|
Issue |
Title |
|
Vol 8, No 3 (2020) |
CNN based Gesture Recognition for ISL |
Abstract
|
Vaishnavi Mohan Ahire, A. A. Khaparde, V. V. Deshmukh |
|
Vol 6, No 2 (2018) |
Collision Avoidance Using Li-Fi Based Inter Vehicle Communication |
Abstract
|
Preethi S |
|
Vol 8, No 2 (2020) |
Comparative Analysis of Distributed Energy Efficient Clustering Protocols in Heterogeneous Wireless Sensor Network |
Abstract
|
Gurwinder Kaur, Diksha Rani |
|
Vol 8, No 1 (2020) |
Cyber Security for Rail Infrastructure eMaintenance: Threats and Implications |
Abstract
|
Nalli Vinaya Kumari, G.S. Pradeep Ghantasala, Raja Suresh Kumar Pitla |
|
Vol 9, No 3 (2021) |
Cyber Security Purity in 2021 and Afar Tips for Businesses |
Abstract
|
Hardik Dumada, Aashutosh Shukla, Dhaval Chudasama |
|
Vol 8, No 2 (2020) |
Cybersecurity and the World of Tomorrow |
Abstract
|
James P. Embrey |
|
Vol 5, No 3 (2017) |
Data Mining Methods for Terrorist Activity |
Abstract
|
Ezhilarasi R, P. Arumugam |
|
Vol 8, No 2 (2020) |
Deep Learning Based Plant Disease Detection |
Abstract
|
Soumya Shetty, Palvi Sawant, Bhagyashree Singasane, Mahi Khemchandani |
|
Vol 10, No 1 (2022) |
Deepfake Detection Using Resnext50 |
Abstract
|
Vaishali Jadhav, Taabish Sutriwala, Raunak Singh, Sohel Siraj Mukadam |
|
Vol 9, No 1 (2021) |
Design and Performance Assessment of Light Weight Data Security System for Secure Data Transmission in IoT |
Abstract
|
Abha Jaduna, Satish Kumar Alaria |
|
Vol 8, No 1 (2020) |
Design of Folded Cascode Amplifier for SCL 180 nm Technology Node for Low Power Applications |
Abstract
|
Rajiv Ranjan Thakur, Pragati Singh, Chaitali Koley |
|
Vol 8, No 1 (2020) |
Detection of Fake Request and Response using Certificates Information and IP Address of SDN |
Abstract
|
Lal Babu Yadav, Vivek Srivastava, Ravi Shankar Pandey |
|
Vol 7, No 2 (2019) |
Digital Data Sharing Using Blockchain |
Abstract
|
S. Monisha, V. Pavithra, R. Priyanya, N. Pooranam |
|
Vol 7, No 3 (2019) |
DNA Cryptography based Data transmission |
Abstract
|
Yogendra Kumar Upadhyaya, Chetna Sinha |
|
Vol 9, No 1 (2021) |
DoS Attacks and Detection Schemes in Wireless Mesh Networks |
Abstract
|
Amnah Abdulrhman AlAyidi, Randa Ahmed Jebeur |
|
Vol 10, No 2 (2022) |
Email Spam Classifications Based on Support Vector Machine and Recurrent Neural Network |
Abstract
|
Satyendra Shukla, Pawanesh Singh |
|
Vol 11, No 2 (2023) |
Emerging Paradigms: Leveraging Artificial Intelligence and Machine Learning for Enhanced Wireless Network Security |
Abstract
|
Ikvinderpal Singh, Sapandeep Kaur Dhillon |
|
Vol 9, No 2 (2021) |
Encryption Mechanism under Prevalent Invasion |
Abstract
|
Yashika Tanwar, Himanshi Tanwar, Shailender Gupta |
|
Vol 6, No 3 (2018) |
Energy conserving Detection Model for cooperative region Attacks in Wireless detector Networks |
Abstract
|
S. Gayathri |
|
Vol 8, No 2 (2020) |
Energy efficiency improvement in LEACH protocol for wireless sensor network |
Abstract
|
Safiullah Noori, Nirav Raja |
|
Vol 11, No 2 (2023) |
Enhancing Cybercrime Detection Through Big Data Analytics: A Conceptual Framework |
Abstract
|
Dharmraj Kumar Vitragi, Lalan Kumar Singh, Arif Mohammad Sattar, Mritunjay Kr. Ranjan |
|
Vol 6, No 3 (2018) |
Entropy of Network Analysis and Cluster Detection Using Markov Theory |
Abstract
|
N Siranjeevi, P. Priya, S. Thangavelu |
|
Vol 8, No 2 (2020) |
Ethical Hacking: A Necessity |
Abstract
|
Sagar Sharma, Ashish Rana, Rohit Prajapati |
|
Vol 8, No 3 (2020) |
Feature Selection and Weighted Based Optimized Weight based Multi-Tier Stacked Ensemble (WMTSE) Classification for Twitter Sentiment Analysis |
Abstract
|
P. Padmapriya, A. Finny Belwin, A. Linda Sherin, Antony Selvadoss Thanamani |
|
Vol 10, No 2 (2022) |
Fingerprint Liveliness Detection in Biometric Authentication: A Survey |
Abstract
|
Waseem U. Zaman |
|
26 - 50 of 97 Items |
<< < 1 2 3 4 > >> |