Authors:
Anshul Kushwaha, Antra Katiyar, Inderpreet Kaur and Ashish Kumar
A Reinforcement Learning Approach to E-Health
Authors:
Kumari Aishwarya, S. Harshitha and K. Chandrasekaran
Analysis of Routing Protocols in Wireless Sensor Networks
Authors:
Pramod Nath and Pragya Rajput
Data Mining in Crime Detection
Authors:
Rajkumar Bansal and Meghna Sharma
Adoption of Near Field Communication (NFC) Technology and Possible Security Challenges
Authors:
Satyakam Rahul
SHINE (Spacecraft Health Inference Engine) Expert System & its Applications
Authors:
Aman Kumar
Marker Based Augmented Reality
Authors:
Anuroop Katiyar, Karan Kalra and Chetan Garg
A New Approach towards Encryption Technique: D’s Crypto-Cipher Technique (DCCT)
Authors:
Darpan D Shah, Anamika Mittal and Kuntesh K Jani
Survey on Age Invariant Facial Recognition
Authors:
Aman Kumar, Aditya Vardhan Srivastava and Pavan Singh Yadav
RTXPS (Real Time Expert System) & its Applications
Authors:
Aman Kumar
Generation of Highly Nonlinear Boolean Function with Maximum Algebraic Degree
Authors:
Renu Rawal and Dheeraj Kumar Sharma
Big Data: An Introduction, Challenges & Analysis using Splunk
Authors:
Satyam Gupta and Rinkle Rani
Degraded Document Image Binarization
Authors:
Garima Chutani, Tushar Patnaik and Vimal Dwivedi
Improved Techniques for Secure Data Communication System
Authors:
Jyoti Gupta, Asiya Raza, Jasbeer Kaur and Garima Verma
Identification of Human Facial Expression using Gabor Filter with Minimum Features
Authors:
Mohd Shamsh Alam and Mohd Sadim
Offline Signature Verification Using Chain Code and Wavelet Feature
Authors:
Vimal Dwivedi, Tushar Patnaik and Garima Chutani
Analysis of Security Issues in Wired Equivalent Privacy (WEP)
Authors:
Ashish Garg and Rosy Verma
A Quantitative Study on Migration Path of Legacy Systems to Contemporary Systems
Authors:
Akoramurthy.B and Priyaradhikadevi.T
Mongo DB - NoSql Database: A Survey
Authors:
Anu Batra, Anjali Pahwa and Divya Sharma