Skip to main content
Skip to main navigation menu
Skip to site footer
Home
About
Ownership of Journal
Aim & Scope
Indexing
Editorial Board
Editor Roles
Track Your Paper
Archives
Current
Journals Policy
Editorial Process
Peer Review Policy
Copyright Policy
Plagiarism Policy
Advertising Policy
Publication Ethics
Conflict Management
Creative Commons Policy
Open Access Statement
For Author
Authors Right
Review Process
Article Processing Charge
Submission Guidelines
Complaint
Submit Article
Corrections, Retractions & Expressions of Concern
FAQ
Reviewer Credit
Complaints and Appeals Procedure
Call for Papers
Call for Editor
Contact
Search
Search
Home
Our Journals
Register
Login
Home
/
Archives
/
Vol 9 No 2 (2023): Volume 9 Issue II
Published:
2023-09-03
Article
HANDLING BIG TABULAR DATA OF ICT SUPPLY CHAINS: A MULTI-TASK, MACHINE-INTERPRETABLE APPROACH
Priti P Kohale, Shailija Sharma
1-8
PDF
LOCK MART - SMART LOCKER SYSTEM
R. Yavanalakshmi, S. Pooja, J. Malathi, A. Nareshkumar
9-12
PDF
A Survey on Waste Water Treatment and Cleaning Using Numerous Techniques
Gangavarapu Ramya, Dhanni Pavani, A.Nymisha Nandini Reddy, Santosh Madeva Naik
20-23
PDF
ChainBank: Empowering Students to Build Strong Financial Habits
Tarang Rajpal, Hrishikesh Patil, Varad Deshmukh, Dhananjay Pai, Sharmila Sengupta
24-28
PDF
A systematic review of similar Questions Retrieval Approaches
Swati Khodke, Sheetal Dhande
29-42
PDF
Secure Internet of Things (IoT) Networks: Study the challenges and develop solutions for securing IoT networks, including authentication, access control, and data protection
Mohammad Naveed Hossain, Md. Mahedi Hassan, Raiyan Janik Monir, Md. Shaba Sayeed, Shaira Wajiha, Tamkin Mahmud Tan
43-48
PDF
Cyber Security and People: Human Nature, Psychology, and Training Affect User Awareness, Social Engineering, and Security Professional Education and Preparedness
Mohammad Naveed Hossain, Tazria Zerin Khan, Mohammad Shaba Sayeed, Md Jahid Raihan
49-53
PDF
Bucket Filling Algorithm
Nafim Ahmed, Mohammad Naveed Hossain
54-56
PDF
Effectiveness and Limitations of existing techniques for privacy preservation data mining (PPDM) for Medical Data
Amol R Kulkarni, Kamepalli Sujatha
57-66
PDF
Review On Odometry Techniques in Robotics Applications
Isra Arshad, Merlin Divya A, Shriya P
67-69
PDF
A Detailed Literature Survey and In-depth Analysis of Existing Methods for the Detection of Lung cancer
Akshata Saptasagar, Rahul Badgujar, Atharva Misal, Omkar Raskar
70-74
PDF
A Review Paper on DDoS Detection Using Machine Learning
Diksha Sharma
75-78
PDF
Make a Submission
Visitor Counter
Information
For Readers
For Authors
For Librarians
Keywords