Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 41-48 of 48 total results
 Vol. 5, Issue 3, March 2016 Software Independent Speech ...
Software Independent Speech recognition System Pranali Yawle1, Devika Pawar 2, Pooja Pawar , Puja Dhumal2 ... Interface in Embedded System”, (IJECSCSE) ...
 FLOOD INTIMATION IN RAILWAYS USING ZIGBEE AND GSM - Ijesat
FLOOD INTIMATION IN RAILWAYS USING ZIGBEE AND GSM Purna chandrarao.A1, ... (IJECSCSE), Vol.1,Issue 1, [4] M. A. Mazidi, “The 8051 Microcontroller & Embedded
A Multivariant Stream Analysis Approach to Detect and ...
Vehicular Ad Hoc Networks (VANETs) are rapidly gaining attention due to the diversity of services that they can potentially offer. However, VANET communication is vulnerable to numerous security threats such as Distributed Denial of Service (DDoS) attacks.
Tea Leaf Diseases Recognition using Neural Network ...
International Journal of Computer Applications (0975 – 8887) Volume 114 – No. 17, March 2015 Tea Leaf Diseases Recognition using Neural Network Ensemble Bikash Chandra Karmokar1, Mohammad Samawat Ullah2, Md. Kibria Siddiquee3 and Kazi Md. Rokibul Alam4 Department of Computer Science and ...
Kunda Nagarikar - Assistant System Engineer - Tata ...
View Kunda Nagarikar’s profile on LinkedIn, the world's largest professional community. Kunda has 1 job job listed on their profile. See the complete profile on LinkedIn and discover Kunda’s connections and jobs at similar companies.
CiteSeerX — Processors
CiteSeerX - Document Details (Isaac Councill, Lee Giles, Pradeep Teregowda): Abstract--To classify a packet as belonging to a flow often requires network systems—such as routers and firewalls—to maintain large data structures and perform several memory accesses.
 The Real-Time Hardware of Smart Digital Alarm Clock ...
Engineering (IJECSCSE). 4. Clayder Gonzalez-Cadenillas, Nils Murrugarra-Llerena, “Isolated Words Recognition Using a
IOSR
Abstract: In this project, we are trying to promote security to the data using developed encryption techniques.The image is encrypted using Magic Rectangle (MR) encryption technique, and text using the RSA algorithm with LSB as data concealment technique.
1 2 3 4 5
Pages
|