- Document377996347494349464_economics-2020uploaded byShubha Shivaprakash
- DocumentCse Computer Forensics Reportuploaded byShubha Shivaprakash
- DocumentCSE Steganography Reportuploaded byShubha Shivaprakash
- DocumentA Secure Crypto-biometric Verification Protocoluploaded byShubha Shivaprakash
- Documentmachine_learning_seminaruploaded byShubha Shivaprakash
- Documentwireless-sensor-networks-in-monitoring-of-asthmauploaded byShubha Shivaprakash
- DocumentIJCST V6I2P30 Anupriya Arya Sarita Soniuploaded byShubha Shivaprakash
- DocumentHybrid Cryptography and Steganography Method to Emuploaded byShubha Shivaprakash
- DocumentCSE Artificial Eye REPORTuploaded byShubha Shivaprakash
- DocumentToaz.info Software Reusepdf Pr 0631d691b11a7e93303c4fcc27d457cauploaded byShubha Shivaprakash
- Documentabbasi-2019-ijca-918639uploaded byShubha Shivaprakash
- Documentabbasi-2019-ijca-918639uploaded byShubha Shivaprakash
- Document180601 fuploaded byShubha Shivaprakash
- Document180601 fuploaded byShubha Shivaprakash
- DocumentCse Computer Forensics Reportuploaded byShubha Shivaprakash
- Document64056110 Parasitic Computinguploaded byShubha Shivaprakash
- Documenti Twin Limitless Pendrive Technology Full Seminar Report and PPTuploaded byShubha Shivaprakash
- DocumentSolid Waste Managementuploaded byShubha Shivaprakash