Paper Id | Title | Action |
---|---|---|
1805101 | A comparitive Study on Social Media Netwoks, to give a better medium to connect with the mass | View |
1805102 | OVERVIEW OF ARTIFICIAL INTELLIGENCE | View |
1805103 | CLOUD COMPUTING: SECURITY ISSUES | View |
1805104 | Built-in Face Recognition for Smart Phone Devices | View |
1805105 | A model-driven development of web applications using AngularJS framework | View |
1805106 | Future Expectation of Ethical Hacking | View |
1805107 | A Research Review on Buyer & Seller Negotiation in B2C E-Commerce | View |
1805108 | Face Features Recognition Using Soft Computing Method | View |
1805109 | AGENT BASED SOFTWARE CODE COMPREHENDING | View |
1805110 | Interface between Global Optimization Problems and Computer Science | View |
1805111 | Recital Prophecy Using Crowd-Sourced Mobile Network Measurements in Moradabad | View |
1805112 | Survey on route optimization selection in Wireless Sensor Network (WSN) | View |
1805113 | Review of behaviour of several methods for balancing machine learning data | View |
1805114 | Internet of Things (IoT) | View |
1805115 | A Review Paper On Home Automation System | View |
1805116 | VIRTUAL SMART PHONE | View |
1805117 | Quantum Computers | View |
1805118 | Intelligent Sensor Based Camera | View |
1805119 | A Systematic Analysis of Internet of Things (IOT) | View |
1805120 | Cloud Storage | View |
1805121 | Effective E-governance: A Human Resource Management Perspective | View |
1805122 | Spectral Analytical Approach to Voice Recognition Using Wavelet Transforms | View |
1805123 | Communication Architecture | View |
1805124 | BLUE BRAIN | View |
1805125 | Security Issues in Wireless Sensor Networks | View |
1805126 | A Review on Distributed File System for Cloud Computing | View |
1805127 | Block Chain Technology | View |
1805128 | AN OVERVIEW OF BLUE HAT HACKERS FEATURES | View |
1805129 | Existentialism versus Psychotherapy in the Plays of Samuel Beckett | View |
1805130 | Ethical Hacking Techniques with Penetration Testing | View |
1805131 | Distributed Denial of Service Attack | View |
1805132 | Adoptability of Cashless Transactions: Opportunities& Challenges in Perspective of Rural India | View |
1805133 | A REVIEW OF HARD CLASSIFICATION AND SOFT CLASSIFICATION APPROACHES IN REMOTE SENSING DATA | View |
1805134 | Big Data Implementation in Smart City | View |
1805135 | Ethical Hacking | View |
1805136 | Study of Modelling Tools for Analysis of Wireless Network | View |
1805137 | LIBRARY AUTOMATION IN VARIOUS FIELDS OF SERVICES | View |
1805138 | A Review on Swarm Cleverness and Stigmergy: Robotic Operation of Scavenging Performance | View |
1805139 | Cloud Computing and Data Masking Techniques | View |
1805140 | Role and Issues of IPV4 and IPV6 | View |
1805141 | Clustering approaches used for object oriented scenario | View |
1805142 | VIRTUAL RETINAL DISPLAY | View |
1805143 | Introducing 5G a new technology for upcoming Era | View |
1805144 | Advancements in IoT – A step towards Smart Cities and Smart Homes | View |
1805145 | ARTIFICIAL INTELLIGENCE IN HEALTH CARE | View |
1805146 | DIGITAL SIGNATURE | View |
1805147 | A Note on Routing Methods to determine the shortest path in transport networks | View |
1805148 | Future Internet | View |
1805149 | A Review of Histogram Graph in Digital Image Processing | View |
1805150 | Heuristic Approach to simplify Apriori Algorithm | View |
1805151 | A Survey of Data Mining Techniques for Social Media Analysis by Using Clustering Algorithms | View |
1805152 | An Intelligent Traffic System Using IOT | View |
1805153 | A Review Paper on Integration of Cloud Computing with IOT | View |
1805154 | Ethical Hacking | View |
1805155 | A Review of Volume Estimation Techniques Of Fruit Using Image Processing | View |
1805156 | Security and Issues of Cloud Computing in Mining Algorithms | View |