Journal of Science
Technology and Research
Menu
Skip to content
Home
Editorial Board
Instruction to Authors
Ethical Guidelines
Plagiarism Policy
Archives
Contact Us
Volume No.2 Issue No. 1
S.no
Title & Details
Page No.
Download
1
Medicinal Uses of Cashew(Anacardium occidentale):Review
Zarqa Iqbal, Muhammad Akram, Muhammad Muddasar Saeed
|
|
|
1 - 10
2
Prognostic System for Heart Disease using Machine Learning: A Review
Mahesh Kumar, K.Premkumar, R.Senthilkumar
|
|
|
33-38
3
STC database for SQL Range Queries digital apps with Privacy Preserving
Sudhin Chandran, M.Abhijith, Priya
|
|
|
49-59
4
Identification of plant Syndrome using IPT
Madan Mohan M, Malathi V, VinothiniI N
|
|
|
60-69
5
Automatic Face Mask Detection Using Python
M.Madan Mohan, Sojasomanan, M.Kaleeswari
|
|
|
91-100
6
Automatic Control for Home Applications using IoT
Veeramani R, Subesh S, Sathishkumar
|
|
|
100-110
7
Modern Automated System for Traffic Signals
Senbaga Ganesh, Ramu S, Krishna Prasath T
|
|
|
111-119
8
Android Based Diet Consultant using Rule Pattern-based algorithm
Karthik K, Vignesh K, M.Dhurgadevi
|
|
|
120-127
9
Cloud Based Bookmark Manager
Vijay A, Sulaiman Suit.A, Sathish Kumar
|
|
|
128-138
10
Chat Robot for Medical Applications
G.Maniraja, S.Kanniraj, L.Krishna Kumar
|
|
|
139-149
11
AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM
Arul Selvan M
|
|
|
150-157
12
CONSUMER PERCEPTION TOWARDS APPLE PRODUCTS WITH REFERENCE TO TIRUCHIRAPPALLI DISTRICT
I. ASHIQ MOHAMED , Y. MOYDHEEN SHA , M. SHAHID AHMED , BADHUSHA M H N
|
|
|
158-178
13
Machining Behaviour of Aluminium 6063 Strengthen with Aluminium Oxide and Chicken Bone Ash Produced by Modern Technique
Ramamoorthi.R, Sivasurya.K.V, Vesvanth.M, Sanjay.S, Sriram.K
|
|
|
11-23
14
Speech Based Controlled Techniques using NLP
G.Rujithkannan, K.Muthukumar, R.Senthilkumar
|
|
|
24-32
15
AR Watch Try – On Application for Android Devices
Madan Mohan.M, D. Santhosh Kumar, Ajay.K
|
|
|
39-48
16
A Multiple Sensor Data-Fusion for EFD Using IoT
Madan Mohan M, Kannadhasan, Muguntharajan
|
|
|
70-80
17
IoT Based Intruder Prevention using Fogger
T.Krishna Prasath, Hareesh, Mohamed Pahad
|
|
|
81-90
Posts navigation
1
2
Next »
MENU
Home
Editorial Board
Instruction to Authors
Ethical Guidelines
Plagiarism Policy
Archives
Contact Us