CONTENTS

 

 

An Elaborative Survey on Recommendation Techniques

 

Authors: Sangeeta and Neelam Duhan

 

Tool Chain Options for Hybrid Mobile App Development

 

Authors: Saurabh Kumar Singh

 

Comparative Study of Work Done in License Plate Recognition

 

Authors: Shikha Mishra and Rashmi Ranjan

 

Document Layout Analysis for Hindi Newspapers

 

Authors: Shweta Singh, Tushar Patnaik and Sneha Choudhary

 

Result Paper on–“Designing Security Method for Cloud Environment using Attribute Based Signature

 

Authors: Yogita R. Sunwani and Amit Welekar

 

Era of Big Data: Features and Challenges

 

Authors: Aman Gupta and Ajay Indian

 

Process Migration in Cloud Computing

 

Authors: Pankajdeep Kaur and Anita Rani

 

Analysis of Mobile ad-hoc Network(MANETs) Routing Protocol

 

Authors: Asma Khatoon and Rupak Kumar

 

Integration of Agora into Analytic Hierarchy Process

 

Authors: Farha Ashfaque, Yusra and Rupak Kumar

 

Elicitation of Preference Matrix and Contribution Values in Goal Models using Fuzzy Based Approach

 

Authors: Farha Ashfaque and Rupak Kumar

 

Feasibility Study of Enhancement of Mobile Spectrums (with Special Reference to 2G, 3G, 4G and Proposed 5G)

 

Authors: Shrey Kumar and Gurendra Nath Bhardwaj

 

Design of A Novel Ranking Technique for Hidden Web Pages

 

Authors: Jyoti Yadav and Manvi

 

Pulse Walk off Effect on Stimulated Raman Scattering

 

Authors: Kamini Kumari and Hardeep Singh

 

Multimedia uses for a Modern Library

 

Authors: Krishan Kant Yadav and Anamika Shrivastava

 

Search Box: File Sharing and File Access System

 

Authors: Lisha Singh, Yogesh Bhardwaj and Puneet Kumar

 

Performance Comparison of Machine Learning based Spam Filtering

 

Authors: Nadia Nisar

 

Query Planning for Dynamic Queries using Data Aggregators

 

Authors: Nadia Nisar

 

Cost Optimization in Cloud Computing Environment

 

Authors: Niharika and Jitender Kumar

 

An Algorithm for Detection of Forged Images

 

Authors: Nilofar Zafar Siddiqui and Manisha Dawra

 

An Evaluation of Image Forgery Detection Methods using JPEG Compression Properties

 

Authors: Nilofar Zafar Siddiqui and Manisha Dawra

 

Classifiers to Identify Normality/Abnormality on MRI Images based on CBIR

 

Authors: Rashmi Prakash Yadav and Tushar Patnaik

 

Novel Indexing Technique for Hidden Web Pages using Semantic Analysis

 

Authors: Seema Rani and Sonali Gupta

 

Detection and Tracking of Multiple Moving Objects for Surveillance and Security System

 

Authors: Shraddha Singh and Tushar Patnaik

 

Single Link Failure in Mesh Network

 

Authors: Shweta Gupta, Prachi Mohan Kulsheshthra and Nalini Singh