Authors:
Aniket Kumar1, Akshit Kocher2 and Jyotika Pruthi3
Internet of Things in Healthcare
Authors:
Anisha Bhutani1, Ansha2 and Jyotika Pruthi3
Copy-Move Forgery Detection Using Stationary Wavelet Transform and SIFT
Authors:
Ritu Agarwal1 and B.N. Deepankan2
A Next Generation Technological Learning with Special Reference to Learning with Cloud Computing
Authors:
Goutam Bhatta
Comparative Analysis of Web Services and its Application in Distributed Environment
Authors:
Jyoti Prashar1 and Atul Garg2
Web Databases Using Pull or Push Technology–A Review
Authors:
Meet Singh Patheja1, Piyush Malviya2 and Dr. P.S. Patheja3
KNOWLEDGE ACQUISITION AFTER FORMALIZING WEBPAGES THROUGH KM FRAMEWORK
Authors:
Shri Rajesh Doss
Introduction to Carvaka theory of Communication Importance of Perception and Criticisms
Authors:
Dr. Ramani Swarna
Chaos based Key in Image Security for Digital World
Authors:
Pawan Kumar1, Ranjan Kumar Singh2 and Dr. D.K. Chauhan3
Computer Forensics for Handwriting Comparison in Court Cases
Authors:
Urvashi Sharma Mishra