1 |
Predicting Students Performance: An EDM Approach
Dr. Anupam Bhatia, Sneha Kumari
|
2 |
Preventing Buffer Overflow Using Buffer Linear Congruential Generator
Preeti Sharma, Monika Poriye, Vinod Kumar
|
3 |
Survey on Design of Routing Protocol for Underwater Acoustic Sensor Network
Ekta yadav, Ms. Sumit
|
4 |
Implementation on Design of Routing Protocol for Underwater Acoustic Sensor Network
Ekta yadav, Ms. Sumit
|
5 |
Content Based Image Retrieval Using Color Histogram with Shape and Texture
Laxmi.V. Kullur, R. H. Goudar, V. T. Desai, Vinayakamurthy
|
6 |
The impact of Training on Team Effectiveness in Hotel Management
Narender Suhag
|
7 |
Vehicular Ad-hoc Network (VANET) Challenges, Privacy and Security
Sharda Rani, Anjali
|
8 |
A Study of Image Compression Techniques
Pooja Rani, Sonal
|
9 |
User authentication techniques for implementation of Smart Card Based Ration Distribution System
Yogesh Kumar Sharma, Dr Manoj Kumar
|
10 |
A Genetic Algorithm Approach to CPU Scheduling
Meenu Devi, Sonal
|
11 |
A Literature Review on Fog Computing
Deepika, Mrs. Kavita Rathi
|
12 |
Multimodal Biometrics-A Review
Pooja Chaudhary
|
13 |
Survey paper on Rumor Detection in Real-Time Twitter Dataw
Divya M. Patel, Dr. Dinesh B. Vaghela
|
14 |
Denoising Gaussian Noise Using Wavelet Packets
Sandip Mehta
|
15 |
Digital India: Role of Digitalization in Sustainable Development
Dr. Anil Kumar, Dr. Yashwant Singh Sangwan
|
16 |
Necessity of Automatic Kernel Selection in Machine Learning through Support Vector Machine
Gurdev Singh, Dr Anupam Bhatia
|
17 |
Influence of Social Media on the First Time Voters and Youth In Favour Of Bhartiya Janta Party
Pratibha Duhan
|
18 |
Clone Detection Techniques in Software Code and Models
Neha Saini, Sukhdip Singh
|
19 |
Morphological Analyzers: A Review
Shubhnandan Singh Jamwal
|