Ayush Sharma
Accurate prediction of cancer can play a crucial role in its treatment. The procedure of cancer detection is incumbent upon the doctor, which at times can be subjected to human err...
View Paper Download PDFYadavalli Srivalli, V. Rajesh, I.M.V. Krishna
Internet of Things (IoT) is the emerging technology which is supported by vast growth in various types of Interfacing and hand held devices, Network Topologies, bandwidths and indu...
View Paper Download PDFVandana Vidyadhari, S.Rajakumar
The paper involves a design of Mach 5 Nozzle from an existing Mach 6 Nozzle of a large Hypersonic Wind Tunnel in Vikram Sarabhai Space Centre, Thiruvananthapuram in order to obtain...
View Paper Download PDFAahan Gupta
Online video education is steadily becoming more important. With the rise in use of internet , student tend to study more using the contents available online such as ebooks and vid...
View Paper Download PDFAahan Gupta
Face recognizable proof is a standout amongst the most surprising capacities of the human mind. The human cerebrum has gigantic ability to store a large number of pictures and to d...
View Paper Download PDFAahan Gupta
Lean production was developed by Toyota production executive named Taiichi Ohno, in response to a number of problems that Japanese Industry was facing during his time. Lean manufac...
View Paper Download PDFDoğuş Özuyar, Aslı Elmaslı, Şeyma Çalışkan
We present the more refined abundances of elements (C, O, Na, Mg, Al, Si, Ca, Sc, Ti, V, Cr, Mn, Fe, Ni, Zn, Sr, Y, Zr and Ba) determined using the computationally intensive ATLAS1...
View Paper Download PDFHemani Batra
The use of fats and oils in cooking is an integral part of traditional Indian cooking. Broadly, two types of fats and oils are used, either of plant origin (mostly unsaturated) or ...
View Paper Download PDFRaghav Mittal
To introduce a system building measure for keeping up a system through the Internet of Things (IoT) innovation intermingling when the data and correspondence framework crumples in ...
View Paper Download PDFStuti Garg
The biometric devices are used nowadays for security purposes by scanning the human body like iris or fingerprints. Uni-modular and multi-model biometric devices has been applied f...
View Paper Download PDFMuskan Talreja
Security is necessary for sharing fragile Information in the cloud. Utilizing the real key makes the framework share the delicate Information without moving Keys for every single r...
View Paper Download PDFDisclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.