| Article Title |
View |
Download |
| Recognition of Isolated Handwritten Arabic and Urdu Numerals along with their Variants |
View |
Download |
| Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Applications |
View |
Download |
| Review on Document Recommender Systems Using Hierarchical Clustering Techniques |
View |
Download |
| Hybrid Energy System fed ANFIS based SEPIC Converter for DC/AC Loads |
View |
Download |
| Data Dimensional Reduction by Order Prediction in Heterogeneous Environment |
View |
Download |
| Variable Frequency Digital PWM Control for Low-Power Buck Converters |
View |
Download |
| Robust Algorithm for Discrete Tomography with Gray Value Estimation |
View |
Download |
| A Survey on Routing Protocols in Wireless Sensor Networks |
View |
Download |
| Power Analysis of Embedded Low Latency Network on Chip |
View |
Download |
| Analyzing the Signal Flow and RF Planning in GSM Network |
View |
Download |
| An Image Segmentation and Classification for Brain Tumor Detection using Pillar K-Means Algorithm |
View |
Download |
| An adjustable Comparator for 2"bit/step SAR ADC Configuring with multiple samples per second in 40nm CMOS |
View |
Download |
| Applying Microservices in Webservices, with An Implementation Idea |
View |
Download |
| MIMO Wireless based Cryptosystem using ELECTRONIC Key Generation Unit |
View |
Download |
| An Artificially Intelligent Device for the Intellectually Disabled |
View |
Download |
| Method to Provide Mobile Signal when the Network Provider Has Failed |
View |
Download |
| Algorithm for Security in Autonomous Cars |
View |
Download |
| An Application for Performing Real Time Speech Translation in Mobile Environment |
View |
Download |
| A Robust Embedded Based String Recognition for Visually Impaired People |
View |
Download |
| Enhancing Security in Dynamic Public Cloud Data Using Encryption |
View |
Download |
| A Multi-Function Conversion Technique for Electric Vehicle Charging Station |
View |
Download |
| Palmprint Recognition using Multimodal Biometrics and Generation of One Time Password |
View |
Download |
| Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network |
View |
Download |