| 1 |
Fuzzy driven approach for spam filter to avoid unregistered calls |
|
| Rishi Kant Shukla ,Dr. Savita Shiwani |
| 2 |
Cyber crime Escalation Vs solutions: a Literature Snapshot
|
|
| Dr. Raksha Chouhan |
| 3 |
PROTOTYPING AN Cloud Computing: Analysis of Cloud Storage In Robotic Environment |
|
| Tushar Gupta,Sunil Yadav |
| 4 |
Generate E-Services using cloud Storage as a Service
|
|
| Anshuman Gautam, Richa Chauhan, Ashok Kumar |
| 5 |
Impact of agile testing over traditional testing |
|
| Pratibha Singh, Puja Patel |
| 6 |
A Classification Of Various Indian Script Recognition: A Survey
|
|
| Divyang Vijayvergiya ,Akhilesh Pandey |
| 7 |
A Value Creation Approach towards cyber safety mechanism: Analysis and Evaluation |
|
| Raksha Chouhan |
| 8 |
A classification Of Multi Script Numerals Using Intelligent Agent. |
|
| Rakshak Porwal, Akhilesh Pandey |
| 9 |
SMAC in IT-BPO
|
|
| Shreya Rani |
| 10 |
ISSUES IN DEPLOYING IPv6 |
|
| Roshan Koshy |
| 11 |
Comparative Study of Various Clustering Techniques in Data Mining
|
|
| Sakshi Chaudhary, Ms. Nidhi Gupta |
| 12 |
Agile Adoption in Tech Startups Our Findings
|
|
| Sagar Jain |
| 13 |
A Study of Handwritten Numerals for Profile Based Classification
|
|
| Govindan |
| 14 |
Spatio-Temporal Filtering for Images and Videos
|
|
| Swati Sharma |
| 15 |
Improvisation of Ad-hoc On Demand Distance Vector (AODV) routing protocol using SUMO on OMNeT++
|
|
| Aniruddh Pandey, Sapan Gupta |