Authors:
Deepak Tuteja, Dhruv Jain, Drishty Kapoor and Divya Sharma
Advanced SOS App in Smartphone
Authors:
G. Shri Krishna and M.P. Lokesh
A Survey of Security Protocols on VoIP
Authors:
Deepak Tuteja, Dhruv Jain, Diksha Goyal and Divya Sharma
Selecting Best Leader on the Basis of Leadership Score using Decision Theory
Authors:
Nandish Shah, Ishani Shah and Shaina Thakkar
A Study on Tools and Techniques used for Network Forensic in a Cloud Environment: an Investigation Perspective
Authors:
J. Rajeshwar Rao, Shweta Jain and Siby Samuel
Detailed Survey on Motion Sensing
Authors:
Deepak Tuteja, Dhruv Jain, Hemant Singla and Divya Sharma
A New Android Based Steganography Application for Smartphone’s
Authors:
Jibi G Thanikkal, Mohammad Danish and Saoud Sarwar
An Expert System for Site Selection of Thermal Power Plants
Authors:
K. Sambasivarao, D. Kavin Raj and Deepika Dua
Corporate Social Responsibilty as Tool of Strategic Advestising in Telecommunication Companies of Rwanda
Authors:
Mudaheranwa Benjamin , Vincent Konadu Tawiah and Maniriho Emmy Arsonval
Enactment of AR Based Mobile App in our University
Authors:
Nitish Kumar Sharma, Rohit Kumar Pal, Prakhar Saxena and Prabha Nair
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Authors:
Prashant Singh and P.N. Barwal
Migration of Windows Intranet domain to Linux Domain Moving Linux to a Wider World
Authors:
Prema S, Ethirajan D and Senthil Kumar B
Natural Calamity Predictor using Ultrawideb and Communication Technology
Authors:
Rahul Chowdhury, Sudipta Das Barman and Pranta Banik
Gray Box Testing: Proactive Methodology for the Future Design of Test Cases to Reduce Overall System Cost
Authors:
Ruhi Saxena and Monika Singh
Effective Fuzzy Based Clustering in Complex Database
Authors:
S.R. Kannan, R. Devi and S. Ramathilagam
Benefits of Giving Infrastructure to the Vendors
Authors:
Sambhav Dubey and Mohd. Suhail Ansari
Redefining the Learning Paradigm – An Analytical Study on Impact of Globalization on Educational Technology
Authors:
Sanchita C. Banerji and T. Shanthi
Real-time Auto Controllable Traffic Management System
Authors:
Sonali Sharma, Ajitesh Kumar and Randheer Kumar Singh
Contemplation of Thresholding in Wavelet Denoising
Authors:
Tanaya Gupta and Parul Kalra Bhatia
Fuzzy C-Means in Finding Available Structure
Authors:
R. Devi, S.R. Kannan and S. Ramathilagam
Approaches for Data Storage Security in Cloud Computing
Authors:
Md Waseem Akram
Survey on Best Cloud Computing Service Provider
Authors:
Dhruv Basnotra and Geetanshu Ahuja
Advanced End-to-End Linux Security for Desktop and Production Systems
Authors:
Ethirajan D, Prema S and Ramesh R
Bluetooth Based Remote Monitoring & Control System
Authors:
Mohammed Juned and Srija Unnikrishnan