Skip to main content
The criminal cases in India are increasing rapidly due to which number of cases pending are also piling up. This continuous increase in the criminal cases is proving to be difficult to be classified and to be solved.
    • by 
With the advent and popularity of social network, more and more users like to share their experiences, such as ratings, reviews, and blogs. The new factors of social network like interpersonal influence and interest based on circles of... more
    • by 
    •   2  
      Machine LearningCloud Computing Security
In consideration to the today's globalized world everybody in the society are being addicted in using the Social Networks Sites.
    • by 
    • Social Media
A detailed study on feature extractors in spatial and transformed domain is carried out in this work. The survey in Spatial domain include most of the traditional detectors until recently the SIFT and its variants. In the transformed... more
    • by 
    •   3  
      Fourier transformScale Invariant Feature TransformDual Tree Complex Wavelet Transform
Vison based tracking in aerial images has its own significance in the areas of both civil and defense applications.  A novel algorithm called aerial tracking learning detection which works on the basis of the popular tracking learning... more
    • by 
    •   6  
      Computer ScienceArtificial IntelligenceComputer VisionObject Detection
In this era of digitization and automation, the life of human being is getting simpler because almost everything is automatic where the old manual systems is replaced with the automated system. There is anincrease in demand for the... more
    • by  and +1
    •   14  
      The Internet of ThingsInternet of ThingsInternet of Things (IoT)Cyber-Physical Systems/Internet of Things
Now-a-days the Internet of Things (IOT) is very popular technology in our life. Internet of Things and Radio Frequency Identification are famous technology which will help Visually impaired people to solve their daily life problem. Visual... more
    • by  and +1
    •   2  
      Computer ScienceComputer Engineering
It is a project report on the database management  system.
The project name is "WEDDING PLANNER" .This is about the index page of the report
    • by 
It is a project report on the database management  system.
The project name is "WEDDING PLANNER" .
    • by 
    • by 
    •   5  
      SegregationSolid Waste ManagementCloud ComputingGarbage Collection
In a world filled with busy schedules it becomes almost certain that a person is not able to keep up with his commitments on time due to a number of reasons. One of the main reasons being the inability to commute on time, i.e. we might be... more
    • by 
    • Computer Science
: Drivers who do not take regular breaks when driving long distances run a high risk of becoming drowsy a state which they often fail to recognize early ...
    • by 
Hypothyroidism or hyperthyroidism is a major disease in India which arises due to malfunctioning of thyroid hormones. Medical industry has enormous quantity of data, but the bulk of this data is not processed. For proper diagnosis data... more
    • by 
    •   3  
      Artificial IntelligenceMachine LearningData Mining
    • by 
Disclaimer : This statement is based on the information available with us, and is only for your reference.The statement from the respective fund reflects the exact information for the respective folio. Any discrepancy may please be... more
    • by 
This project is an innovative solution that allows a patients to intract with all their health related problems.Here we are highlighting about the communication between the doctor and the pharmacist regarding appointments,medical... more
    • by 
    • Peace Talks
    • by 
Looking at the current situation faced by farmers, there is an increase in suicide rate over the years. Main reason behind it includes poverty, unpredictable weather, financial problem, parental issue and frequent change in Indian... more
    • by 
    • Crop Yield Prediction
Security of websites and online systems is of paramount concern today. A significant threat comes from malicious automated programs designed to take advantage of online facilities, resulting in wastage of resources and breach of web... more
    • by 
    •   7  
      Information TechnologyWeb SecurityComputer ProgramInformation Analysis
Sophisticated and evolving CAPTCHA breaking algo-rithms as mentioned in [1, 4, 7] have successfully broken currently employed CAPTCHAs. This has resulted in a con-tinuous requirement for more robust CAPTCHAs. In light of this, STC... more
    • by 
    •   6  
      SegmentationComparative AnalysisRobustnessImmune system