| Serial No. |
Topic |
Download |
| 1 |
Zeros of a Polynomial with Restricted Coefficients |
|
| 2 |
Design and Implementation of Raspberry Pi based
Commercial Embedded Webserver
|
|
| 3 |
Hybrid Solar Rickshaw |
|
| 4 |
Congestion Management Using Facts Devices
|
|
| 5 |
Circuit Sketch Recognition |
|
| 6 |
BER Performance for SISO and SIMO Technique Over
Rayleigh Fading Channel
|
|
| 7 |
New Routing Protocol for Energy Conservation with Power
Consumption Optimization in MANET |
|
| 8 |
Survival Analysis of Faulty classes in object oriented
programming |
|
| 9 |
QoS Metrics for the Web |
|
| 10 |
Iterative Block Level Principal Component Averaging
fusion using DCT |
|
| 11 |
Effects of Cinnamon Consumption in Diabetic
Patients |
|
| 12 |
A Composite Model for Weather Prediction using Cluster of
Neural Networks
|
|
| 13 |
Medical Image Fusion Based On Sparse Fusion Method Using
DWT
|
|
| 14 |
An overview of Indoor Localization Technologies and
applications |
|
| 15 |
Deterioration Process of Concrete Structures near
Sea Shore Constructions |
|
| 16 |
An Approach for Network Security Situation
Awareness |
|
| 17 |
A Secure Attribute-Based Encryption Scheme For Cloud
Users Information Packets Access Control In Cloud
Computing
|
|
| 18 |
SUSIE: Search Using Services and Information
Extraction |
|
| 19 |
Outlier & Pattern Detection Techniques over
Categorical KDD Dataset |
|
| 20 |
Preventing Sybil Attack Using Anti-Image Spamming
Technique |
|
| 21 |
A Secure Auditing Approach in Homomorphic Encryption
in Cloud Computing |
|
| 22 |
Google Android Operated Smart Home Automation |
|
| 23 |
Data Security with Armstrong Numbers
Using Modified RSA Public Key
Cryptosystem (Using Two Key Pairs &
Lychrell Numbers) |
|
| 24 |
Authentication Technique Using Visual and
Textual Passwords against Key Loggers,
Shoulder Surfing and Dictionary Attacks |
|