Authors:
Navil Akhtar, ShabinaGhafir and Saurabh Tripathi
A Review of Clone Detection in UML Models
Authors:
Balwinder Kaur, Er. Harpreet Kaur
Comparative Analysis of FP-Growth and CFPGrowth++
Authors:
Shikha Pathania, Chetna kaushal, Aashima Arya
Distributed Databases
Authors:
Manoj Kumar, Manju Kumari
Fuzzy logic
Authors:
Preeti, Manju
Integration of Data Mining in Cloud Computing
Authors:
Chetna Kaushal, Aashima Arya, Shikha Pathania
Secure interoperable identity in the cloud: Issues and Techniques
Authors:
Pankaj Deep Kaur, Tania Chaudhary
Bee Inspired Routing Protocol for WSN with Cross Layer Architecture
Authors:
Neeraj Kumar, Rajeev Mohan Sharma
Efficient Technique for Texture Features Based CAD System for Mammogram Images using GLCM and RBFNN (Breast Cancer Detection)
Authors:
Ritu Tomar, Dr. Indu Kashyap
Load Balancing in Software-defined Network (SDN) Based on Traffic Volume
Authors:
Smriti Bhandarkar, Kotla Amjath Khan
An Efficient Algorithm for Characters recognition of Printed Oriya Script
Authors:
Sneha Choudhary, Tushar Patnaik, Shweta Singh
An Energy Aware Cloud Load Balancing Technique using Dynamic Placement of Virtualized Resources
Authors:
Sumita Bose, Jitender Kumar
A Survey on Dynamic Load Balancing algorithms in Cloud Computing
Authors:
Surbhi Kapoor
THD Analysis of Cascaded H-Bridge With Level Shifted Multicarrier Modulation
Authors:
Tanuj Dabas, Ram Avtar
Multi Layered Securing of Health Records using Public and Private Model in Cloud
Authors:
Vijay J, Anitha C.L