S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
Maintain the Web services in IPv6-IPv4 by Dual Stack MechanismLUZ-JASPE MPEMBA NGOMA |
|
6 |
2 |
Person Re-Identification based on Facial Features in Real Time Video Streaming EnvironmentsRAMYABHARATHI.B, SUDHA.R |
|
9 |
3 |
Abnormalities of Fetal Brain Classification Using Deep Learning TechniquesSANGEETHA.K, VENIPRIYA.T |
|
3 |
4 |
Sarcasm and Irony Word Analysis in Social Network Using Deep Learning AlgorithmDR.KALAIMANI SHANMUGAM, HARITHA.G |
|
4 |
5 |
Activating Intelligent Commenting using Extricate of TweetsPRACHI KULKARNI, D.K.CHITRE |
|
1 |
6 |
A Survey of Machine Learning Technique based Load Balancing in Cloud ComputingABHISHEK KUMAR, PROF. ABHISHEK PANDEY |
|
2 |
7 |
Authentication and Access Control in the Internet of ThingsCHARU VASHISHT SINGH, DR. ASHOK VERMA |
|
5 |
8 |
Review on “Computer-Aided Image Processing Techniques for Lung Tumor Detection Using CT scan Images.”PROF. JAHNAVI NAGARAJ TIMALAPUR |
|
2 |
9 |
The Role of Technology in Mitigation of Examination Malpractices in West AfricaEDEH MICHAEL ONYEMA, ANI UKAMAKA EUCHERIA, NNAJI ANAYO DAVID, ABDULLAHI ISA ALHUSEEN OMAR ALSAYED, QUADRI NOORULHASAN NAVEED |
|
3 |
10 |
An Over View of Li -Fi Technology is the Future of Secure Internet
SOUMYARANJAN DAS |
|
162 |
11 |
Energy Optimized Secured Routing Protocol for Attack Mitigation in Wireless Sensor Network
K.G. Maheswari, C. Siva |
|
11 |