Abstract is missing.
- Security Issues and Trust Management in Cloud ComputingShimpy Harbajanka, Preeti Saxena. 1-3 [doi]
- An Approach Used In Wireless Network to Detect Denial of Service AttackRashi Dhagat, Pankaj Jagtap. 4-6 [doi]
- Nearest Neighbor Search Technique Using Keywords and ThresholdPooja Shejawal, Jayshree R. Pansare. 7-11 [doi]
- Errors Detection in Big Sensor Data on Cloud using Time Efficient TechniqueJ. R. Pansare, V. D. Bajad. 12-14 [doi]
- Intelligent Bus stand Monitoring and ControlShital M. Dharrao, Vijay D. Choudhary, Kantilal P. Rane. 15-19 [doi]
- Review of Machine Learning Algorithms in R software for Diagnosis of ESD DiseasesSeema Kolkur, Dhananjay R. Kalbande. 20-25 [doi]
- Improving Accuracy for Intrusion Detection through Layered Approach Using Support Vector Machine with Feature ReductionAditi Nema, Basant Tiwari, Vivek Tiwari. 26-31 [doi]
- Punjabi Stop Words: A Gurmukhi, Shahmukhi and Roman Scripted ChronicleJasleen Kaur, Jatinderkumar R. Saini. 32-37 [doi]
- Comparative Study of Optimal Clustering Techniques in Wireless Sensor Network: A SurveyJaheda S. Ambekari, Sumedha Sirsikar. 38-44 [doi]
- A Survey of various Sink Mobility based Techniques in Wireless Sensor NetworkSuwarna Latambale, Sumedha Sirsikar. 45-50 [doi]
- System Attribute Measures of Network Security AnalyzerShwetambari Pawar, Nilakshi Jain, Swati Deshpande. 51-54 [doi]
- Computerized Forensic Approach Using Data Mining TechniquesNilakshi Jain, Priyanka Sharma, Rashmi Anchan, Apoorva Bhosale, Pooja Anchan, Dhananjay R. Kalbande. 55-60 [doi]
- Empirical relationship between Victim's occupation and their knowledge of Digital ForensicNilakshi Jain, Dhananjay R. Kalbande, Priyanka Sharma. 61-65 [doi]
- ECG Steganography to secure patient data in an E-Healthcare SystemDolly Meghani, S. Geetha. 66-70 [doi]
- Use of Internet of Things (IoT) in Healthcare: A SurveyAnjali S. Yeole, Dhananjay R. Kalbande. 71-76 [doi]
- Key Management Techniques for Securing MANETNeha Singh, Saurabh Singh, Naveen Kumar, Rakesh Kumar. 77-80 [doi]
- Image Visualization as per the User Appeal through Deep LearningAnkita Gandhi, Amarjeet Poonia. 81-86 [doi]
- Execution and Analysis of Topology Based Routing Protocols in VANETSrishti, Sapna Yadav. 87-91 [doi]
- Design and Implementation of Kerberos using DES AlgorithmShikha Jindal, Manmohan Sharma. 92-95 [doi]
- Narrow Band LNA Design Using OGMOSFET for Noise and Gain AnalysisGayatri M. Phade, Sandhya Save, Vivek Ratnapakhari. 96-99 [doi]
- Techniques and Approaches for Disease Outbreak Prediction: A SurveyAsha A. Bharambe, Dhananjay R. Kalbande. 100-102 [doi]
- Extending Storage Life of Pears Using a Formulation Developed from a Terpenoidal Oligomer from LacAnjali Bishnoi, H. M. Chawla. 103-108 [doi]
- Double Layer Anti-Reflective Coating of SiO2/ZnO for Photovoltaic CellNeha Mahnot, Rekha Mehra, Shikha Maheshwary. 109-111 [doi]
- Gesture Recognition for VW & VO: Virtual Writing and Virtual OperationAnil Kumar Dubey, Khushbu Gulabani. 112-117 [doi]
- The Study of the Usage of Data Analytic and Clustering Techniques for Web ElementsShashi Mehrotra, Shruti Kohli. 118-120 [doi]
- Analytical Trends and Practices of Web IntelligenceB. Malathi, K. Chandra Sekharaiah, H. Jayasree. 121-125 [doi]
- Significance of Ticket Analytics in Effective Software Maintenance: AwarenessSharon Christa, V. Suma 0001. 126-130 [doi]
- Implementation of an Emergency Evacuation System Using Intelligent Routing Using QualNet SimulatorPraveen Kumar, M. Ruthwik, Manisha K. Sree, Misba Saad, Annapurna P. Patil. 131-138 [doi]
- A Survey Paper on a Compact Data Structure Based Technique for Mining Frequent Closed Item SetKamlesh Ahuja, Durgesh Kumar Mishra, Sarika Jain. 139-141 [doi]
- Dynamic Referencing Data Warehouse Employing Proposed Time Integrated Seed Based Element Engendered Cryptographic AlgorithmRajdeep Chowdhury, Jenifar Khan, Subham Sengupta, Saswata Dasgupta, Soupayan Datta, Mallika De. 142-149 [doi]