Published: 2021-05-24

Rayleigh-Bénard Convection, Dynamic Bifurcation And Stability

Mohammad Yahia Ibrahim Awajan, et. al.

429-445

Methods of teaching foreign languages in the educational process

Qulaxmedova Gulnora Abduraximovna, et. al.

784-788

Auto Power Management System

Karthika Ganesan, et. al.

804-809

Smart Sanitizer Disperser with Level Monitoring

Chittaranjan Tadikonda, et. al.

994-999

Smart Sanitizer Disperser with Level Monitoring

Chittaranjan Tadikonda, et. al.

1046-1051

Esemtia, Comprehensive Platform To Meet Needs In A Teaching Context

Edwin Fernando Cárdenas Cárdenas, et. al.

1330-1339

Mask Detection

Utkarsh, et. al.

1541-1546

Why We Need Fellowship With an Almighty God

Sherill Kadmiel, et. al.

1854-1859

Fruit Maturity Identification System

Sangeeta Kumari, et. al.

2070-2082

Plant Disease Detection Using CNN

Sumit Kumar, et. al.

2106-2112

Electronic Health Records System Using IOT

Yaramala Sri Sarayu, et. al.

2352-2357

Preparation And Research Of Sorbents For Food Purification

Oybek Abdirasulovich Ikromov, et. al.

2612-2614

Home Automation With Blynk And Nodemcu

Dr. Venkateshappa, et. al.

2669-2674

A Call for Deep learning in Healthcare

Dr Chabi Gupta, et. al.

2711-2713

Applications of the Internet of Things in Healthcare:A Review

Vidisha tiwari, et. al., Vidisha tiwari, et. al.

2883-2890

Keep Track (Tenant Management System)

Lakshay Chauhan, et. al.

3087-3094

Deep Learning-Based Diagnosis Of Schizophrenia

Shrinidhi Sridhar, et. al.

3202-3210

Solving a Circuit System Using Fuzzy Aboodh Transform

Samer Thaaban Abaas Alshibley, et. al.

3317-3323

Smart Vehicles Zone Creation for Vehicle Ad Hoc Network

Sivakumar Kolandaiappan, et. al.

3333-3343

Factorial Harmonious Graph of a Group

M. Angeline Ruba, et. al.

3344-3347

The Local Identity that Still Survives

Simon Pieter Soegijono, et. al.

3421-3430

Engine Testing In Dyno Close Loop Simulation Environment

Miss. Shraddha Vinod Khadilkar, et. al.

3511-3515

Review of e-Commerce Security Challenges

Kalpana Dhende, et. al.

3593-3598

Manet Simulation Through Opnet

Dr. Ravikant Zirmite, et. al.

3632-3637

Strong Reset Fuzzy Automata

N. Mohanarao, et. al.

3720-3722

Papalele: The Local Identity that Still Survives

Simon Pieter Soegijono, et. al

4464-4470

E-Learning Application Design at SMK Pelita Bangsaduring the Covid-19 Pandemic

Tino Feri Efendi, Siti Rokhmah, Nendy Akbar Rozaq Rais, Isnawati Muslihah, Dewi Muliasari

4652-4658

Legislations on Juvenile Delinquency

Tripti Sada Singh, Dr. Amritpal Kaur

4659-4663

DEVELOPING A BASIC UNDERSTANDING ABOUT SPOOF ATTACKS.

Ms. Harmandeep Kaur, Mr.Sukhwinder Singh

4870-4877

ANALYSING DUPES - ALGORITHM TO DETECT AND PREVENT DOS ATTACK

Er. Sandeep Singh Khehra, Ms.Rimpi Rani 528

4894-4901

SIGNIFICANCE AND PURPOSE OF VIOLENCE IN THE SHORT STORIES OF ROALD DAHL

Mr.Japneet Kaur ,Dr. Dinesh Kumar Sharma 528

4940-4947

TRANSNATIONAL IDENTITIES IN JHUMPA LAHIRIS FICTION

Ms.Japneet Kaur, Dr. Dinesh Kumar Sharma 528

4977-4984

AN EFFICIENT REVIEW OF IDS IN MANET USING PSO

Dr Sharanabasappa C Gandage

4873-4879

Analysis of Fog Computing for IOT Security

Manju Kumari, Deepika Gupta, Naresh Mathur

4880-4883

Machine Learning Algorithm Based Analysis and Prediction of Rainfall

Rajini Akula, Chaithanya Kurva, Sathish Parvatham

4884-4897

A NEW APPROACH IN ELT : A LEXICAL STUDY

SWATHIVADLA, GRACE SHANIGARAM

4898-4901

Analyzing Cyber Attacks and Breaches: A Comprehensive Monitoring Approach

Kondragunta Rama Krishnaiah, Alahari Hanumant Prasad

4909- 4916