Title Page No Download
DESKTOP BASED EYE TRACER
Authors: E.VARUN M.SUKESH
DOI: 10.48047/IJIEMR/V5/ISSUE 01/01
1-9 Download
A Design Approach for Compressor Based Approximate Multipliers
Authors: D.SUNIL SURESH **P.AISHWARYA
DOI: 10.48047/IJIEMR/V5/ISSUE 01/02
10-18 Download
An Approach for Preserving Privacy of Shared Data in the Cloud
Authors: R.BHARATH **E.PRAVEEN
DOI: 10.48047/IJIEMR/V5/ISSUE 01/03
19-29 Download
ACHIEVING DATA CONSISTENCY THROUGH QUERIES
Authors: N.Navya Deepthi **B.Saritha
DOI: 10.48047/IJIEMR/V5/ISSUE 01/04
30-43 Download
OPTIMIZATION OF NUMBER AND POSITIONS OF MACHINING FIXTURE ELEMENTS
Authors: K.NAGARAJU M.TECH(PHD), 2DR. K. KAMARAJUPHD
DOI: 10.48047/IJIEMR/V5/ISSUE 01/05
44-54 Download
PERFORMANCE ANALYSIS OF FPGA USING OF AES ALGORITHM
Authors: ADEPU VIJAYA
DOI: 10.48047/IJIEMR/V5/ISSUE 01/06
55-56 Download
A GREEDY DEPTH-FIRST-SEARCH SCHEME ON ENCRYPTED DATA IN CLOUD STORAGE
Authors: MRS. B.SANGEETHA
DOI: 10.48047/IJIEMR/V5/ISSUE 01/07
57-58 Download
ANALYSIS OF A PHASE-SHIFT-CONTROLLED ACTIVE BOOST RECTIFIER FOR SOFTSWITCHING DC-DC CONVERTERS
Authors: DR. K. EZHIL VIGNESH
DOI: 10.48047/IJIEMR/V5/ISSUE 01/08
59-64 Download
DETECTION OF LUNG CANCER IN CT IMAGES USING IMAGE PROCESSING
Authors: B. Kalpana, Jasmin Susan Jose
DOI: 10.48047/IJIEMR/V5/ISSUE 01/09
65-68 Download
Simple and secure image Steganography using LSB and Triple XOR using MSB
Authors: P.Harish, Ganta Ramakrishna Reddy
DOI: 10.48047/IJIEMR/V5/ISSUE 01/10
69-72 Download
TERADATA-DRIVEN BIG DATA ANALYTICS FOR SUSPICIOUS ACTIVITY DETECTION WITH REAL-TIME TABLEAU DASHBOARDS
Authors: Naga Charan Nandigama
DOI: 10.48047/IJIEMR/V05/ISSUE01/11
73-78 Download