|
Design of Intelligent Mobile Human Recognition and Location Identification System Based on Arm7 and Open CV Donthigari Vinay Kumar, Mr. Sanjay Dubey, Akbar Mohammad
|
View | Download | 1-7
|
|
|
Automatic License Plate Recognition: (ALPR) Sayali Hajare, Kanchan Mali, Neha Jadhav, Priyanka Harmale
|
View | Download | 8-10
|
|
|
Public Cloud Storage Using Privacy-Preserving Punati Aswini, B. Lakshmi Kanth
|
View | Download | 11-17
|
|
|
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Koduri Kavya, M .V. Dilip Kumar
|
View | Download | 18-23
|
|
|
A Study of Effect of Geometric Ratio and Fiber Orientation on Modal Characteristics of Composite Beam S. P. Parida, R. R. Dash
|
View | Download | 24-39
|
|
|
Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation Prashant Lahane, Yashashri Kumbhar, Suraj Patil, Swati More, Meenali Barse
|
View | Download | 40-44
|
|
|
Cloud Computing Security: A Shift from Cloud to Inter-Clouds Shradha Modi, Bhuvnesh Nigam, Shivangi Mukhopadhyay, Prof. Anand Bone
|
View | Download | 45-49
|
|
|
Global Positioning System as a Safety Monitor for Alzheimer's Patients Prof. Mrs. S. S. Patil, Prof. D. P. Patil, Prof. V. M. Davande
|
View | Download | 50-61
|
|
|
Awful Data Injection Attack and Defense in Electricity Business Sector Using Game Theory G.Anusha, R.Ramesh
|
View | Download | 62-68
|
|
|
The Java Virtual Shell and Kernel Shital Bhor, Poonam Chaudhri, Priyanka Darekar, Pooja Gharage, Prof. Helly Patel, Mr.Dhiraj Motghare
|
View | Download | 69-71
|
|
|
Bandwidth Monitoring and Reduction with Firewall Operation Purnata Shingade, Aparna Koul, Shubham Shahane, Bipin Patil
|
View | Download | 72-75
|
|
|
FPGA Implementation of ALU Based Address Generation for Memory Mr. Nookala SaiRam, Mrs. Athira G. Krishna
|
View | Download | 76-83
|
|
|
SIC Vector Generation Using Test per Clock and Test per Scan B. Srinivasulu Reddy
|
View | Download | 84-89
|
|
|
A Novel Approach to Solve Dead Lock Problem in AXI On-Chip Bus Srikanth Manukonda, Santosh J
|
View | Download | 90-100
|
|
|
A Review on Torque Convertor of IVT in Automobile Arun M. Meshram, P. T. Nitnaware, S. N. Khetre
|
View | Download | 101-108
|
|
|
Design of Low Cost Multi-Use, User-Friendly and Durable Hearing Aid Sudip Paul, N. Rout, P. G. Waghmare, R. Patnaik
|
View | Download | 109-115
|
|
|
A Review Paper on Composite Brake Friction Lining for lining Applications on Band Brake Priyanka S. Bankar, S. N. Khan
|
View | Download | 116-122
|
|
|
A Survey on Image Restoration Techniques Senthilsevi A, Sukumar R
|
View | Download | 123-128
|
|
|
Policy, Planning and Implementation of Wind Energy Technology, Wind Farms: Case Study Pradeep N.R, S Kumarappa
|
View | Download | 129-134
|
|
|
A Review Paper on Mouse Pointer Movement Using Eye Tracking System and Voice Recognition Prajakta Tangade, Shital Musale, Gauri Pasalkar, Miss. Umale M.D., Miss. Awate S.S.
|
View | Download | 135-138
|
|
|
Find the Androgen Deprivation Therapy and Congestive Heart Failure Results Using Stochastic Model R. Vijayakumar, Dr. A. Muthaiyan, G. Vijayaprabha
|
View | Download | 139-149
|
|
|
Probabilistic Intelligent Routing Scheme for Optical Networks S. Suryanarayana, Dr.K.Ravindra, Dr. K. Chennakesava Reddy
|
View | Download | 150-154
|
|
|
Machine Learning Techniques for Diabetes Identification K. Srinivasa Reddy,N.Rajasekhar
|
View | Download | 155-163
|
|