[PDF][PDF] AN EFFICIENT TECHNIQUE FOR ANALYSIS OF MICRO ARRAY IMAGES USING GENEPIX SOFTWARE

K Srinivas, D Prasad, DV PrasadAssoc - journal-dogorangsang.in
Microarray is very useful and vastly growing technology that helps in analyzing genetic data.
Because of the advancement in this field there is lot of genetic data being produced …

[PDF][PDF] DEVELOPMENT OF A HOLIDAY PLANNER APPLICATION USING MERN STACK&KNN

D Prasad, SG Chandra, G Deepak, P Sravya… - junikhyatjournal.in
In today's scenario people are busy with their work and they want to plan their holiday
vacation perfectly. As technology increases there are many other applications providing …

[PDF][PDF] A NOVEL METHOD FOR VERIFYING CERTIFICATES USING BLOCK CHAIN

V Padmaja, GSC Kumar - journal-dogorangsang.in
In this project to secure academic certificate and for accurate management and to avoid
forge certificate we are converting all certificates into digital signatures and these digital …

[PDF][PDF] AUTOMATIC STREET LIGHT USING LDR AND IR

MVL Chetana, D Prasad, ND Bhargavi, G Navya… - journal-dogorangsang.in
Currently, street lights are operated manually. Additionally, these lights use a lot of power.
Therefore, an automatic street light system is implemented to avoid this issue. Nowadays it is …

[PDF][PDF] DEVELOPMENT OF A COLLEGE PLACEMENT WEB SITE USING THE MEAN STACK

G Pratyusha, GSC Kumar, K Alekhya, VSN VaraPrasad… - journal-dogorangsang.in
Placements can bring a wide range of benefits and opportunities. Training and management
of placement is a crucial part of an education al institution. Our website with the help of latest …

[PDF][PDF] AUTOMATIC STREET LIGHT USING LDR AND IR

VK Gunjan, MDD Priya, MB Vinutha, MK Persis - junikhyatjournal.in
Currently, street lights are operated manually. Additionally, these lights use a lot of power.
Therefore, an automatic street light system is implemented to avoid this issue. Nowadays it is …

[PDF][PDF] THREE LEVEL PASSWORD AUTHENTICATION

KJ Priya, G Pratyusha, U Sarvani, V Likitha… - journal-dogorangsang.in
In an organizational network, when the control of resources is given to more than one user,
the identity of users must be verified and then granted access to their entitlements. That can …

[PDF][PDF] A. Navya, SK. Faiz, B. VinayKumar, P. Ranjitha, UG Student, Department of Computer Science and Engineering, DVR & Dr HS MIC College of Technology …

GSC Kumar, G Pratyusha - journal-dogorangsang.in
Currently, theriskofnetworkinformationinsecurityisincre… and level of danger. The methods
mostly used by hackers to day is to attack end to end technology and exploit human …

[PDF][PDF] NETWORK INTRUSION DETECTION SYSTEM USING SUPERVISED MACHINE LEARNING WITH FEATURE SELECTION

BVN PRAVEENA, VL Chetana, B KAVYA, K YAMINI… - journal-dogorangsang.in
Advances in network technology have enabled the communication sector to connect remote
parts of the world, but they have also led to a rise in attacks on networking infrastructure from …

[PDF][PDF] AUTOMATIC STREET LIGHT USING LDR AND IR

MV Indumathi, MVD Priya, MT Annapurna… - Journal of Nonlinear …, 2022 - jnao-nu.com
Currently, street lights are operated manually. Additionally, these lights use a lot of power.
Therefore, an automatic street light system is implemented to avoid this issue. Nowadays it is …