Volume-3 &Issue-12 | |||
S. No. | Name of Topic | Author | Full Access |
---|---|---|---|
1 | Review of CMOS Reversible Gates Logic for Low Power and Delay FPGA Application | Razaullah Shamshi, Mr. Arvind Gupta, Mr. Abhishek Sahu | View |
2 | Cryptography Techniques For VLSI Security Application: A Review | Md Ibrahim, Mr. Arvind Gupta, Mr. Abhishek Sahu | View |
3 | Review of Fractal Microstrip Antenna for Terahertz Application | Rajat Vohra, Mrs Damanpreet Kaur | View |
4 | Blowfish Cryptography based Security Technique | Gaurav Singh, Dr. Monika Kapoor | View |
Volume-3 &Issue-11 | |||
S. No. | Name of Topic | Author | Full Access |
---|---|---|---|
1 | Review of Machine and Deep Learning Technique for Detection of Depression using EEG Signal | Vinay kumar, Prof. Manish Gupta | View |
2 | Review of Lightweight Cipher for IOT Applications | Shyamli Singh, Prof. Vijay Yadav | View |
3 | Review of Booth Multiplier for VLSI Applications | Satish Verma, Dr. Payal Suhane | View |
4 | Energy Storage System with Battery and Supercapacitor for Electric Vehicle Applications : A Review | Mani Shankar, Dr. Prabodh Khampariya | View |
5 | Review of Electric Vehicle Battery Charger Converter | Pankaj Singh, Dr. Prabodh Khampariya | View |
Volume-3 &Issue-10 | |||
S. No. | Name of Topic | Author | Full Access |
---|---|---|---|
1 | Survey of Image Steganography Techniques for IOT Security Applications | Harshit Singh, Prof. Amit Thakur | View |
2 | Review of Botnet DDos Attack Detection in Internet of Things Systems | Anmol Oraon, Prof. Amit Thakur | View |
3 | Review of Spam Detection Techniques for IoT Devices using AI Techniques | Akhilesh Kumar, Prof. Nitesh Kumar | View |
Volume-3 &Issue-9 | |||
S. No. | Name of Topic | Author | Full Access |
---|---|---|---|
1 | Machine Learning Techniques for Customer Behavior Analysis: A Survey | Ankit Saxena, Prof. Vinod Mahor | View |
2 | Review of Cryptography Techniques For VLSI Security Application | Uditi Bohre, Prof. Ausaf Ali Khan | View |
3 | Review of Impeller Design and Challenges of Centrifugal Pump | Ajay Sharma, Prof. Nitin Jaiswal, Prof. Nilesh Sharma | View |
Volume-3 &Issue-8 | |||
S. No. | Name of Topic | Author | Full Access |
---|---|---|---|
1 | Artificial Intelligence Based Techniques for Drowsiness Detection Using EEG Signal | Sandhya Gupta, Prof. Anand Singh Rajpoot, Prof. Santosh Kumar | View |
2 | Lung Diseases Classification Techniques: A Review | Rajni Katariya, Prof. Harshita Kamboj | View |
3 | Efficient User Clustering in Multi user Non-Orthogonal Multiple Access System: A Review | Vikash Kumar, Prof. Anand Singh Rajpoot, Prof. Santosh Kumar | View |
Volume-3 &Issue-7 | |||
S. No. | Name of Topic | Author | Full Access |
---|---|---|---|
1 | Review of Different VLSI Techniques for Cyclic Redundancy Check | Devlal Ahirwar, Prof. Tejaswini Chetty | View |
2 | Review of PAPR Reduction in OFDM System | Shivangi Chandel, Prof. Sandeep Dubey | View |
3 | Design and Analysis of Graphene based Circular Polarized Patch Antenna for Terahertz Communication | Arpita Shrivastava, Prof. Sandeep Dubey | View |
4 | Review of Concrete Material using Bacteria in Fusion Systems | Sumit Kumar Mishra, Afzal Khan | View |
5 | Survey of Machine and Deep Learning Techniques for Covid-19 Patient Count | Himanshu Gupta, Mr. Sharad Nigam | View |
Volume-3 &Issue-6 | |||
S. No. | Name of Topic | Author | Full Access |
---|---|---|---|
1 | Android Malware Prediction using Artificial Intelligence Techniques : A Review | Amzad Ali, Prof. Amit Sahu | View |
2 | Low-Cost VLSI Architecture of the Filter for Image Denoising : A Review | Anshuman Daley, Prof. Shivraj Singh, Prof. Divya Jain | View |
Volume-3 &Issue-5 | |||
S. No. | Name of Topic | Author | Full Access |
---|---|---|---|
1 | Review of Power Allocation in Multi user Non-Orthogonal Multiple Access System | Gourav Samele, Prof. Shweta Garde, Dr. Anshuj Jain | View |
2 | Wireless Sensor Network for New era Application | Gulashma Sultana, Prof. Sandeep Dubey | View |
3 | Review of Machine Learning for Detecting of SPAM in the IOT Network | Neeraj Kumar Thapak, Prof. Vinod Mahor | View |
4 | Network Intrusion Detection in Cyber Security: A Review | Keerti Deshmukh, Prof. Amit Thakur | View |
5 | Review of Machine Learning Techniques for Detection of Drowsiness using EEG Signal | Asim Ali Khan, Dr. Uday Panwar | View |
6 | Implementation of 32 bit Approximate Square Root for DSP-FPGA Applications | Yogesh Thakre, Prof. Santosh Onkar | View |
Volume-3 &Issue-4 | |||
S. No. | Name of Topic | Author | Full Access |
---|---|---|---|
1 | REVIEW OF MICROSTRIP PATCH ANTENNA ARRAY FOR 5THGENERATION WIRELESS NETWORK APPLICATION | Kunal Kumar, Prof. Rajdeep Shrivastava, Dr. Abhinav Bhargava | View |
2 | REVIEW OF CRYPTOGRAPHY TECHNIQUES FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS | Karande Milind Hanumant, Dr. Anuj Garg | View |
3 | REVIEW OF FRACTAL MICROSTRIP ANTENNA FOR TERAHERTZ APPLICATION | AMRITA DWIVEDI, DR. ABHINAV BHARGAVA, PROF. RAJDEEP SHRIVASTAVA | View |
4 | REVIEW OF RESOURCE ALLOCATION IN VEHICULAR AD HOC NETWORKS | AYUSHI TAWAR, PROF. RAHUL SHARMA | View |
5 | REVIEW OF LONG-RANGE (LORA) COMMUNICATION FOR 5G-IOT APPLICATIONS | SAMAIRA BARONIA, DR. ANUJ GARG | View |
Volume-3 &Issue-3 | |||
S. No. | Name of Topic | Author | Full Access |
---|---|---|---|
1 | SURVEY OF ERROR CORRECTING AND DETECTING CODES FOR FPGA DIGITAL SIGNAL PROCESSING APPLICATIONS | PRAGATI EKHARE, PROF. TEJASWINI CHETTY | View |
2 | REVIEW OF ANDROID MALWARE PREDICTION WITH PERFORMANCE IMPROVEMENT | IMRAN MOHAMMAD KHAN, PROF. RAJKUMAR SHARMA | View |
3 | IMPLEMENTATION OF MODIFIED ADVANCED ENCRYPTION DECRYPTION SYSTEM FOR IOT APPLICATIONS | SONAM PATEL, PROF. SANTOSH ONKER | View |
Volume-3 &Issue-2 | |||
S. No. | Name of Topic | Author | Full Access |
---|---|---|---|
1 | LOAD BALANCING TECHNIQUES OF CLOUD COMPUTING: A REVIEW | SHWETA DWIVEDI, DR. SAKET AGARWAL | View |
2 | REVIEW OF CYBER SECURITY INTRUSION DETECTION | ANJANA DIXIT, DR. ANSHUJ JAIN | View |
3 | REVIEW OF IMAGE BASED PLANT LEAF DISEASE IDENTIFICATION MACHINE LEARNING TECHNIQUES | ANJU RANI, DR. AVINASH SHARMA | View |
4 | REVIEW OF SPECTRUM ALLOCATION OF SECONDARY USERS OVER COGNITIVE RADIO | SAVITRI KUMARI, PROF. SHWETA GARDE, DR. ANSHUJ JAIN | View |
5 | SURVEY OF POSIT MULTIPLIER FOR HIGH SPEED VLSI-FPGA APPLICATION | SAVITA CHAUDHARI, PROF. SHWETA GARDE, DR. ANSHUJ JAIN | View |
6 | AN EFFICIENT CLUSTERING AND ROUTING ALGORITHM FOR NODE PERFORMANCE IMPROVEMENT IN WIRELESS SENSOR NE | HANI JOSHI, VIVEK KUMAR | View |
7 | REVIEW OF BOTNET ATTACK DETECTION IN INTERNET OF THINGS CYBER SECURITY APPLICATION | PARBHAT GUPTA, RAHUL SAINI, ARTI SINGH | View |
8 | Review of Image based Plant Leaf Disease Identification Machine Learning Techniques | Geetanjali Sharma, Dr. Avinash Sharma | View |
Volume-3 &Issue-1 | |||
S. No. | Name of Topic | Author | Full Access |
---|---|---|---|
1 | REVIEW OF ENERGY MANAGEMENT AND CONTROL STRATEGY BASED ON PHOTOVOLTAIC | ATIQUE AHMAD PROF. PRABODH KHAMPARIYA | View |
2 | AI TECHNIQUES FOR COVID-19 DIAGNOSIS: A REVIEW | SANA KHAN, PROF. ZUBER FAROOQUI | View |
3 | REVIEW OF IOT CYBER SECURITY IN NETWORK INTRUSION DETECTION | AMARESH KUMAR, DR. ASHISH KUMAR KHARE | View |
4 | SURVEY OF HATE SPEECH PREDICTION IN ONLINE SOCIAL MEDIA USING DOMAIN SPECIFIC WORD EMBEDDING | SUFIA SULTAN, DR. AVINASH SHARMA | View |
5 | SURVEY ON DATA SECURITY TECHNIQUE BASED ON VISUAL CRYPTOGRAPHY | SHRUTI KHARE, DR. ANSHUJ JAIN | View |
6 | AN EFFICIENT VLSI FILTER IMPLEMENTATION FOR IMAGE DENOISING WITH PERFORMANCE ENHANCEMENT | MAYANK MANI, PROF. SHRADDHA SHRIVASTAVA | View |
7 | A REVIEW OF FILE SECURITY SYSTEM USING IMAGE STEGANOGRAPHY TECHNIQUES | NEELIMA AWASTHI, DR. ANSHUJ JAIN | View |