E-mail: editor@ajetijournal.com
Product Lifecycle- Knowledge Management
Sankalp Vivek Giridhar , Kakandikar Ganesh M.
Asian J Eng Technol Innovat | Open Access
Abstract | PDF | Full-Text
Survey of An Accelerometer-Based Digital Pen for Handwritten Digit and Gesture Recognition
Sachin Ashok Waghmare , Shilpa.P. Kodgire
Design of a Wireless Local Area Network for A 3-Floors Library
S.F. Kolawole
SCADA a tool to increase efficiency of water treatment plant
Sunil L. Andhare , Prasad J. Palkar
Palm Authentication using Biometric Security Systems
Darshan Parate, Mansi Tanna, Kajal Singh
Event Characterization and Prediction Based on Temporal Patterns Using Mrps in Dynamic Data System
Deepak Dharra, Abhishek Iyer, Nitika Gulhane, Sultana Parveen Khan, Vishal Dond
Petroleum Gases Measurement System With Remote Monitoring using TCP/IP
Rutuja Pradhan, Sangeeta Mitkari, Ashwini Sonawane, Pooja Nage
Interactive Projector
Bhavya Shetty, Rachana Gowda, Jyoti Sanap, Ashish Manwatkar
User Authentication Using Text - Prompted Technique
Laxmi Doddappagol, Geetha B
Design of Secured Cloud Based Condition Monitoring of Wind Turbine Parameters Using IOT
Ambarish K J, Bharathi S H
Asset Data Linkage USING Artificial Intelligence Method of Machine Learning
Krishna M V
Survey on Different Routing and Wavelength Assignment Techniques in WDM Optical Networks
Shashma. M, Shrikant S Tangade
Survey on Social Network of Vehicles Under IOT
Manjunath S, Sathish G C, Deepasree C E
Security for EMV Card Data in Payment Systems
Satish Kabade,and Meenakshi Sundaram
A Survey of WLAN Positioning for Mobile Devices based on Time of Flight
Anup T Dhate, Vani K
An Encryption cum Hash Function Using Permutation Parity Machine
Shiffin N, Y Sree Chaitanya, Rajat Pandey, Ravi Jha
Intrusion Detection Using Passive Infrared Sensor(PIR)
Pampapathi B S, Manjunath P C
Improving the Performance and Accuracy of Image Segmentation Using Modified FCM Algorithm
Securing Numerical Relational Dataset using Robust and Reversible Watermarking Approach based on Genetic Algorithm
Nicy Jose
A Survey on Methods of Service Recommendations
Pratheek Shrivatsav. R and Manjunath. P C
Low Rate DoS Attack Detection Mechanisms
Sumit Pote, Ashish Nikalaje,Rahul Bhalerao, Prashant Gade, Kunal halkandar
CoprHD: Bypassing the virtual layer of storage abstraction for advanced users
Udaya Rani V and Maheshchandra. C. S
Visualization of Checkout Data of a Spacecraft based on Time-Series Database
Mallikarjuna Shastry P.M, Sheena Jose and Rashmi Shekar
RLEC: Recursive Leach based Energy Conservation in WSN?s using clustering technique
Prof. Raghavendra Reddy and Prof. G. C. Sathish
Analysis of PSO Clustering Algorithm for Underwater Acoustic Sensor Networks
Vani Krishnaswamy, Shyam Sunder, Shubham Sharma, Swapnil Siddharth, Sandeep P
Electronic Banking System for Rural and Less Connected Areas Using Arm Processor
Kiran Kumar P.N, Amrita Rajak, Robin, Roshan Banjare
Near Field Communication (NFC) ? Wave is the new way forward
Manjushree Sahana V , Padmaja Annapureddy and Shilpa Chaudhari
Frameworks for Parking Systems: A Survey
Santhosh G and Sathish G C
Nyasacart (WEB) Application for Connecting Online Shopping Services along with Real Estate Business Services
Priyanka Pinto, Venkatesh Prasad, Arun S Patil,
Backup and Recovery for File System and Databases
Malatesh Karibisti and Prof. Meenakshi Sundaram
A survey on Voltage Factor in Smart Grids
Ranjitha K and Malikarjuna M
Chatbot on Serverless/Lamba Architecture
Nandan.A and Prof.Shilpa Choudary
A Comparative Study on The Electrochemical Oxidation of Natural Organic Matter Using BDD and MMO Electrodes
Shasvat Rathod*, Robert Liang, Azar Fattahi, Monika R. Snowdon, Mark R. Servos and Norman Zhou
Bike Pool: An Android Based Application
Lamont Bridle*, Nichols Bie
Electrodynamics of Compressible Ether
Nikolai Magnitskii*