2022: Recent submissions

  • Mayuri, M; Jasmin, M R (2022-07)
    The development of technology makes it possible to offer better solutions to the complicated issues that people encounter. The early identification, treatment, and ongoing monitoring provided by today's smart healthcare ...
  • Hari Krishnan, S R; Fousia M, Shamsudeen (2022-07)
    ABSTRACT Large segments of society today no longer trust the traditional method of voting because they think it may be easily manipulated. Cryptographic techniques can be used to address several problems, assure the ...
  • Ganga Krishnan, G; Fousia M, Shamsudeen (2022-07)
    Numerous aspects of daily life are still being transformed by technologies and services that are geared toward intelligent transportation systems and smart automobiles. Automatic Number Plate Recognition has ingrained ...
  • Fathima, Novrin; Nadera Beevi, S (2022-07)
    Gender classification and Age identification play an important role in our social lives. Gender is central characteristics of personality, and it is essential in our life. Age is important for our identity. Security, ...
  • Christy, Raj; Nadera Beevi, S (2022-07)
    Detecting traffic signs and lights has been a problem for intelligent vehicles for a long time.Prior to classifying traffic signs and lights, this provides an efficient method for managing the inventory of traffic signs ...
  • Brahmaduttan, S; Vaheetha, Salam (2022-07)
    DATA MIGRATOR,is a web platform that allows data to be moved quickly from one database to another. It facilitates the migration of several collections either in their entirety as-is or by specifically selecting one or ...
  • ANILAMOL, CHACKO; FOUSIA M, SHAMSUDEEN (2022-07)
    Recovering the original image by erasing noise and blur is known as image recon- struction or restoration. Contrary to typical restoration tasks, which can be handled by supervised learning, real-world picture deterioration ...
  • TEKACTPUB 
    Sindoori, B; Vaheetha, Salam (2022-07)
    In event-driven architecture, when a service performs some piece of work that other services might be interested in, that service creates a record-setting occasion of the executed a task. These events are used by other ...
  • Siji, Jose; Jasmin, M R (2022-07)
    A solution for converting real-world pictures into cartoonified pictures that is both useful and exciting in computer vision is proposed. Our method is organised as a knowledge-based plan that has recently gained popularity ...
  • Shana, Parween; Alshaina, S (2022-07)
    As a consequence of the rapid development of computer science and information technology in many organisations, institutions, banks, and online businesses, for example, the demand for a per- son’s identification is ...
  • Shalima, Shajahan; Fousia.M., Shamsudeen (2022-07)
    One of the most significant issues affecting urban living is air pollution, a form of environmental hazard. One of the air pollutants responsible for a number of illnesses is PM2.5, or Particulates with a diameter of ...
  • Shad Ibrahim, N P; Natheera Beevi, M (2022-07)
    Exams are a reliable and well-liked method of assessing the amount of information students have learnt. Exam evaluation is a difficult and time-consuming undertaking. Teachers will find this assignment handy since it ...
  • Sakthi Priya, M; Natheera Beevi, M (2022-07)
    One of the most unfortunate risks in today’s busy society is traffic accidents. Each year, traffic accidents cause a large number of casualties, illnesses, and deaths in addition to suffering huge fi- nancial losses. ...
  • Robin, Monachan; Vaheetha, Salam (2022-07)
    A few years ago, some projects were started with an older version of Java (LTS), which was the most stable version of the language and virtual machine at the time. But as time went on, new Java(LTS) became the official ...
  • Riya, Vincent; Natheera Beevi, M (2022-07)
    About 30 000 online applications are hacked every day, and most of the time website owners or web designers aren't even aware of what's going on with their own websites. Phishing sites are used by web hackers to deceive ...
  • PRAJITHA, P; NADERA BEEVI, M (2022-06)
    Image stitching, also known as mosaicing, is considered a current area of research in computer vision. The goal of image stitching is to create a high-resolution panoramic image by combining two or more photos of the ...
  • NITHIN, RAJ; NADERA BEEVI, S (2022-07)
    Decentralized apps (dApps) provide an unique open-source software ecosystem that is safe and ro- bust by running on top of a blockchain and peer-to-peer (P2P) network that functions as a form of operating system. ...
  • Sreeleksmi, Prathapan; Fousia.M., Shamsudeen (2022-07)
    In computing and operations research, the ant colony optimization algorithm (ACO) is a probabilistic approach to addressing problems that can often be reduced to locating optimal paths via graphs. In this metaphor, robotic ...
  • NIHAL, K; VAHEETHA, SALAM (2022-07)
    EPR PORTAL FOR PLASTICS, provides framework for implementation of Extended Producer Responsibility.The Ministry of Environment, Forest and Climate Change (MoEFCC), hereinafter referred to as The Ministry , notified Plastic ...
  • Sneha, Roy; Vaheetha, Salam (2022-07)
    In event driven architecture, when a service does some piece of work that other services may be interested in, that service generates a record of the done action in event-driven architecture. Other services consume such ...

Search DSpace


Advanced Search

Browse

My Account