Paper Title | Author | Action |
---|---|---|
Ubiquitous Computing: A Basket of Advantages | Vibhor Agarwal.Ishuita Sen Gupta | View |
An Image Hiding Algorithm Using DWT Skin Tone Detection and SHA-512 | Rekha Nagar | View |
Development of Software Reliability Growth Models Using Big Data Approaches | Savita Bamal | View |
Study of Particle Image Velocimetry Algorithm for fluid flow and its Implementation using Graphical Processing Unit (GPU) | Anshi Bansal, Ashok Kumar Shrivastava, Rajiv Jain | View |
Development of Flaw Detection Techniques in Non Destructive Testing using GPU | Atharv Bhaskar ,Shekhar Sharma, Rajiv Jain | View |
Lets Play the Game of Botnet | Deepti Aggarwal,,Vanshika Madan | View |
E-commerce And Network Security | Tirth jain, Jayant Grover | View |
Threat Intelligence: Let’s Make Internet Secure | Deepti Aggarwal, Shruti Gautam | View |
Role of Cloud Computing in Enhancing Education Services | Mamta Joshi | View |
SaaS Layer Framework for Cloud Based EHealth Services in Uttarakhand | Mukesh Joshi | View |
Development of Data Acquisition and Advanced Algorithm for Spectrometer for Laser Based Fluorescence Applications | Priyanka Indait, Hemant Kumar Soni, Rajiv Jain | View |
Steganography: Current Methods and Attacks | Manoj Kumar, Lucky Rajput | View |
Afsar ahmed, Ranjana Sharma | View | |
ANGULARJS | Rakesh Tripathi, Mihir Bansal | View |
SENTIMENT ANALYSIS OF TWITTER DATA | Neha Pandey, Surbhi Madan | View |
AN OVERVIEW OF ANDROID OPERATING SYSTEM AND ITS SECURITY FEATURES | Anuj Kumar, Nitin Kumar Verma | View |
SEVERAL ROUTING ALGORITHM ON NOC | Mohd.Aqil, Arpit Jain | View |
Review of various Handover Classification and Heterogeneous Wireless Network Architecture in VANET | Arohi Gupta, Danish Ather | View |
BRAINGATE: A Review | Ravi Kumar, Shikha Garg | View |
CLUSTERING TECHNIQUES IN DATA MINING | Mohd Javaid, Anu Sharma, Rolly Gupta | View |
Electronic Waste –Mangement System-Review Paper | Anjali Verma, Sambhu Bharadwaj | View |
ITWIN | Aman khan | View |
FINGER READER | Naymat Zareen, Ishuita Sen Gupta | View |
Green Computing "Great Computing" | Ana khan, Abhilash Kumar | View |
Wi-vi Technology-a Review | Gulshan kumar, Ishuita sen gupta | View |
A Comprehensive Study of Nokia Morph | Karan Kumar Jain, Amit Kumar Vishnoi | View |
Control Analysis on Security as Cyber Crime | Dr. Rajeev Kumar, Abhishek Kumar | View |
Intelligent Traffic Light System | Rashi Jain, Dr.Ashendra Kumar Saxena | View |
SEMANTIC WEB | Jitesh Sharma, Rupal Gupta | View |
Noticeable Key Points and Issues of Sensor Deployment for Large Area Wireless Sensor Network: A Survey | Mitika Chaudhary, Vinay Prakash | View |
Wireless Ad Hoc Network:Behaviour and Cooperation in MANET’s | Mohd Nazim, Dr. Danish Ather | View |
5G Mobile Technology | Nitin Sharma , Mohan Vishal Gupta | View |
Computer Network Generations | Diksha, Ajay Rastogi | View |
Data Mining Techniques for Social Network Sites | Nandini Shrivastav, Anu Sharma | View |
Big data Analytics:State of Arts Iot & cloud computing | Piyush Jain, Manish Joshi | View |
Big data Analytics: State of Arts IOT & cloud Computing | Piyush Jain, Manish Joshi | View |
Study on Google„s Loon Project | Saif Ali, Prabhat Chandra Gupta | View |
SMART FABRIC: A REVIEW | Alka Sheershwal, Vinay Prakash | View |
RESEARCH ON CODE RED VIRUS | Vivek Kumar, Surbhi Madan | View |
A Survey on Resource Allocation Algorithms in Cloud Environment | Ayesha Rani, Mahendra Singh Sagar | View |
GOOGLE PROJECT TANGO | Dharmesh Chauhan, Namrata Kashyap | View |
An Analysis of Vehicular Ad-Hoc Network: Perspectives, Challenges and Applications | Maryam Tahira, Danish Ather | View |
An Analytical Study of Network Security Threats Through IP Spoofing | Deeksha Vashishth | View |
Focused Web Crawler for learning contents | Rajat Kumar Sharma, Deepak Kumar | View |
SEMANTIC WEB A: Future Web | Gagan Jain, Rupal Gupta | View |
Classification of Map Reduce | Neetu Chhabra, Manish Joshi | View |
Digital Jewellery: A Review | Sakshi Gupta, Neeraj Kumari | View |
DENIAL OF SERVICE ATTACK (DOS ATTACK) | Kamini, Deepak Kumar | View |
Android OS: A Review | Yogesh Chauhan, Shikha Garg | View |
Cloud Computing: Security Issues | Swati Vishnoi, Akanksha Jain | View |
TOUCH LESS TOUCH SCREEN | Deepanshu Saxena, Anu Sharma | View |
A Survey of Fog Computing: Applications | Mohit Jain, Lucky Rajput | View |
A Review of Hard Classification and Soft Classification Approaches in Remote Sensing Data | Ritika Negi, Ranjana Sharma | View |
Wireless Technology in Networks | Sobhit Kumar, Rohan Manoj Kaushik | View |
Electronic Waste–Problems and Solutions | Sakshi Jain, Dr. Ambuj Kumar Agarwal | View |
Comparative Analysis for Ensuring Distributed Accountability of Data Sharing in Cloud | Vineet Saxena, Simran Ali | View |
Sky X Technology | Suman Kumari, Ashendra Kumar Saxena | View |
An Insight into Supervised Machine Learning: Review of Classifiers and Performance Metrics for Classifiers | Salvi Jain, Deepika Singh Pantola | View |
Sentimental Based Analysis and Classification in Instagram | Lokesh kumar, Rolly Gupta | View |
Use of Python in Research | Prashant Kumar, Dr Ashendra Kumar Saxena | View |
A Traditional Searching Technique through Web Clustering | Mohd. Javed, Sachin Singh | View |
Wireless Sensor Network Security Issues | Anshu Sagar, Namrata Kashyap | View |
Research on Technology Used in Wireless Sensor Networks | Ratnesh Yadav, Namit Gupta | View |
Wireless Sensor Network-Coverage Placement and Topology Management | Dheeraj Kumar, Dr Danish Ather | View |
A Review of Data Security in Cloud Computing | Pramod Vishwakarma, Dr. Rajeev Kumar | View |
An Ant Colony System: Algorithm for Multi-Robot Path Planning and Optimization | Savita Yadav, Deependra Rastogi | View |
A study on Handovers in Mobile Technology for Next Generation Wireless Networks | Dr. Danish Ather, Abdullah Saud | View |
Optimal Overlapping and Coverage Hole by Mobile Sensor Nodes | Ayushi Mathur, Prabhat Chandra Gupta | View |
CELL PHONE JAMMER | Mohd Fahad, Namit Gupta | View |
Data Warehousing System – Advanced Hive Interface | Ataur Rahman, Ambuj Agarwal | View |
The Study of E-Commerce Security Issues and Solutions | Dhurub Saxena, Priyank Singhal | View |
E-GOVERNANCE IN RURAL INDIA: NEED OF ICT | Shubham Chauhan, Priyank Singhal | View |
Green Computing | Ana khan, Abhilash Kumar | View |
HAPTIC Technology in Surgical Simulation and Medical Training | Varsha Kalakoti, Swati Vishnoi | View |
LIFI TECHNOLOGY | Shubham Bhandari, Randeep Kumar Sahu | View |
ANDROID | Mayur Siddique, Prabhas Chandra Gupta | View |
Cyber Crime on Social Media | Nandini Bhardwaj, Surbhi Maidan | View |
Big data Analytics: State of Arts Iot & cloud computing | Piyush Jain, Manish Joshi | View |
Principles of Remote Sensing | Navdeep Tyagi, Sachin Singh | View |
Mobile phone Jammer | Shikha Garg, Akanksha Choudhary | View |
Biometric Fingerprint and Security | Aakansha Singh, Randeep Kumar Sahu | View |
PACKET SNIFFER | Shobhit Kumar, Raghvi Bhatnagar | View |
A Survey: Load Balancing in Cloud Environment | Sukrati Jain, Dr. Ashendra k Saxena | View |
Biometric Authentication System & its Future Trends | Aditi Gupta, Abhilash Kumar | View |
Cloud Computing: Security Issues | Swati vishnoi, Akanksha Jain | View |
E-commerce: Opportunities and Challenges | Shivansh Jaggi, Deepika Gupta, Namit Gupta | View |
A Comparative Analysis on IP Spoofing Detection & Prevention on Route Based Information | Parul | View |
A Review on Daily Life Uses of GSM Technology | Akshad Kumar, Deepika Singh Pantola | View |
Bots: An alternative for Mobile Apps | Ashish Bishnoi | View |
Evolution and Recent Trends in Smart Home Technology | Bunty Singh, Ishuita Sen Guypta | View |
Cloud Computing Security Issues, Challenges and Solution: A Review | Sulender, Neeraj Chauhan | View |
Cyber Risks: Challenges to Insurance Sector- Literature Review | Navneet Singh, Shobhit Kumar | View |
Digital India: Challenges & Opportunities | Himanshu Tyagi | View |
Review Paper on Digital Marketing | Ayush Jain, Navneet Vishnoi | View |
Face Recognition Technique | Karshnik Singh, Navneet Vishnoi | View |
Green Data Centre | Isha Mehra, Namit Gupta | View |
Data Sharing in Cloud Computing | Himachal Yadav | View |
HOMER-Agent oriented Requirement Engineering | Muskan Seth, Shambhu Bharadwaj | View |
Data Storage Security in Cloud Computing | Priyansh Jauhari | View |
Research on Technology Used in GPS VEHICLE SYSTEM | Harshit Tyagi , Namit Gupta | View |
Femtocell Technology | Injila Mariam , Prof. Rakesh Dewedi | View |
Key logger: A malicious attack | Anoop Kumar , Mr. Abhilash Saxena | View |
Meta-cognitive Neural Network-A Literature Review | Akshay Kumar Siddhu , Neeraj Kumari | View |
Wireless USB | Niharika | View |
Survey on the existing practices in Pattern Recognition. | Appoorva Bansal , Prof.R.K. Dwiedi | View |
An Overview of SMARTCITY Model Using IOT | Princi Jain, Mr.Ashendra Kumar Saxena | View |
E-LEARNING STYLE ANDPEDAGOGY IN TEACHING | NITIN KUMAR , VINAY PRAKASH | View |
Digital Payment :A Case Study Using In Paytm | Kaushindra Kumar ,Priyank Singhal | View |
Conficker Virus | Alok Kashyap , Ajay Rastogi | View |
PACKET SNIFFER | Mr. Shobhit Kumar (Assistant Professor), Raghvi Bhatnagar | View |
BIG DATA AND HADOOP | Raj kumar , Ajay rastogi | View |
Web Outology : In Semantic Web | Mohd Ajam, Abhilash Saxena | View |
Text Mining: Techniques and Applications - Literature Review | Monika chauhan , sachin singh | View |
Overview On Test Case Design Technique For Black Box Testing | Kanika Agarwal, Mr. Ashendra Saxena | View |
A Review on Data Clustering Techniques | Shivam Panday | View |
Security Challenges and Issues in Vehicular Ad-Hoc Network (VANET): A Review | Chirag Saxena , Danish Ather | View |
Security in mobile cloud computing: A new approach | Manisha Sagar , Rolly Gupta | View |
An overview Of “CODE DIVISION MULTIPLE ACCESS” model | Sonakshi sagar , Mrs deepika singh | View |
Wireless Sensor Networks and Its Security | Gaurav Rajput , Mohan Vishal Gupta | View |
A Comparative study between Android & IOS | Namanshu sankhyadhar, Ms. Shikha Garg | View |
Microsoft HoloLens | Teena Sharma , Amit Kumar Vishnoi | View |
COMPARATIVE STUDY OF IMAGE SEGMENTATION TECHNIQUE | Vanshika Bhatnagar ,Mr. Deepak Kumar | View |
Wireless USB | Disha Saini, Mihir Bansal | View |
Advance techniques of developing digital signature | Mr.Namit Gupta, Anjali Pushpakar, Akanksha Goel | View |
Electronic Waste –Problems and Solutions | Sakshi jain , Dr. Ambuj Kumar Agarwal | View |
A Review on Internet of Things | Jasmeet Kaur | View |
Overview of Natural Language Processing | Deeksha Dwivedi , Mahendra Singh Sagar | View |
Analysis And Research of System Security Based On Android | Binit Kumar Agarwal, Akshay Jain | View |
BIOMETRIC FINGERPRINT AND SECURITY | Aakansha Singh , Randeep Kumar Sahu | View |
A Comparative Analysis on IP Spoofing Detection & Prevention on Route Based Information | Parul | View |
GOOGLE PROJECT TANGO | Dharmesh Chauhan , Miss Namrata Kashyap | View |
Basics of IOT | Vishal Kumar Tiwari , R.K Dewedi | View |
Wireless Network | Tarun Bharti, Abhilash Kumar | View |
DENIAL OF SERVICE ATTACK (DOS ATTACK) | Kamini | View |
MOBILE AD-HOC NETWORK: A REVIEW | SHIVAM SHARMA | View |
IMPACT OF SECURITY ISSUES IN E-GOVERNANCE OF DIGITAL INDIA A-REVIEW | PRATIKSHA KAUSHIK , DR RAJEEV KUMAR ,NAMIT GUPTA | View |
Java Smart Card | Nadim Khan , Mr. Mihir Bansal | View |
Pattern Discovery Techniques in Web Mining: A Review | Anirudh Chauhan , Neeraj Chauhan | View |