesity Classification Using Machine Learning | Information Technology Engineering | Akanksha Subhash Gulekar |
Download
|
Women's Health and Protection Application | Information Technology | Sonali Jathar |
Download
|
Secured E-Banking System: Enhancing Security and Trust in Online Financial Transactions | CYBER SECURITY | NANDHAKUMAR S |
Download
|
Fortifying Data Integrity and Implementing the AES Algorithm for Enhanced Reliability | Computer Science | Moni Ajit S |
Download
|
SENTIMENTAL ANALYSIS USING DEEP LEARNING TECHNIQUES | INFORMATION ENGINEERING | NAMITHA P |
Download
|
SIGN LANGUAGE PREDICTION WEBSITE | INFORMATION TECHNOLOGY | KARTHIKEYAN S |
Download
|
IDENTIFICATION OF CHILDREN AT RISK OF SCHIZOPHRENIA VIA DEEP LEARNING AND EEG RESPONSES | Information Technology | HARINI P |
Download
|
SPOOFGUARD: UNVEILING DECEPTIVE ONLINE PLATFORMS | Artificial Intelligence | SUSHMA V |
Download
|
TASK FLOW PRO | INFORMATION TECHNOLOGY | PRIYADHARSHINI M |
Download
|
WEB CODE GROUND | Information Technology | Rasika R |
Download
|
EFFICIENTNET-ENHANCED AVIAN SPECIES IDENTIFICATION AND MONITORING SYSTEM | Computer Engineering | Yamuna S |
Download
|
|