Linked e-resources

Details

Review and Comparison of Face Detection Techniques
Keyword Spotting with Neural Networks used for Image-Classification
Strategic Way to Count the Number of People in a Room Using Multiple Kinect Cameras
Biomedical Image Security using Matrix Manipulation and DNA Encryption
A study on the issue of blockchain's energy consumption
Study on network scanning using machine learning based methods
Is Blockchain the Future of Supply Chain Management?
APDRChain: ANN Based Predictive Analysis of Diseases and Report Sharing Through Blockchain
Study on S-box Properties of Convolution Coder
Smart Healthcare Assistance towards on-road Medical Emergency
A Study on Various Database Models: Relational, Graph and Hybrid Databases
Microcontroller Based Automotive Control System Employing Real Time Health Monitoring of Drivers to Avoid Road Accidents
Surface Potential Profile of Nano scaled Work function Engineered Gate Recessed IR Silicon on Insulator MOSFET
A mobile user authentication technique in Global mobility network
Efficient Entity Authentication using modified Guillou-Quisquater Zero Knowledge Protocol
Ethical Hacking: Redefining Security in Information System
Internal Organizational Security
Securing Air Gapped Systems
Data Security Techniques based on DNA Encryption.

Browse Subjects

Show more subjects...

Statistics

from
to
Export