CONTENTS

 

 

Use of E-Portfolios in Higher Education: Application of Constructivist Theory for Effective Learning

 

Authors: Rupa Basu

 

State of the Art of Spell Checker Design for Indian Languages: A Survey

 

Authors: Shivani and DharamVeer Sharma

 

Addressing Cloud Computing Security Concerns

 

Authors: Vasundhara Bhatia, NehaPrabhakar and SumatiManchanda

 

Reduction of Load on Network using Compression Technique with Web Crawler

 

Authors: Sneha Tuteja, Naresh Kumar and Rajender Nath

 

Hospital Information Systems Integration Plan System Perespective

 

Authors: Qurat Ul Ain and Sumera Shafi

 

Secure Mining of Association Rule through Hash Key in Horizontally Distributed Database

 

Authors: Raunak Rathi, A.V. Deorankar and Roshani Sherkar

 

A Study on Mobile-Commerce

 

Authors: Seema Chaudhary and Gunjan Sharma

 

Data Base Management System in Cloud Computing Environment

 

Authors: Sudhanshu Maurya and Swati Kumari

 

Development of Distributed E-Healthcare System Using Service Oriented Architecture

 

Authors: Sudhanshu Maurya and Swati Kumari

 

Cloud based E-Learning–Using cloud to provide Learning as a Service

 

Authors: Tania Gaur and Nisha Kharb

 

Combination of Genetic Algorithm with Fuzzy Systems

 

Authors: Gaurav and Nidhika Yadav

 

Review of Techniques of Digital Video Forgery Detection

 

Authors: Mrs. J.D. Gavade and Mrs. S.R. Chougule

 

Fuzzy Rough Sets and Its Application in Data Mining Field

 

Authors: Megha Kumar and Nidhika Yadav

 

Web Information Retrieval System

 

Authors: Neha Prabhakar, Vasundhara Bhatia, Sumati Manchanda and Nidhi Sharma

 

Review: Neural Network based Approach for Travel Time Prediction

 

Authors: P.K. Kharat, Sagar S. Gaikwad and S.V. Patil

 

Effect of the Core Selection Strategy in Determining Optimum BDMST in Multicast Networks

 

Authors: Sakshi Arora and Sunanda

 

Recommender System-A Close Look at Collaborative Filtering

 

Authors: Shivani Agrawal, PankhuriRastogi and Shubhi Agarwal

 

Proposed Methodology for Database Privacy in an Existing System Using Hippocratic Database

 

Authors: Sonali Ganguly and S.P. Singh

 

Role of ICTS in Education: Promises and Challenges ICT as a Change Agent

 

Authors: Prabha Sharma

 

A Study on Data Preprocessing, Classification and Clustering using WEKA Tool

 

Authors: Amit Gupta and Naganna Chetty

 

Offline Signature Verification with ANN using Shape Properties a Feasibility Report

 

Authors: K. Srivastava, Subhash Chandra and Sushila V. Maheshkar

 

Manual and Automation Analysis of Load Testing

 

Authors: Ritika

 

Encryption Techniques in Cloud Computing

 

Authors: Meena Kumari and Rajender Nath

 

E-Commerce: A Virtual Assistance Making Life Challenging Or Simpler

 

Authors: Ms. Shuchi Shukla and Ms. Prerna Singh

 

Improving GIS in Health Care

 

Authors: Kush Benara

 

Broadening the Scope of Rural Marketing by Internet Technology

 

Authors: Ms. Shraddha Singhal and Ms. Radhika Tomar

 

Big Data & Accounting Measurements

 

Authors: Mohammad Mehdi Nasrizar

 

Role & Significance of Information Technology in Enhancement of Business Management

 

Authors: Ms. Nalini K. Atkare, Ms. Priti S. Dharammali and Shrinivas Manekar