|
SPEECH TO SIGN LANGUAGE ANNOUNCEMENTS FOR DEAF AND DUMB IN TRANSPORT SERVICES - J.Shiyam Sunder, M.Krishnapriya, V.Ramya Sri |
|
COMPARATIVE SURVEY ON FACE BIOMETRIC SYSTEM AND DNA PATTERN FOR SECURE AUTHENTICATION - B.Poorani,S.Sakthivel |
|
A SURVEY ON RECENT IMPROVED LOAD BALANCING ALGORITHMS IN CLOUD ENVIRONMENT - G. Kanmani, E Jayabalan |
|
Mobile Marketing Stratergies For Promoting Business – A WIN WIN Approach - Prof.S.S.Aravinth, S.Kavitha, S.Tharani |
|
Measuring The Levels Of Liquid Using Artificial Intelligence - A.Syed Mukthar, M.Komalnathan |
|
HUMAN INTERACTION PATTERN IDENTIFICATION USING ENHANCED ARTIFICIAL BEE COLONY OPTIMIZATION ALGORITHM - S.QUEENKIRUBAANANTHY, D.CHITRA |
|
VEHICLE SPEED SENSING AND SMOKE DETECTING SYSTEM - PRASHANNA RANGAN.R |
|
Insider Collusion Distinguish Using Intrusion Detection Techniques - MALATHI, Ms. M. MALATHI |
|
A Multi-keywordRanked Search Scheme over Encrypted based on Hierarchical Clustering Index - Indhuja.A, T.P.Udhayashankar |
|
Increase The Network Lifetime in WSN Using Clustering Algorithm - S. Monisha, R. Parameswari |
|
Application of Lagrange’s Equation to Undamped vibration absorbers attached to multi-degree freedom system - Vaibhav B. Bhonde, Dr. S. D. Kshirsagar |
|
IT : Impose Technology – Li- Wi - S.Gokulragavi |
|
SMART HELMET USED FOR THE AVOIDANCE OF ACCIDENT - Saravanan S, Swathiakshaya M |
|
Private Eyes: Secure on Remote Biometric Authentication - J.Rubha |
|
Wireless Charging Using Microwaves - Benazir begum, Sivaranjani |