S.No. |
Title & Authors |
Page |
Downloads |
1. |
Computational Prediction of MicroRNAs from Chromosome no. 3 & 4 of Plasmodium vivax
Ranojit Sarker, Ujjwal Maulik |
01-06 |
|
2. |
Proposing an Idea for Multi-Way Data Replication Using a Swarm Intelligence in Current Data Centre Practices
Mandeep Dhalor, Ekta Arora, Mudit Khaneja |
07-10 |
|
3. |
Influence Quantification of Online Review Comments
Debanjan Banerjee, BikromadittyaMondal |
11-14 |
|
4. |
Data Mining: An analysis to predict academic performance of students based on varying factors
Shruti Bijawat, Deepak Moud |
15-19 |
|
5. |
Grouping-Based Job Scheduling in Cloud computing using Ant Colony Framework
Madhusree Kuanr, Prithviraj Mohanty, Suresh Chandra Moharana |
20-25 |
|
6. |
Comparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation
Paramvir Kaur, Sukhwinder Sharma |
26-30 |
|
7. |
An Unique Approach to Element Management and Secure Cloud Storage Backup for Sensitive Data
Sanjay Tiwari, Chandresh Bakliwal, Chitra Garg |
31-36 |
|
8. |
Word Proximity Integration in Word Cloud
Ansuya Ahluwalia, Chaitanya, Shailendra Singh |
37-41 |
|
9. |
Comparison of Bit Error Rate Performance Measure of Robust
Watermarking Scheme Based On Self-Fractional Fourier Functions, Empirical Mode Decomposition and Cyclic Encoding
J. B. Sharma, K.K. Sharma, Vineet Sahula |
42-47 |
|
10. |
Automatic Extraction of Human Gait Feature for Recognition
Sonia Das, Sukadev Meher |
48-54 |
|
11. |
Feature Extraction in Content Based Image Retrieval: A Review
Ajay Kumar Bansal, Swati Mathur |
55-61 |
|
12. |
Face Recognition Techniques: A Review
Ajay Kumar Bansal, Pankaj Chawla |
62-69 |
|
13. |
A Novel Economic Barrier Coverage Using Wireless Networks
AbdelRahman A. Eldosouky, Ahmed Abdul-Monem Ahmed, Ibrahim E. Ziedan |
70-75 |
|
14. |
An Approach to Attain Reliable Query Processing by Obstructing SQL Injection Attack
Pradeep Natani, Dolly Chandani, Kishor Kumar Mali, Meenakshi Kothari, Shweta Agrawal |
76-79 |
|
15. |
A Proposed Alternative Approach for Intrusion Detection System for AD-Hoc Networks using Decision Trees and Binomial Heap
Srivastava Sumit(Dr.), Maheshwari Shashikant |
80-82 |
|