Dissertation, CE (INS) : [225] Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 225
PreviewIssue DateTitleAuthor(s)
19MCEI09.pdf.jpg1-Jun-2021Automatic Image Registration Using FFT Based TechniqueJindal, Swati
19MCEI08.pdf.jpg1-Jun-2021Temporal Activity Detection in Dense Video CaptioningShah, Dharmil
19MCEI07 .pdf.jpg1-Jun-2021Anomaly Detection and Recording Using Blockchain Technologies from Surveillance VideoShah, Aneri
19MCEI06.pdf.jpg1-Jun-2021Vehicle Identification Using CCTV Camera CoordinationGohil, Sagar J
19MCEI05.pdf.jpg1-Jun-2021Vulnerability Assessment and Penetration Testing to Enhance the SecurityPatel, Zankhana Kalidas
19MCEI04.pdf.jpg1-Jun-2021Blockchain-Based Secure Dynamic Spectrum Allocation In 6g-Envisioned TelecommunicationsPatel, Farnazbanu Faizalbhai
19MCEI03.pdf.jpg1-Jun-2021Memory Profiler And Simulator for DirectX11 UMD Graphics DriversLokhandwala, Asma
19MCEI02.pdf.jpg1-Jun-2021Network Performance Acceleration Using XDP(Express Data Path)Jambekar, Vishakha
19MCEI01.pdf.jpg1-Jun-2021Linux Display Driver: Color Management and Pre-silicon EnablingBhatt, Jigar
18MCEI18.pdf.jpg1-Jun-2020Facial Detection in Surveillance SystemsShaikh, Yusra
18MCEI17.pdf.jpg1-Jun-2020Business Continuity and Disaster Recovery Management SystemVyas, Priyal
18MCEI16.pdf.jpg1-Jun-2020Context-Aware Security and Authentication for Smart CitiesTrivedi, Rajvi
18MCEI15.pdf.jpg1-Jun-2020Cyber Risk Management SystemTrambadia, Shivani
18MCEI14.pdf.jpg1-Jun-2020Face Recognition for Perimeter SecurityThanki, Dhara
18MCEI13.pdf.jpg1-Jun-2020Automation and Security in Healthcare ApplicationShingala, Parth
18MCEI12.pdf.jpg1-Jun-2020Penetration Testing using MachineLearningSheth, Kavisha
18MCEI11.pdf.jpg1-Jun-2020Detection, Analysis and Mitigation of Cyber Security ThreatsSaini, Paramjeet Kaur
18MCEI10.pdf.jpg1-Jun-2020Secuirty Orchestration, Automation and ResponseSadrani, Jenil
18MCEI09.pdf.jpg1-Jun-2020Fraud Detection in Retail using Anomaly DetectionBandyopadhyay, Richita
18MCEI08.pdf.jpg1-Jun-2020Voice Based Authentication using Deep LearningRathod, Kinjal P.
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 225