SN |
Paper |
1 |
Applicability of Cloud Computing in Education: A contemporary overview in Indian Perspectives
Subhendu Chatterjee
|
2 |
Internet Society, It’s Past and Present with reference to Future Potentiality: A study
Bishnu Raman Misir
|
3 |
West Bengal & Education Systems: The Need and Initiatives of Cloud Based Education Systems
Jayati Lahiri (Dey), Ashoke Das
|
4 |
Energy Efficient Routing in WSNs: Three Soft Computing Based Approaches
Rajan Sharma, Balwinder Singh Sohi, Amar Singh, Shakti Kumar
|
5 |
Defense against SYN Flooding Attacks based on Swarm Intelligent Ant Colony Optimization Technique
Ankush Parashar, Parveen Kakkar
|
6 |
Association between Biometrics and Forensic Science
Dr. Garima Yadav, Dr. Nikita Yadav, Dr. Sarita Kadian
|
8 |
Test case Generation for Conformance Testing of Optical Network Switch Using Robot Framework
Padmaja Annapureddy, Dr. Sunilkumar S Manvi
|
9 |
Software Requirements Selection using AHP
Nadiya Afzal, Mohd. Sadim
|
10 |
An Optimized Algorithm based on ACO Integrated Association Rule Mining and Text Mining for Detecting Erythemato-Squamous Diseases
Anjali Saini
|
11 |
Rough-Fuzzy Classification with Two Thresholds- Algorithms and Implementations using C
B. Venkataramana, L. Padmasree, M. Srinivasa Rao, G. Ganesan
|
12 |
Enhanced Security of Twitter Trending With Topic Level Key Factors over Twitter Trends Management
Fatima Rahmath, Md Ateeq Ur Rahman
|
13 |
Effectiveness in significant Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
Md Shahid Raza, Md Ateeq Ur Rahman
|
14 |
A Chronological Model for Topic Re-Popularization forecasting in Online Social Networks
Mudassir Ahmed Khan, MdAteeq Ur Rahman
|
15 |
RapidGeo: Graphic Regional Range Queries on Encrypted Geographical Data in a Productive Mechanism
B. Venkataramana, L. Padmasree, M. Srinivasa Rao, G. Ganesan
|
16 |
Emphasize Over the Significance of Worker Prominence Information of In Microtask
Md taha tufail, Md Ateeq Ur Rahman
|
17 |
Software Cost Estimation using Function Point: An Extended Approach
Amrita Saxsena, Saoud Sarwar
|
18 |
Comparison of Programming Languages: Review
K P Naveen Reddy, Geyavalli Y, Sujani D, Rajesh S M
|
19 |
Selection of Classification Algorithm Based on K-Fold Cross Validation and Confusion Matrix(KFCM) For Direct Marketing
Sachin Jain, Dr. Naresh Trivedi
|
20 |
A Review paper on Smart Home Security System using GSM Module
Aman Sharma, Dr. Anjana Goen
|
21 |
Implementation Findings of e-Aushadhi: A Holistic Review
Priyanka Dutta, Ajay Kr. Gupta
|
22 |
Packaging and Its Role on Consumers’ Perception at Point of Purchase in Kathmandu Valley
Rajeswor Neupane
|
23 |
Fake Face Recognition using Thermal Imaging
Navpreet Kaur
|