CONTENTS

 

 

Centralized Approach to obtain Mutual Exclusion in Multi Process Environment

 

Authors: Ashish Chauhan, Purvi Bansal, Swati Tyagi and Shobhit Saxena

 

Efficient Content Retrieval in E-Learning System using Semantic Web Ontology

 

Authors: B.K. Poornima, A. Kangaiammal and D. Deenadayalan

 

A Comprehensive Review on Recent Issues and Applications in VANETS

 

Authors: Sanjay Batish, Bhuvan Mehan, Rajesh Bhatia and Amardeep Dhiman

 

Data Hiding Method Using Steganography Technique

 

Authors: Heena Ahuja, Chitra Setia and Divya Sharma

 

Hand Gesture Recognition with Shape and Color for HCI

 

Authors: Deepali Kaushik and Ankur Bhardwaj

 

Big Data: Reforming a Research Techniques in Data Science

 

Authors: Jaspreet Kaur, Shiwani Aggarwal and Gurpreet Kaur

 

Performance Evaluation of Multimedia Transmission in MANETs for AODV nthBR Routing Protocol

 

Authors: Meena Rao and Neeta Singh

 

Implements Text Chat on Android Device using Bluetooth

 

Authors: Meenakshi and Inderjeet Yadav

 

A Framework for Software Requirement Elicitation and Prioritization

 

Authors: Mizbah Fatima and Mohd. Shahid Sagar

 

Interactive Study on Morphological Image Processing through LabVIEW

 

Authors: Shraddha Gangwar and Rishi Pal Chauhan

 

Quality Prevision For Knowledge Base through CQUAL

 

Authors: Aatif Jamshed, Samiksha Manglani, Sundaram Raghuvanshi and Trishla Jaiswal

 

An Optimal Focused Crawler

 

Authors: Tannu Priya, Prashant Singh and Raj Kumar Singh Rathore

 

Artificial Intelligence: Game Techniques Ludo - A Case Study

 

Authors: Veenus Chhabra and Kuldeep Tomar

 

Face Recognition using Eigenfaces based on Holistic Approach

 

Authors: Mohd Sufiya and Zaki Hasan Mehdi

 

An Investigation into the Factors Affecting the Adoption Intention of eLearning in India

 

Authors: Anoushka Sharma, Kapil Sharma, Shashank Kashyap and Vipul Maheshwari

 

Identifying Network Attack Strategies by Correlating Alerts

 

Authors: Arushi Jain

 

An Architectural Approach to Forestalling Code Injection Attacks

 

Authors: Ayushi Chaudhary and Gaurav Rajuara

 

Cracking and Hardening Hidden-SSID of Wireless Access Point

 

Authors: Neeraj Kumar Gupta, Mridul Kumar and Md. Zeeshan

 

Identifying E-mail Headers Suitable for Machine Learning based Spam Filtering

 

Authors: Nadia Nisar and Zaffar Kanth

 

Internet of Things: A Vision for Better Future

 

Authors: Siddhartha Agarwal