Abstract is missing.
- Global Software Development: A Design Framework to Measure the Risk of the Global PractitionersChamundeswari Arumugam, Sriraghav Kameswaran, Baskaran Kaliamourthy. 1-8 [doi]
- A Discourse Linking Tool for English Language Texts comprising Lexicon building and Ontology CreationAnuja Bawaskar, Kasturi Adep, Adarsh Jaju, Yashodhara Haribhakta, Krishnanjan Bhattacharjee, Swati Mehta, Ajai Kumar. 9-14 [doi]
- Three-Dimensional SVPWM using α-β-γ Frame for Solving 4-leg Active Shunt FilterArup Ratan Bhowmik, Bhaskar Bhattacharya, Ajoy Kumar Chakraborty. 15-21 [doi]
- Travel Recommendation System Using Geotagged PhotosAkanksha Kumari, Ashish Kumar Singh, Nagamma Patil. 22-26 [doi]
- HDML: Habit Detection with Machine LearningHarman Singh, Neeti Dhanak, Haroon Ansari, Krishan Kumar 0003. 29-33 [doi]
- Calculus of Concurrent Probabilistic Reversible ProcessesArpit, Divya Kumar. 34-40 [doi]
- Flip Error Elimination and Core Map Selection in Patch and Stitch Algorithms for Localization in Wireless Sensor NetworkJyoti Kashniyal, Shekhar Verma, Krishna Pratap Singh. 41-46 [doi]
- Comparative Study for Proposed Algorithm for All-Optical Network with Negative Acknowledgement (AO-NACK)Pronaya Bhattacharya, Arunendra Singh, Akhilesh Kumar, Amod Kumar Tiwari, Rajiv Srivastava. 47-51 [doi]
- A Load Balancing Cross Clustering Approach in Wireless Sensor NetworkKetki Pitke, Prabhat Kumar 0001, Sunil Kumar Singh. 52-57 [doi]
- Component-based Self-Healing Algorithm with Dynamic Range Allocation for Fault-Tolerance in WSNBeneyaz A. Begum, Satyanarayana V. Nandury. 58-65 [doi]
- Optimal Sub-Path Selection for Maximum Data Gathering Using Mobile Sink in WSNNaween Kumar, Dinesh Dash, Prabhat Kumar. 66-71 [doi]
- An Improved Tour Length Minimization for Single Hop Data Gathering in Wireless Sensor NetworkPrabhat Kumar, Dinesh Dash, Naween Kumar. 72-77 [doi]
- Copy-Move Tampering Detection based on Local Binary Pattern Histogram Fourier FeatureBadal Soni, Pradip K. Das, Dalton Meitei Thounaojam. 78-83 [doi]
- A Handheld Gun Detection using Faster R-CNN Deep LearningGyanendra K. Verma, Anamika Dhillon. 84-88 [doi]
- Secure Group Communication in Wireless Network Using Bilinear PairingRamakant Kumar, Kakali Chatterjee, Ashish Singh. 89-94 [doi]
- An Automated Approach for Volume Fraction Measurement of Titanium Alloy using Digital Image ProcessingSiddhartha Banerjee, Subhas Bhunia, Pravash Chandra Chakraborti, Sanjoy Kumar Saha 0001. 95-99 [doi]
- D-CAD: Deep and Crowded Anomaly DetectionKrishan Kumar 0003, Anurag Kumar, Ayush Bahuguna. 100-105 [doi]
- A-PNR: Automatic Plate Number RecognitionShikhar Sharma, Piyush Kumar, Krishan Kumar 0003. 106-110 [doi]
- Recognition of Bird Species from their Sounds using Data Reduction TechniquesArti V. Bang, Priti P. Rege. 111-116 [doi]
- Designing an efficient methodology based on Entropy-TOPSIS for evaluating efficiency of cloud servicesRakesh Ranjan Kumar, Chiranjeev Kumar. 117-122 [doi]
- Generation and Proliferation of Random Directed Acyclic Graphs for Workflow Scheduling ProblemIndrajeet Gupta, Anubhav Choudhary, Prasanta K. Jana. 123-127 [doi]
- Performance Comparison of HEFT, Lookahead, CEFT and PEFT Scheduling Algorithms for Heterogeneous Computing SystemsAshish Kumar Maurya, Anil Kumar Tripathi. 128-132 [doi]
- Business: Do you wanna sell more? Discovering Topics, Sentiments and Prediction of RatingsMitodru Niyogi, Asim Kumar Pal. 133-138 [doi]
- Customization of Service Level Agreement for Digital Forensics as a ServicePankaj Kumar Keserwani, Shefalika Ghosh Samaddar. 139-150 [doi]
- Workload Characterization: Survey of Current Approaches and Research ChallengesS. R. Shishira, A. Kandasamy, K. Chandrasekaran 0001. 151-156 [doi]