SN |
Paper |
1 |
Applicability of Cloud Computing in Education: A contemporary overview in Indian Perspectives
Subhendu Chatterjee
|
2 |
Internet Society, It’s Past and Present with reference to Future Potentiality: A study
Bishnu Raman Misir
|
3 |
West Bengal & Education Systems: The Need and Initiatives of Cloud Based Education Systems
Jayati Lahiri (Dey), Ashoke Das
|
4 |
Energy Efficient Routing in WSNs: Three Soft Computing Based Approaches
Rajan Sharma, Balwinder Singh Sohi, Amar Singh, Shakti Kumar
|
5 |
Defense against SYN Flooding Attacks based on Swarm Intelligent Ant Colony Optimization Technique
Ankush Parashar, Parveen Kakkar
|
6 |
Association between Biometrics and Forensic Science
Dr. Garima Yadav, Dr. Nikita Yadav, Dr. Sarita Kadian
|
7 |
Advanced Biometric System Security: A Review
Neetu Gahlawat, Dr.Pankaj Kumar Verma, Dr. Chander Kant
|
8 |
Test case Generation for Conformance Testing of Optical Network Switch Using Robot Framework
Padmaja Annapureddy, Dr. Sunilkumar S Manvi
|
9 |
Software Requirements Selection using AHP
Nadiya Afzal, Mohd. Sadim
|
10 |
An Optimized Algorithm based on ACO Integrated Association Rule Mining and Text Mining for Detecting Erythemato-Squamous Diseases
Anjali Saini
|
11 |
Rough-Fuzzy Classification with Two Thresholds- Algorithms and Implementations using C
B. Venkataramana, L. Padmasree, M. Srinivasa Rao, G. Ganesan
|
12 |
Enhanced Security of Twitter Trending With Topic Level Key Factors over Twitter Trends Management
Fatima Rahmath, Md Ateeq Ur Rahman
|
13 |
Effectiveness in significant Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
Md Shahid Raza, Md Ateeq Ur Rahman
|
14 |
A Chronological Model for Topic Re-Popularization forecasting in Online Social Networks
Mudassir Ahmed Khan, MdAteeq Ur Rahman
|
15 |
RapidGeo: Graphic Regional Range Queries on Encrypted Geographical Data in a Productive Mechanism
B. Venkataramana, L. Padmasree, M. Srinivasa Rao, G. Ganesan
|
16 |
Emphasize Over the Significance of Worker Prominence Information of In Microtask
Md taha tufail, Md Ateeq Ur Rahman
|
17 |
Software Cost Estimation using Function Point: An Extended Approach
Amrita Saxsena, Saoud Sarwar
|
18 |
Comparison of Programming Languages: Review
K P Naveen Reddy, Geyavalli Y, Sujani D, Rajesh S M
|
19 |
Selection of Classification Algorithm Based on K-Fold Cross Validation and Confusion Matrix(KFCM) For Direct Marketing
Sachin Jain, Dr. Naresh Trivedi
|
20 |
A Review paper on Smart Home Security System using GSM Module
Aman Sharma, Dr. Anjana Goen
|
21 |
Implementation Findings of e-Aushadhi: A Holistic Review
Priyanka Dutta, Ajay Kr. Gupta
|
22 |
Packaging and Its Role on Consumers’ Perception at Point of Purchase in Kathmandu Valley
Rajeswor Neupane
|
23 |
Green Communication Impact in 5G Wireless Cellular Networks: A Review
Dr. Upasana
|
24 |
Role of IoT Technology in Agriculture
Shivani Sharma, Arun Kumar
|
25 |
Advancement in Biometric Security System: A Case Study
Ramesh Kumar
|
26 |
A Study on K-Means Clustering and Morphological Operations to Spot Brain Tumors
Divya shree, Khushboo
|
27 |
Energy Consumption Survey on Cloud Environment
Neha Dutta, Dr. Pardeep Cheema
|
28 |
Spoof Attack Detection in Fingerprint Authentication using Hybrid fusion
Navpreet Kaur
|
29 |
A Faster Software Fault Prediction using White-Box Testing (LT) and Black-Box Testing (BVA) Techniques
Seema Rani, Deepali Gupta
|