Found 10,000 presentations matching your search
Master the Communication Skill using Haven Model
Multivariate Data Analysis and Visualization using MetaboAnalyst
The ACM Symposium on User Interface Software and Technology (UIST 2025)
report
High Throughput Phenotyping Using NIR Sensor For Abiotic Stress Tolerance
vgdsgs
symmetric key distribution using public-key encryption
It describes the new methodology of working in domain of phishing link detection. A new hybrid appro...
face locker using blink to unlock
This lecture, authored by Dr. G. S. Virdi, Ex-Chief Scientist, CSIR–Central Electronics Engineerin...
Are you maximizing the efficiency and value of your assets? Without a robust EAM strategy, businesse...
ADC
GIVING OPINION LESSON CLASS
A INtiative taken by us
Advanced traffic volume estimation using machine learning
The paper addresses the problem of rain streak removal from videos. While, Rain streak removal from ...
Log-based anomaly detection aims to identify abnormal system behaviors, frequent early indicators of...
It's regarding kavach system in railway
Creating and rigging character using bone tool
Ứng dụng AI cho kiểm thử phần mềm.
- Implemented Zero Touch Provisioning, Network Topology Mapper, and Root Cause Analysis using Python...
Gesture controlled car presentation. #gesturecontrolcar #engineering #miniproject
File handling in python.