1 |
Dual-layer Video Encryption & Decryption using RSA Algorithm
SWALEHA N. SAYYAD, PRAMILA S. SUTAR, RANI S. PISE,
|
|
|
2 |
A Study on Software Development Methodologies
SIVARANJANI J
|
|
|
3 |
Alcohol, Smoke and Speed Monitoring and Vehicle Controlling using Microprocessor
RABIYA GUPTA, KARAN SINGH, ARCHANA JAMDADE
|
|
|
4 |
Review on Security on Data Using Encryption and Steganography
BONDARE DIPAK, SAYYED TABISH
|
|
|
5 |
Data Management of an Educational Institute
KUNAL DULANI, MOHIT CHANCHLANI, MEETA CHANCHLANI
|
|
|
6 |
Health Vigil System Using Arduino Uno via Bluetooth
SRAVANI.GRANDHI, SANTOSH KUMAR.NIMMAKA
|
|
|
7 |
IOT Based Hydroponic System
CHAVAN AKSHAY A, PAWAR ABHIJEET S
|
|
|
8 |
Detecting Malicious Uniform Resource Locators using Logistic Regression- An Implementation
SASHAANK PEJATHAYA MURALI
|
|
|
9 |
Development of a Robotic Buggy & Implementation of a Control Strategy for Gestures Recognition throu
SUNIL GURNALE, HARSH PANICKER
|
|
|
10 |
Book Recommendation System Using Apache Spark
ISHWARI KULKARNI, PRITESH GANDHI
|
|
|
11 |
A Survey on Software Risk Management Methods
SHUBHENDU SHEKHAR, RAGHAV SRIVASTAVA
|
|
|