Sr. No. |
Title |
Download |
1 |
Combination Of RGB Substitution For Text To Image Encryption Technique Using AES |
|
2 |
Thermal Imaging For Breast Cancer Detection: A Controversy |
|
3 |
Contamination Of Pesticides Residues On Grape Growing Soils In Nashik District |
|
4 |
Advanced Steganography for cover media audio,video,image |
|
5 |
Finger-Key based user log-on system |
|
6 |
Structural Analysis & Optimization of EDM Machine Table |
|
7 |
Attribute Based Encryption In Cloud |
|
8 |
Decision Tree Based IDS Using Wrapper Approach |
|
9 |
Design of a Cloud Based Emergency Healthcare Service Model |
|
10 |
Wave Transit Time Based Cuff less Long-Term Continuous Blood Pressure Measurement |
|
11 |
Secure Data Hiding in Cloud Computing |
|
12 |
Comparative Study of Bow- tie and Bow-tie Slot Antenna for Ku band Application |
|
13 |
Lesion Detection in Retinal Images using Back Propagation Neural Network |
|
14 |
Hand Gesture Robot Control Using Color Recognition System |
|
15 |
Continuous User Authentication Using Soft Biometric Traits |
|
16 |
Gadgets As Invisible Key For Physical Security In Human Computer Interaction |
|
17 |
Bio-reduction of heavy Metals from Effluent of electroplating Industries by Staphylococcus Y1 And Bacillus Species of Microbes. |
|
18 |
SBTAM – Balance between Privacy and Utility using k-anonymity |
|
19 |
Mining of High Utility Item Sets Using Threshold |
|
20 |
Emerging Technology: Cloud Computing & its Associated Issues |
|
21 |
Exploration of User’s Surfing Behavior for Recommended System: A Survey |
|
22 |
Embedding Brain With Smart Devices Using Depreciated Technology |
|
23 |
An Efficient Data Communication Using Conventional Codes |
|
24 |
Impact of Social Networking Sites in Brand Expansion |
|
25 |
An Efficient Technique for Improving the Power Signal Spectral Estimation |
|
26 |
Information Retrival Using User Preferences In Personalized Mobile Search Engine |
|
27 |
Face Identification from Blurred and Noisy Images Using Modified Facial Deblur Inference (FADEIN) Algorithms |