1 |
Fuzzy driven approach for spam filter to avoid unregistered calls |
|
Rishi Kant Shukla ,Dr. Savita Shiwani |
2 |
Cyber crime Escalation Vs solutions: a Literature Snapshot
|
|
Dr. Raksha Chouhan |
3 |
PROTOTYPING AN Cloud Computing: Analysis of Cloud Storage In Robotic Environment |
|
Tushar Gupta,Sunil Yadav |
4 |
Generate E-Services using cloud Storage as a Service
|
|
Anshuman Gautam, Richa Chauhan, Ashok Kumar |
5 |
Impact of agile testing over traditional testing |
|
Pratibha Singh, Puja Patel |
6 |
A Classification Of Various Indian Script Recognition: A Survey
|
|
Divyang Vijayvergiya ,Akhilesh Pandey |
7 |
A Value Creation Approach towards cyber safety mechanism: Analysis and Evaluation |
|
Raksha Chouhan |
8 |
A classification Of Multi Script Numerals Using Intelligent Agent. |
|
Rakshak Porwal, Akhilesh Pandey |
9 |
SMAC in IT-BPO
|
|
Shreya Rani |
10 |
ISSUES IN DEPLOYING IPv6 |
|
Roshan Koshy |
11 |
Comparative Study of Various Clustering Techniques in Data Mining
|
|
Sakshi Chaudhary, Ms. Nidhi Gupta |
12 |
Agile Adoption in Tech Startups Our Findings
|
|
Sagar Jain |
13 |
A Study of Handwritten Numerals for Profile Based Classification
|
|
Govindan |
14 |
Spatio-Temporal Filtering for Images and Videos
|
|
Swati Sharma |
15 |
Improvisation of Ad-hoc On Demand Distance Vector (AODV) routing protocol using SUMO on OMNeT++
|
|
Aniruddh Pandey, Sapan Gupta |