PAPER ID | TITLE | ACTION |
---|---|---|
1904107 | A Webopedia for Students That Assist Them for Schooling | View |
1904111 | An Optimum Method for Waiting Time Distribution: M/D/C | View |
1904112 | BLUE BRAIN | View |
1904113 | Brain Fingerprint Technology | View |
1904114 | A Green Computing | View |
1904115 | Human Microchip Implantation | View |
1904116 | Artificial Intelligence vs. Human Mind: Survey & Predictions | View |
1904117 | Machine Learning | View |
1904118 | Blockchain Technology | View |
1904119 | Security Issues in Internet of Things - A Review | View |
1904120 | Role of Animated and Interactive Contents in KIDS Teaching | View |
1904121 | BARCODE TECHNOLOGY | View |
1904122 | Basics of Cryptography | View |
1904123 | Review on Smart Card Technology | View |
1904124 | A Study on Augmented Reality, its Applications and Challenges | View |
1904126 | Comparative Analysis of Cyber Crimes | View |
1904127 | Robust Cruise Controlling & Crash Evasion System | View |
1904128 | An analysis of the technical differences between Intel Core i9 and AMD Ryzen Threadripper 3990WX | View |
1904129 | Addiction Due to Inventions of Information Technology (Focusing Websites and Gaming) | View |
1904130 | Humanoid Robots | View |
1904131 | Eliot’s Concept of Life in the Waste Land | View |
1904132 | Cyber Security | View |
1904133 | Mind Reading Computer | View |
1904134 | A Review paper on Smart Contracts in Blockchain Network based applications | View |
1904135 | BLUE JACK | View |
1904136 | Manuscripts and Eresources Utilities Application in Library | View |
1904137 | Artificial Intelligence in Home Automation | View |
1904138 | Phishing Attack | View |
1904139 | E-commerce & Network Security Attack | View |
1904140 | Gesture Recognition Technology: A Exhaustive Review of it’s Application and Futures Likelihood | View |
1904141 | IP Spoofing | View |
1904142 | LIE Detection Using Machine Learning | View |
1904143 | Data Mining: A Study on Privacy Concern and Ethics | View |
1904144 | Biometric System and its trends for today’s era for Uniquely Identifying, Authentication and authoroziation | View |
1904145 | Cyber Security | View |
1904146 | Insight into Border Gateway Protocol | View |
1904147 | Wi-Fi standard 802.11ax and their impact on Education | View |
1904148 | An Overview on Artificial Intelligence and its Applications | View |
1904149 | A Comparative Study on Computer Architecture | View |
1904150 | BIG Data in Health Care | View |
1904151 | An Overview on Effect of Cell Phone Radiation on Human Health | View |
1904152 | Radiation of Network Range on Nature | View |
1904153 | Wi-vi Technology-a Review | View |
1904154 | Wireless Networks and Mobile Computing | View |
1904155 | YARN Architecture | View |
1904156 | Ethical Hacking | View |
1904157 | A Critical Analysis of SOA Applications Using Soft-Computing Techniques | View |
1904158 | An Introduction of Android Technology | View |
1904159 | Ethical Hacking | View |
1904160 | A Comparitive study on Tools for Ethical hacking | View |
1904161 | Human Resource Information System: Proposing a Maturity Model | View |
1904163 | Cyber Security | View |
1904167 | The Time Machine | View |
1904168 | An Awareness towards “Phishing” Attack & its Counter-Measures | View |
1904169 | Robotics Using Artificial Intelligence | View |
1904170 | The Review of iTwin Technology | View |
1904171 | To Set Up IR Sensor Using Arduino | View |
1904172 | A Black-Box Methodology for Probing Business Logic Vulnerabilities in Modern Day Web Applications | View |
1904173 | How to Set Up An IR Remote and Receiver on An ARDUINO | View |
1904174 | NOC Reuse for SOC Modular Testing | View |
1904175 | Use an Arduino to make this universal remote that can control any device with an IR sensor | View |
1904176 | Satellite Image Processing Using Cloud Computing | View |
1904177 | The World is realizing the power of computing E-commerce and knowledge mining | View |
1904178 | Social Media Exploitation for Terrorism | View |
1904179 | ICT Policies for Lab Infrastrucure | View |
1904180 | Progressive Web Apps | View |
1904181 | DNA as Future Data Storage | View |
1904182 | Role of Angular JS in Android Hybrid Applications | View |
1904183 | Security Challenges in Wireless Sensor Network | View |
1904196 | Ethical Hacking with Penetration Testing | View |
1904197 | Analysis of NoSQL database based on types, characteristics and performance: A review | View |
1904198 | A review on Prior Theories that enables learning in Machine Learning | View |