Sr. No. |
Title |
Download |
1 |
OBSERVING AND RECOGNIZING OIL SPILL USING MODIS IMAGE OBTAINED BY SATELLITE. |
|
2 |
Review On Improvement Of Fingerprint Matching By Removing Distortion |
|
3 |
Detecting Malicious Facebook Application |
|
4 |
A Secure and Privacy-preserving Framework for m-Healthcare Using Android |
|
5 |
A SECURE TEXT TRANSMISSION USING VIDEO CRYPTOGRAPHY & HUFFMAN CODING |
|
6 |
An Implementation for secure Mobile-Healthcare framework using Android App Development Environment |
|
7 |
Efficient Opinion Mining For Multiple Domain. |
|
8 |
A Review On High Performance Asynchronous Deltasigma Modulator |
|
9 |
Scrutiny Of Broadcasting Protocols In VANET |
|
10 |
Design Of Algorithm And Architecture Of FIR Filter |
|
11 |
Digital Camera Identification Based On Advanced Feature Extraction Technique For Rotated And Scaled Image. |
|
12 |
Monitor And Control Physical Parameters In Polyhouse |
|
13 |
An Effective Selection Approach For Classification Algorithms With Proper Attribute Values To Build Classifier Model |
|
14 |
A Lossless Image Compression Based On Support Vector Machine And Adaptive Predictor Combination |
|
15 |
IP Geolocation Implementation For Different Points In An Application Request Lifecycle |
|
16 |
A Survey Report For Design Of FIR Filter |
|
17 |
Study Of THD For Various Kinds Of Loads Connected To The Distribution System |
|
18 |
Fine Registration Of 2.5D Faces By Using Modified Iterative Closest Point Algorithm |
|
19 |
Web Log Mining Based On Soft Clustering FCM And Multi-Objective Genetic Algorithm |
|
20 |
An Android Based Educational System For Ease Of Information Flow |
|
21 |
Automatic Health Monitoring System |
|
22 |
A Review On Numerical & Experimental Investigation Of Ranque Hilsch Vortex Tube For Thermal Performance |
|
23 |
Advanced Steganography Using Image, Audio And Video As A Cover Media |
|
24 |
DTMF Based Smart Agriculure |
|
25 |
Design Of FPGA�s High Speed Configurable Logic Units |
|
26 |
Determination Of Edges By Automatic Threshold Value Generation |
|
27 |
Secure And Fast Transmission To Isolated Cooperative Assemblies Framework
|
|
28 |
Climbable Face Image Retrieval From Sparse Impute |
|
29 |
BSAR Algorithm for Ad-hoc Network Security |
|
30 |
Resilient Identity Crime Detection Using HMM and TESLA |
|
31 |
Data Integrity Auditing for Securing Cloud Storage |