Volume-3 &Issue-10
S. No. Name of Topic Author Full Access
1 Survey of Image Steganography Techniques for IOT Security Applications Harshit Singh, Prof. Amit Thakur View
2 Review of Botnet DDos Attack Detection in Internet of Things Systems Anmol Oraon, Prof. Amit Thakur View
Volume-3 &Issue-9
S. No. Name of Topic Author Full Access
1 Machine Learning Techniques for Customer Behavior Analysis: A Survey Ankit Saxena, Prof. Vinod Mahor View
2 Review of Cryptography Techniques For VLSI Security Application Uditi Bohre, Prof. Ausaf Ali Khan View
3 Review of Impeller Design and Challenges of Centrifugal Pump Ajay Sharma, Prof. Nitin Jaiswal, Prof. Nilesh Sharma View
Volume-3 &Issue-8
S. No. Name of Topic Author Full Access
1 Artificial Intelligence Based Techniques for Drowsiness Detection Using EEG Signal Sandhya Gupta, Prof. Anand Singh Rajpoot, Prof. Santosh Kumar View
2 Lung Diseases Classification Techniques: A Review Rajni Katariya, Prof. Harshita Kamboj View
3 Efficient User Clustering in Multi user Non-Orthogonal Multiple Access System: A Review Vikash Kumar, Prof. Anand Singh Rajpoot, Prof. Santosh Kumar View
Volume-3 &Issue-7
S. No. Name of Topic Author Full Access
1 Review of Different VLSI Techniques for Cyclic Redundancy Check Devlal Ahirwar, Prof. Tejaswini Chetty View
2 Review of PAPR Reduction in OFDM System Shivangi Chandel, Prof. Sandeep Dubey View
3 Design and Analysis of Graphene based Circular Polarized Patch Antenna for Terahertz Communication Arpita Shrivastava, Prof. Sandeep Dubey View
4 Review of Concrete Material using Bacteria in Fusion Systems Sumit Kumar Mishra, Afzal Khan View
5 Survey of Machine and Deep Learning Techniques for Covid-19 Patient Count Himanshu Gupta, Mr. Sharad Nigam View
Volume-3 &Issue-6
S. No. Name of Topic Author Full Access
1 Android Malware Prediction using Artificial Intelligence Techniques : A Review Amzad Ali, Prof. Amit Sahu View
2 Low-Cost VLSI Architecture of the Filter for Image Denoising : A Review Anshuman Daley, Prof. Shivraj Singh, Prof. Divya Jain View
Volume-3 &Issue-5
S. No. Name of Topic Author Full Access
1 Review of Power Allocation in Multi user Non-Orthogonal Multiple Access System Gourav Samele, Prof. Shweta Garde, Dr. Anshuj Jain View
2 Wireless Sensor Network for New era Application Gulashma Sultana, Prof. Sandeep Dubey View
3 Review of Machine Learning for Detecting of SPAM in the IOT Network Neeraj Kumar Thapak, Prof. Vinod Mahor View
4 Network Intrusion Detection in Cyber Security: A Review Keerti Deshmukh, Prof. Amit Thakur View
5 Review of Machine Learning Techniques for Detection of Drowsiness using EEG Signal Asim Ali Khan, Dr. Uday Panwar View
6 Implementation of 32 bit Approximate Square Root for DSP-FPGA Applications Yogesh Thakre, Prof. Santosh Onkar View
Volume-3 &Issue-4
S. No. Name of Topic Author Full Access
1 REVIEW OF MICROSTRIP PATCH ANTENNA ARRAY FOR 5THGENERATION WIRELESS NETWORK APPLICATION Kunal Kumar, Prof. Rajdeep Shrivastava, Dr. Abhinav Bhargava View
2 REVIEW OF CRYPTOGRAPHY TECHNIQUES FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS Karande Milind Hanumant, Dr. Anuj Garg View
3 REVIEW OF FRACTAL MICROSTRIP ANTENNA FOR TERAHERTZ APPLICATION AMRITA DWIVEDI, DR. ABHINAV BHARGAVA, PROF. RAJDEEP SHRIVASTAVA View
4 REVIEW OF RESOURCE ALLOCATION IN VEHICULAR AD HOC NETWORKS AYUSHI TAWAR, PROF. RAHUL SHARMA View
5 REVIEW OF LONG-RANGE (LORA) COMMUNICATION FOR 5G-IOT APPLICATIONS SAMAIRA BARONIA, DR. ANUJ GARG View
Volume-3 &Issue-3
S. No. Name of Topic Author Full Access
1 SURVEY OF ERROR CORRECTING AND DETECTING CODES FOR FPGA DIGITAL SIGNAL PROCESSING APPLICATIONS PRAGATI EKHARE, PROF. TEJASWINI CHETTY View
2 REVIEW OF ANDROID MALWARE PREDICTION WITH PERFORMANCE IMPROVEMENT IMRAN MOHAMMAD KHAN, PROF. RAJKUMAR SHARMA View
3 IMPLEMENTATION OF MODIFIED ADVANCED ENCRYPTION DECRYPTION SYSTEM FOR IOT APPLICATIONS SONAM PATEL, PROF. SANTOSH ONKER View
Volume-3 &Issue-2
S. No. Name of Topic Author Full Access
1 LOAD BALANCING TECHNIQUES OF CLOUD COMPUTING: A REVIEW SHWETA DWIVEDI, DR. SAKET AGARWAL View
2 REVIEW OF CYBER SECURITY INTRUSION DETECTION ANJANA DIXIT, DR. ANSHUJ JAIN View
3 REVIEW OF IMAGE BASED PLANT LEAF DISEASE IDENTIFICATION MACHINE LEARNING TECHNIQUES ANJU RANI, DR. AVINASH SHARMA View
4 REVIEW OF SPECTRUM ALLOCATION OF SECONDARY USERS OVER COGNITIVE RADIO SAVITRI KUMARI, PROF. SHWETA GARDE, DR. ANSHUJ JAIN View
5 SURVEY OF POSIT MULTIPLIER FOR HIGH SPEED VLSI-FPGA APPLICATION SAVITA CHAUDHARI, PROF. SHWETA GARDE, DR. ANSHUJ JAIN View
6 AN EFFICIENT CLUSTERING AND ROUTING ALGORITHM FOR NODE PERFORMANCE IMPROVEMENT IN WIRELESS SENSOR NE HANI JOSHI, VIVEK KUMAR View
7 REVIEW OF BOTNET ATTACK DETECTION IN INTERNET OF THINGS CYBER SECURITY APPLICATION PARBHAT GUPTA, RAHUL SAINI, ARTI SINGH View
8 Review of Image based Plant Leaf Disease Identification Machine Learning Techniques Geetanjali Sharma, Dr. Avinash Sharma View
Volume-3 &Issue-1
S. No. Name of Topic Author Full Access
1 REVIEW OF ENERGY MANAGEMENT AND CONTROL STRATEGY BASED ON PHOTOVOLTAIC ATIQUE AHMAD PROF. PRABODH KHAMPARIYA View
2 AI TECHNIQUES FOR COVID-19 DIAGNOSIS: A REVIEW SANA KHAN, PROF. ZUBER FAROOQUI View
3 REVIEW OF IOT CYBER SECURITY IN NETWORK INTRUSION DETECTION AMARESH KUMAR, DR. ASHISH KUMAR KHARE View
4 SURVEY OF HATE SPEECH PREDICTION IN ONLINE SOCIAL MEDIA USING DOMAIN SPECIFIC WORD EMBEDDING SUFIA SULTAN, DR. AVINASH SHARMA View
5 SURVEY ON DATA SECURITY TECHNIQUE BASED ON VISUAL CRYPTOGRAPHY SHRUTI KHARE, DR. ANSHUJ JAIN View
6 AN EFFICIENT VLSI FILTER IMPLEMENTATION FOR IMAGE DENOISING WITH PERFORMANCE ENHANCEMENT MAYANK MANI, PROF. SHRADDHA SHRIVASTAVA View
7 A REVIEW OF FILE SECURITY SYSTEM USING IMAGE STEGANOGRAPHY TECHNIQUES NEELIMA AWASTHI, DR. ANSHUJ JAIN View