|
× |
|
Image Character Recognition |
599 |
|
599 |
|
× |
|
Spread of Terrorism |
599 |
|
599 |
|
× |
|
Android Campus Portal With Graphical Reporting |
599 |
|
599 |
|
× |
|
Evaluation of Academic Performance of a Student with Fuzzy Logic |
599 |
|
599 |
|
× |
|
Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras |
599 |
|
599 |
|
× |
|
Farmer Welfare management System |
599 |
|
599 |
|
× |
|
Preventing Phishing Attack On Voting System Using Visual Cryptography |
599 |
|
599 |
|
× |
|
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification |
599 |
|
599 |
|
× |
|
Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data |
599 |
|
599 |
|
|