Article Title |
View |
Download |
Recognition of Isolated Handwritten Arabic and Urdu Numerals along with their Variants |
View |
Download |
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Applications |
View |
Download |
Review on Document Recommender Systems Using Hierarchical Clustering Techniques |
View |
Download |
Hybrid Energy System fed ANFIS based SEPIC Converter for DC/AC Loads |
View |
Download |
Data Dimensional Reduction by Order Prediction in Heterogeneous Environment |
View |
Download |
Variable Frequency Digital PWM Control for Low-Power Buck Converters |
View |
Download |
Robust Algorithm for Discrete Tomography with Gray Value Estimation |
View |
Download |
A Survey on Routing Protocols in Wireless Sensor Networks |
View |
Download |
Power Analysis of Embedded Low Latency Network on Chip |
View |
Download |
Analyzing the Signal Flow and RF Planning in GSM Network |
View |
Download |
An Image Segmentation and Classification for Brain Tumor Detection using Pillar K-Means Algorithm |
View |
Download |
An adjustable Comparator for 2"bit/step SAR ADC Configuring with multiple samples per second in 40nm CMOS |
View |
Download |
Applying Microservices in Webservices, with An Implementation Idea |
View |
Download |
MIMO Wireless based Cryptosystem using ELECTRONIC Key Generation Unit |
View |
Download |
An Artificially Intelligent Device for the Intellectually Disabled |
View |
Download |
Method to Provide Mobile Signal when the Network Provider Has Failed |
View |
Download |
Algorithm for Security in Autonomous Cars |
View |
Download |
An Application for Performing Real Time Speech Translation in Mobile Environment |
View |
Download |
A Robust Embedded Based String Recognition for Visually Impaired People |
View |
Download |
Enhancing Security in Dynamic Public Cloud Data Using Encryption |
View |
Download |
A Multi-Function Conversion Technique for Electric Vehicle Charging Station |
View |
Download |
Palmprint Recognition using Multimodal Biometrics and Generation of One Time Password |
View |
Download |
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network |
View |
Download |