Authors:
Tanya Arora1, Sanjeev Dhawan2 and Kulvinder Singh3
Survey and Analysis of Edge Based Steganographic Techniques
Authors:
Neha Singla1 and Khushil Saini2
An Android App for the use of Farmers in Agricultural Practices
Authors:
Rama Kanta Choudhury1, Shivani Shukla2, Geet Sawhney3 and Chandra Kanta Samal4
“Set Based Captcha”- Comparison with Text Based Captcha and Image Based Captcha
Authors:
Asha Pahuja1 and Vishal Srivastav2
Feature Extraction and Content Investigation of Facebook Users’ using Netviz and Gephi
Authors:
Ekta1, Sanjeev Dhawan2 and Kulvinder Singh3
Security Concern of Emergence Innovation Technology: A Cloud Computing
Authors:
Rekha Kalra1 and Narinder Singh2
Wired Versus Wireless: A Review
Authors:
Narinder Singh1 and Rekha Kalra2
Enhancement to Asymmetric Clustering
Authors:
Amneet Kaur1 and Sheetal Kalra2
The Reliable Knowledge Discovery in Textual Database using R Infrastructure
Authors:
Anu Yadav
The Study of Text Mining and Knowledge Extraction (TAKE) for Textual Database
Authors:
Anu Yadav
The Cyberstalking Cases in Cyber World using for Cybercrime & Computer Forensic Investigations
Authors:
Anu Yadav1 and Jatin Gemini2
Improved K-Means for Detection of Human users in Twitter
Authors:
Isha1, Sanjeev Dhawan2 and Kulvinder Singh3
A Survey: Spectral Clustering Enhancements & its ApplicationsA Survey: Spectral Clustering Enhancements & its Applications
Authors:
Lovepreet Kaur1 and Neena Madan2
Collaborative Filtering Recommendation System Based Upon User Reviews
Authors:
Monika1, Sanjeev Dhawan2 and Kulvinder Singh3
K-means: Its Various Enhancements and Integration with Classification Techniques in Healthcare Industry
Authors:
Sandeep Kaur1 and Sheetal Kalra2
Detection of User Identity in Social Networks
Authors:
Satinder1, Sanjeev Dhawan2 and Kulvinder Singh3
A Study of Cyber Threats in Social Media-Challenges & Remedies
Authors:
Vishnupriya Pandey
Wireless Sensor Network in Healthcare Application–A Survey
Authors:
Sukhdeep Singh1 and Bal Deepali2
Critical Analysis and Behavior Exploration of Social Network Data Analysis Tools
Authors:
Divya1, Sanjeev Dhawan2 and Kulvinder Singh3
Comparison of Routing Protocols Performance by Random Way Point Movement Model in ON
Authors:
Minakshi1 and Sona Malhotra2
Enhanced Offline Signature Verification Scheme Using Euclidean Distance for Feature Point Extraction
Authors:
Neelima Nausaliya1 Ajay Khuteta2
A Study of Cyber Threats in Social Media- Challenges & Remedies
Authors:
Vishnupriya Pandey
Optimization and Control of Medical Industry Resources using Internet of Things3
Authors:
Abhishek, Sachin Kumar, Pallavi Asthana and Sumita Mishra
Catfish PSO Based Enhancement for Digital Mammogram Images
Authors:
Murali K