Call us : 9940389791
Mail us : karthickkiwi@gmail.com
AI & Cyber Security AI & Cyber Security
  • Home
  • Editorial Board
    • Instruction to Authors
    • Ethical Guidelines
  • Plagiarism Policy
  • Archives
  • Contact Us

Monthly Archives: February 2026

19Feb/26

Design and Implementation of a Proximity Sensor-Based Intelligent Borewell Safety and Automated Closure System

February 19, 2026Volume No:8. Issue No.1 (2024), Year 2024google scholar, scopus indexedkarthick R
Leave a comment
19Feb/26

INTELLIGENT IOT AND SENSOR-INTEGRATED APPROACH FOR OPTIMIZED AGRICULTURAL WATER USAGE AND CROP PRODUCTIVITY

February 19, 2026Volume No:8. Issue No.1 (2024), Year 2024google scholar, scopus indexedkarthick R
Leave a comment
19Feb/26

DEVELOPMENT OF AN RF-BASED INTELLIGENT CRUISE CONTROL SYSTEM FOR SPEED CONTROL IN LOW-SPEED AREAS

February 19, 2026Volume No:8. Issue No.1 (2024), Year 2024google scholar, scopus indexedkarthick R
Leave a comment
19Feb/26

Sensor-Based IoT Framework for Real-Time NPK Analysis and Improved Crop Production

February 19, 2026Volume No:8. Issue No.1 (2024), Year 2024google scholar, scopus indexedkarthick R
Leave a comment
03Feb/26

AI – BASED TOOL FOR PRELIMINARY DIAGNOSIS OF DERMATOLOGICAL MANIFESTATION

February 3, 2026Volume No:8. Issue No.1 (2024), Year 2024google scholarkarthick R
Leave a comment
03Feb/26

Predictive Routing Optimization Technology Based On Event Traffic Prediction

February 3, 2026Volume No:8. Issue No.1 (2024), Year 2024google scholarkarthick R
Leave a comment

Archives

  • April 2026
  • March 2026
  • February 2026
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025

Categories

  • Volume No:1. Issue No.1 (2017)
  • Volume No:10. Issue No.1 (2026)
  • Volume No:4. Issue No.1 (2020)
  • Volume No:5. Issue No.1 (2021)
  • Volume No:8. Issue No.1 (2024)
  • Volume No:9. Issue No.1 (2025)
  • Volume No:9. Issue No.2 (2025)
  • Year 2017
  • Year 2020
  • Year 2021
  • Year 2024
  • Year 2025
  • Year 2026
  • Years
Copyright © AI & Cyber Security
Powered by AI & Cyber Security
MENU
  • Home
  • Editorial Board
    • Instruction to Authors
    • Ethical Guidelines
  • Plagiarism Policy
  • Archives
  • Contact Us