Abstract is missing.
- A Face Detection Using Support Vector Machine: Challenging Issues, Recent Trend, Solutions and Proposed FrameworkSuraj Makkar, Lavanya Sharma. 3-12 [doi]
- Empirical Study of Test Driven Development with ScrumVikas Aggarwal, Anjali Singhal. 13-21 [doi]
- Microprocessor Based Edge Computing for an Internet of Things (IoT) Enabled Distributed Motion ControlWasim Ghder Soliman, D. V. Rama Koti Reddy. 22-31 [doi]
- Cyber Threat Analysis of Consumer DevicesHemant Gupta, Mayank Singh 0008. 32-45 [doi]
- Recognition of Hand Gestures and Conversion of Voice for Betterment of Deaf and Mute PeopleShubham Kr. Mishra, Sheona Sinha, Sourabh Sinha, Saurabh Bilgaiyan. 46-57 [doi]
- General Outlook of Wireless Body Area Sensor NetworksSharmila A, Dhananjay Kumar, KumKum Som, Pramod Kumar, Krista Chaudhary. 58-67 [doi]
- Hybrid Fuzzy C-Means Using Bat Optimization and Maxi-Min Distance ClassifierRahul Kumar, Rajesh Dwivedi, Ebenezer Jangam. 68-79 [doi]
- Network Motifs: A SurveyDeepali Jain, Ripon Patgiri. 80-91 [doi]
- Multiple Image Watermarking for Efficient Storage and Transmission of Medical ImagesRakhshan Anjum, Priyanka Verma, Sunanda Verma. 92-102 [doi]
- Empirical Analysis of Defects in Handheld Device ApplicationsMamta Pandey, Ratnesh Litoriya, Prateek Pandey. 103-113 [doi]
- Lexical Text Simplification Using WordNetDebabrata Swain, Mrunmayee Tambe, Preeti Ballal, Vishal Dolase, Kajol Agrawal, Yogesh Rajmane. 114-122 [doi]
- Analysis and Impact of Trust and Recommendation in Social Network Based Algorithm for Delay Tolerant NetworkAbhilasha Rangra, Vivek Kumar Sehgal, Shailendra Shukla. 123-133 [doi]
- Formation of Hierarchies in the System of Organization of State Construction Supervision in Case of Reorientation of Urban AreasDmitriy Topchiy, Andrey Tokarskiy. 134-143 [doi]
- Customized Visualization of Email Using Sentimental and Impact Analysis in RV. Roopa, K. Induja. 144-154 [doi]
- Role of Lexical and Syntactic Fixedness in Acquisition of Hindi MWEsRakhi Joon, Archana Singhal. 155-163 [doi]
- Five Input Multilayer Full Adder by QCA DesignerD. Naveen Sai, G. Surya Kranth, Damarla Paradhasaradhi, R. S. Ernest Ravindran, M. Lakshmana Kumar, K. Mariya Priyadarshini. 164-174 [doi]
- Effect of Vaccination in the Computer Network for Distributed Attacks - A Dynamic ModelYerra Shankar Rao, Hemraj Saini, Geetanjali Rathee, Tarini Charan Panda. 175-184 [doi]
- Ransomware Analysis Using Reverse EngineeringS. Naveen, T. Gireesh Kumar. 185-194 [doi]
- Semantic Textual Similarity and Factorization Machine Model for Retrieval of Question-AnsweringNivid Limbasiya, Prateek Agrawal. 195-206 [doi]
- Krisha: An Interactive Mobile Application for Autism ChildrenAmrita S. Tulshan, Nataasha Raul. 207-218 [doi]
- Advanced Spatial Reutilization for Finding Ideal Path in Wireless Sensor NetworksA. Basi Reddy, P. Liyaz, B. Surendra Reddy, K. Manoj Kumar, K. Sathish. 219-227 [doi]
- An Efficient Preprocessing Step for Retinal Vessel Segmentation via Optic Nerve Head ExclusionFarha Fatina Wahid, Raju G.. 228-239 [doi]
- An Upper Bound for Sorting R_n with LESai Satwik Kuppili, Bhadrachalam Chitturi, T. Srinath. 240-249 [doi]
- Image Filtering with Iterative Wavelet Transform Based CompressionVikas Mahor, Srishti Agrawal, Rekha Gupta. 250-262 [doi]
- Multiresolution Satellite Fusion Method for INSAT ImagesB. Bharathidasan, G. Thirugnanam. 263-271 [doi]
- A Combinatorial Fair Economical Double Auction Resource Allocation ModelRitu Singhal, Archana Singhal. 272-281 [doi]
- Issues in Training a Convolutional Neural Network Model for Image ClassificationSoumya Joshi, Dhirendra Kumar Verma, Gaurav Saxena, Amit Paraye. 282-293 [doi]
- An Approach to Find Proper Execution Parameters of n-Gram Encoding Method Based on Protein Sequence ClassificationSuprativ Saha, Tanmay Bhattacharya. 294-303 [doi]
- Hyperglycemia Prediction Using Machine Learning: A Probabilistic ApproachVishwas Agrawal, Pushpa Singh, Sweta Sneha. 304-312 [doi]
- Text Caption Generation Based on Lip Movement of Speaker in Video Using Neural NetworkDipti Pawade, Avani Sakhapara, Chaitya Shah, Jigar Wala, Ankitmani Tripathi, Bhavikk Shah. 313-322 [doi]
- Legendre Wavelet Quasilinearization Method for Nonlinear Klein-Gordon Equation with Initial ConditionsKotapally Harish Kumar. 323-332 [doi]
- Runtime Verification and Vulnerability Testing of Smart ContractsMisha Abraham, K. P. Jevitha. 333-342 [doi]
- A Smart Embedded System Model for the AC Automation with Temperature PredictionF. M. Javed Mehedi Shamrat, Shaikh Muhammad Allayear, Md. Farhad Alam, Md. Ismail Jabiullah, Md. Razu Ahmed. 343-355 [doi]
- Rough-Set Based Hotspot Detection in Spatial DataMohd Shamsh Tabarej, Sonajharia Minz. 356-368 [doi]
- DDoS Attack Detection and Clustering of Attacked and Non-attacked VMs Using SOM in Cloud NetworkNitesh Bharot, Veenadhari Suraparaju, Sanjeev Gupta. 369-378 [doi]
- An Efficient Knowledge-Based Text Pre-processing Approach for Twitter and Google+Tripti Agrawal, Archana Singhal. 379-389 [doi]
- Drought Prediction and River Network Optimization in Maharashtra RegionSakshi Subedi, Krutika Pasalkar, Girisha Navani, Saili Kadam, Priya Raghavan Nair Lalitha. 390-398 [doi]
- Classifying Question Papers with Bloom's Taxonomy Using Machine Learning TechniquesMinni Jain, Rohit Beniwal, Aheli Ghosh, Tanish Grover, Utkarsh Tyagi. 399-408 [doi]
- Polynomial Topic Distribution with Topic Modeling for Generic LabelingSyeda Sumbul Hossain, Md. Rezwan Ul-Hassan, Shadikur Rahman. 409-419 [doi]
- Comparative Performance of Machine Learning Algorithms for Fake News DetectionArvinder Pal Singh Bali, Mexson Fernandes, Sourabh Choubey, Mahima Goel. 420-430 [doi]
- Pedestrian Intention Detection Using Faster RCNN and SSDDebapriyo Roy Chowdhury, Priya Garg, Vidya N. More. 431-439 [doi]
- Implementation of Smart Legal Assistance System in Accordance with the Indian Penal Code Using Similarity MeasuresDipti Pawade, Avani Sakhapara, Hussain Ratlamwala, Siddharth Mishra, Samreen Shaikh, Dhrumil Mehta. 440-449 [doi]
- A Review on Facial Expression Based Behavioral Analysis Using Computational Technique for Autistic Disorder PatientsCamellia Ray, Hrudaya Kumar Tripathy, Sushruta Mishra. 450-464 [doi]
- Smart Learning System Based on EEG SignalsAaditya Sharma, Swadha Gupta, Sawinder Kaur, Parteek Kumar. 465-476 [doi]
- Optical Character and Font RecognizerManan Rajdev, Diksha Sahay, Shambhavi Khare, Sumita Nainan. 477-486 [doi]
- Association Rule Mining for Customer Segmentation in the SMEs Sector Using the Apriori AlgorithmJesús Silva, Mercedes Gaitán-Angulo, Danelys Cabrera, Sadhana J. Kamatkar, Hugo Martínez Caraballo, Jairo Martínez Ventura, John Anderson Virviescas Peña, Juan de la Hoz Hernández. 487-497 [doi]
- Recommendation of an Integrated Index for the Quality of Educational Services Using Multivariate StatisticsOmar Bonerge Pineda Lezama, Rafael Luciano Gómez Dorta, Noel Varela Izquierdo, Jesús Silva, Sadhana J. Kamatkar. 498-508 [doi]
- Windows Based Interactive Application to Replicate Artworks in Virtual EnvironmentApurba Ghosh, Anindya Ghosh, Jia Uddin. 509-518 [doi]
- Enhanced Bag-of-Features Method Using Grey Wolf Optimization for Automated Face RetrievalArun Kumar Shukla, Suvendu Kanungo. 519-528 [doi]
- A Context-Aware Approach to Enhance Service Utility for Location Privacy in Internet of ThingsShivangi Shukla, Sankita J. Patel. 529-542 [doi]
- Cyberbullying Detection in Hindi-English Code-Mixed Language Using Sentiment ClassificationShrikant Tarwani, Manan Jethanandani, vibhor kant. 543-551 [doi]
- Effective Predictive Analytics and Modeling Based on Historical DataSheikh Mohammad Idrees, M. Afshar Alam, Parul Agarwal, Lubna Ansari. 552-564 [doi]
- Efficient Ballot Casting in Ranked Based Voting System Using Homomorphic EncryptionBhumika Patel, Purvi Tandel, Slesha Sanghvi. 565-576 [doi]
- Topic Modelling with Fuzzy Document RepresentationNadeem Akhtar, M. M. Sufyan Beg, Hira Javed. 577-587 [doi]
- Security Validation of Cloud Based StorageShruti Jaiswal, Daya Gupta. 588-596 [doi]
- A Literature Survey on Eye Corner Detection Techniques in Real-Life ScenariosM. Zefree Lazarus, Supratim Gupta, Nidhi Panda. 597-608 [doi]
- Prediction Studies of Landslides in the Mangan and Singtam Areas Triggered by 2011 Sikkim EarthquakeAadityan Sridharan, Sundararaman Gopalan. 609-617 [doi]
- Quantitative Analysis of Feature Extraction Techniques for Isolated Word RecognitionChesta Agarwal, Pinaki Chakraborty, Serena Barai, Vaibhav Goyal. 618-627 [doi]
- Mathematical Analysis of Image Information Retained in the Complex Domain Phases Under Additive and Multiplicative NoiseSusant Kumar Panigrahi, Supratim Gupta. 628-642 [doi]
- Comparative Study of Segmentation Techniques Used for Optic Disc SegmentationShivesh Madhawa Shukla, Amit Kaul, Ravinder Nath. 643-654 [doi]
- Next Generation Noise and Affine Invariant Video Watermarking Scheme Using Harris Feature ExtractionHimanshu Agarwal, Farooq Husain, Praveen Saini. 655-665 [doi]
- Presentation Abstraction Control Architecture Pattern in Business IntelligenceAksha Iyer, Sara Bali, Ishita Kumar, Prathamesh P. Churi, Kamal Mistry. 666-679 [doi]
- Discriminative Gait Features Based on Signal Properties of Silhouette CentroidsK. Sugandhi, Raju G.. 680-688 [doi]
- An Algorithm for Prediction of Web User Navigation Pattern and Restructuring of Web Structure Based on Visitor's Web Access PatternDeepak Mangal, Saurabh Singhal, Dilip Sharma. 689-700 [doi]
- Computational Representation of Paninian Rules of Sanskrit Grammar for Dictionary-Independent Machine TranslationVishvajit Bakarola, Jitendra Nasriwala. 701-710 [doi]
- QoS Based Resource Provisioning in Cloud Computing Environment: A Technical SurveyShefali Varshney, Rajinder Sandhu, P. K. Gupta 0001. 711-723 [doi]
- Optimizing Smart Parking System by Using Fog ComputingRigha Tandon, P. K. Gupta 0001. 724-737 [doi]
- Formal-Verification of Smart-Contract Languages: A SurveyVimal Kumar Dwivedi, Vipin Deval, Abhishek Dixit, Alex Norta. 738-747 [doi]