Volume-3 &Issue-7
S. No. Name of Topic Author Full Access
1 Review of Different VLSI Techniques for Cyclic Redundancy Check Devlal Ahirwar, Prof. Tejaswini Chetty View
Volume-3 &Issue-6
S. No. Name of Topic Author Full Access
1 Android Malware Prediction using Artificial Intelligence Techniques : A Review Amzad Ali, Prof. Amit Sahu View
2 Low-Cost VLSI Architecture of the Filter for Image Denoising : A Review Anshuman Daley, Prof. Shivraj Singh, Prof. Divya Jain View
Volume-3 &Issue-5
S. No. Name of Topic Author Full Access
1 Review of Power Allocation in Multi user Non-Orthogonal Multiple Access System Gourav Samele, Prof. Shweta Garde, Dr. Anshuj Jain View
2 Wireless Sensor Network for New era Application Gulashma Sultana, Prof. Sandeep Dubey View
3 Review of Machine Learning for Detecting of SPAM in the IOT Network Neeraj Kumar Thapak, Prof. Vinod Mahor View
4 Network Intrusion Detection in Cyber Security: A Review Keerti Deshmukh, Prof. Amit Thakur View
5 Review of Machine Learning Techniques for Detection of Drowsiness using EEG Signal Asim Ali Khan, Dr. Uday Panwar View
6 Implementation of 32 bit Approximate Square Root for DSP-FPGA Applications Yogesh Thakre, Prof. Santosh Onkar View
Volume-3 &Issue-4
S. No. Name of Topic Author Full Access
1 REVIEW OF MICROSTRIP PATCH ANTENNA ARRAY FOR 5THGENERATION WIRELESS NETWORK APPLICATION Kunal Kumar, Prof. Rajdeep Shrivastava, Dr. Abhinav Bhargava View
2 REVIEW OF CRYPTOGRAPHY TECHNIQUES FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS Karande Milind Hanumant, Dr. Anuj Garg View
3 REVIEW OF FRACTAL MICROSTRIP ANTENNA FOR TERAHERTZ APPLICATION AMRITA DWIVEDI, DR. ABHINAV BHARGAVA, PROF. RAJDEEP SHRIVASTAVA View
4 REVIEW OF RESOURCE ALLOCATION IN VEHICULAR AD HOC NETWORKS AYUSHI TAWAR, PROF. RAHUL SHARMA View
5 REVIEW OF LONG-RANGE (LORA) COMMUNICATION FOR 5G-IOT APPLICATIONS SAMAIRA BARONIA, DR. ANUJ GARG View
Volume-3 &Issue-3
S. No. Name of Topic Author Full Access
1 SURVEY OF ERROR CORRECTING AND DETECTING CODES FOR FPGA DIGITAL SIGNAL PROCESSING APPLICATIONS PRAGATI EKHARE, PROF. TEJASWINI CHETTY View
2 REVIEW OF ANDROID MALWARE PREDICTION WITH PERFORMANCE IMPROVEMENT IMRAN MOHAMMAD KHAN, PROF. RAJKUMAR SHARMA View
3 IMPLEMENTATION OF MODIFIED ADVANCED ENCRYPTION DECRYPTION SYSTEM FOR IOT APPLICATIONS SONAM PATEL, PROF. SANTOSH ONKER View
Volume-3 &Issue-2
S. No. Name of Topic Author Full Access
1 LOAD BALANCING TECHNIQUES OF CLOUD COMPUTING: A REVIEW SHWETA DWIVEDI, DR. SAKET AGARWAL View
2 REVIEW OF CYBER SECURITY INTRUSION DETECTION ANJANA DIXIT, DR. ANSHUJ JAIN View
3 REVIEW OF IMAGE BASED PLANT LEAF DISEASE IDENTIFICATION MACHINE LEARNING TECHNIQUES ANJU RANI, DR. AVINASH SHARMA View
4 REVIEW OF SPECTRUM ALLOCATION OF SECONDARY USERS OVER COGNITIVE RADIO SAVITRI KUMARI, PROF. SHWETA GARDE, DR. ANSHUJ JAIN View
5 SURVEY OF POSIT MULTIPLIER FOR HIGH SPEED VLSI-FPGA APPLICATION SAVITA CHAUDHARI, PROF. SHWETA GARDE, DR. ANSHUJ JAIN View
6 AN EFFICIENT CLUSTERING AND ROUTING ALGORITHM FOR NODE PERFORMANCE IMPROVEMENT IN WIRELESS SENSOR NE HANI JOSHI, VIVEK KUMAR View
7 REVIEW OF BOTNET ATTACK DETECTION IN INTERNET OF THINGS CYBER SECURITY APPLICATION PARBHAT GUPTA, RAHUL SAINI, ARTI SINGH View
Volume-3 &Issue-1
S. No. Name of Topic Author Full Access
1 REVIEW OF ENERGY MANAGEMENT AND CONTROL STRATEGY BASED ON PHOTOVOLTAIC ATIQUE AHMAD PROF. PRABODH KHAMPARIYA View
2 AI TECHNIQUES FOR COVID-19 DIAGNOSIS: A REVIEW SANA KHAN, PROF. ZUBER FAROOQUI View
3 REVIEW OF IOT CYBER SECURITY IN NETWORK INTRUSION DETECTION AMARESH KUMAR, DR. ASHISH KUMAR KHARE View
4 SURVEY OF HATE SPEECH PREDICTION IN ONLINE SOCIAL MEDIA USING DOMAIN SPECIFIC WORD EMBEDDING SUFIA SULTAN, DR. AVINASH SHARMA View
5 SURVEY ON DATA SECURITY TECHNIQUE BASED ON VISUAL CRYPTOGRAPHY SHRUTI KHARE, DR. ANSHUJ JAIN View
6 AN EFFICIENT VLSI FILTER IMPLEMENTATION FOR IMAGE DENOISING WITH PERFORMANCE ENHANCEMENT MAYANK MANI, PROF. SHRADDHA SHRIVASTAVA View
7 A REVIEW OF FILE SECURITY SYSTEM USING IMAGE STEGANOGRAPHY TECHNIQUES NEELIMA AWASTHI, DR. ANSHUJ JAIN View