CONTENTS

 

 

Detection of Attacks and Malicious Node in Wireless Sensor Networks

 

Authors: Priyanka1 and Harish Mittal2

 

To Study The Consumer Acceptance of E-banking

 

Authors: Seema Sharma1 and Harish Mittal2

 

Virtual DJ Mixing

 

Authors: Shilpa1 and Harish Mittal2

 

Sentiment Analysis of Online Movies’ Reviews Using Improved k-Nearest Neighbor Classifier

 

Authors: Tanya Arora1, Sanjeev Dhawan2 and Kulvinder Singh3

 

Survey and Analysis of Edge Based Steganographic Techniques

 

Authors: Neha Singla1 and Khushil Saini2

 

An Android App for the use of Farmers in Agricultural Practices

 

Authors: Rama Kanta Choudhury1, Shivani Shukla2, Geet Sawhney3 and Chandra Kanta Samal4

 

“Set Based Captcha”- Comparison with Text Based Captcha and Image Based Captcha

 

Authors: Asha Pahuja1 and Vishal Srivastav2

 

Feature Extraction and Content Investigation of Facebook Users’ using Netviz and Gephi

 

Authors: Ekta1, Sanjeev Dhawan2 and Kulvinder Singh3

 

Security Concern of Emergence Innovation Technology: A Cloud Computing

 

Authors: Rekha Kalra1 and Narinder Singh2

 

Wired Versus Wireless: A Review

 

Authors: Narinder Singh1 and Rekha Kalra2

 

Enhancement to Asymmetric Clustering

 

Authors: Amneet Kaur1 and Sheetal Kalra2

 

The Reliable Knowledge Discovery in Textual Database using R Infrastructure

 

Authors: Anu Yadav

 

The Study of Text Mining and Knowledge Extraction (TAKE) for Textual Database

 

Authors: Anu Yadav

 

The Cyberstalking Cases in Cyber World using for Cybercrime & Computer Forensic Investigations

 

Authors: Anu Yadav1 and Jatin Gemini2

 

Improved K-Means for Detection of Human users in Twitter

 

Authors: Isha1, Sanjeev Dhawan2 and Kulvinder Singh3

 

A Survey: Spectral Clustering Enhancements & its ApplicationsA Survey: Spectral Clustering Enhancements & its Applications

 

Authors: Lovepreet Kaur1 and Neena Madan2

 

Collaborative Filtering Recommendation System Based Upon User Reviews

 

Authors: Monika1, Sanjeev Dhawan2 and Kulvinder Singh3

 

K-means: Its Various Enhancements and Integration with Classification Techniques in Healthcare Industry

 

Authors: Sandeep Kaur1 and Sheetal Kalra2

 

Detection of User Identity in Social Networks

 

Authors: Satinder1, Sanjeev Dhawan2 and Kulvinder Singh3

 

A Study of Cyber Threats in Social Media-Challenges & Remedies

 

Authors: Vishnupriya Pandey

 

Wireless Sensor Network in Healthcare Application–A Survey

 

Authors: Sukhdeep Singh1 and Bal Deepali2

 

Critical Analysis and Behavior Exploration of Social Network Data Analysis Tools

 

Authors: Divya1, Sanjeev Dhawan2 and Kulvinder Singh3

 

Comparison of Routing Protocols Performance by Random Way Point Movement Model in ON

 

Authors: Minakshi1 and Sona Malhotra2

 

Enhanced Offline Signature Verification Scheme Using Euclidean Distance for Feature Point Extraction

 

Authors: Neelima Nausaliya1 Ajay Khuteta2

 

A Study of Cyber Threats in Social Media- Challenges & Remedies

 

Authors: Vishnupriya Pandey

 

Optimization and Control of Medical Industry Resources using Internet of Things3

 

Authors: Abhishek, Sachin Kumar, Pallavi Asthana and Sumita Mishra

 

Catfish PSO Based Enhancement for Digital Mammogram Images

 

Authors: Murali K