{"id":2131,"date":"2018-12-13T07:41:14","date_gmt":"2018-12-13T07:41:14","guid":{"rendered":"http:\/\/www.gyanvihar.org\/journals\/?page_id=2131"},"modified":"2018-12-13T07:41:14","modified_gmt":"2018-12-13T07:41:14","slug":"international-journal-of-converging-technologies-management-volume-1-issue-2-2015","status":"publish","type":"page","link":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/","title":{"rendered":"International Journal of Converging Technologies &#038; Management &#8211; Volume 1, Issue 2, 2015"},"content":{"rendered":"<h3>Volume 1, Issue 2, 2015<\/h3>\n<table class=\"table table-bordered\" style=\"border: 1px solid #000000; width: 100%; height: 707px;\" width=\"100%\"><!-- Row Start Here --><\/p>\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; width: 3%; height: 48px;\" rowspan=\"2\" width=\"3%\">1<\/td>\n<td style=\"width: 90%; height: 24px;\" width=\"90%\">Fuzzy driven approach for spam filter to avoid unregistered calls<\/td>\n<td style=\"vertical-align: middle; width: 7%; height: 48px;\" rowspan=\"2\" width=\"7%\"><a href=\"researchjournals\/cmt_vol_2_1.pdf\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/> <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 90%; height: 24px;\">Rishi Kant Shukla ,Dr. Savita Shiwani<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; width: 3%; height: 48px;\" rowspan=\"2\">2<\/td>\n<td style=\"width: 90%; height: 24px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/04\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/\">Cyber crime Escalation Vs solutions: a Literature Snapshot<\/a><\/span><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_2.pdf\" target=\"_blank\" rel=\"noopener\"><br \/>\n<\/a><\/td>\n<td style=\"vertical-align: middle; width: 7%; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_2.pdf\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/> <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 90%; height: 24px;\">Dr. Raksha Chouhan<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; width: 3%; height: 48px;\" rowspan=\"2\">3<\/td>\n<td style=\"width: 90%; height: 24px;\">PROTOTYPING AN Cloud Computing: Analysis of Cloud Storage In Robotic Environment<\/td>\n<td style=\"vertical-align: middle; width: 7%; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_3.pdf\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/> <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 90%; height: 24px;\">Tushar Gupta,Sunil Yadav<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; width: 3%; height: 48px;\" rowspan=\"2\">4<\/td>\n<td style=\"width: 90%; height: 24px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/04\/generate-e-services-using-cloud-storage-as-a-service\/\">Generate E-Services using cloud Storage as a Service<\/a><\/span><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_4.pdf\" target=\"_blank\" rel=\"noopener\"><br \/>\n<\/a><\/td>\n<td style=\"vertical-align: middle; width: 7%; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_4.pdf\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/> <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 90%; height: 24px;\">Anshuman Gautam, Richa Chauhan, Ashok Kumar<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; width: 3%; height: 48px;\" rowspan=\"2\">5<\/td>\n<td style=\"width: 90%; height: 24px;\"><a href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/05\/impact-of-agile-testing-over-traditional-testing\/\"><span style=\"color: #003366;\">Impact of agile testing over traditional testing<\/span><\/a><\/td>\n<td style=\"vertical-align: middle; width: 7%; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_5.pdf\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/> <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 90%; height: 24px;\">Pratibha Singh, Puja Patel<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start Here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; width: 3%; height: 48px;\" rowspan=\"2\">6<\/td>\n<td style=\"width: 90%; height: 24px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/05\/a-classification-of-various-indian-script-recognition-a-survey\/\">A Classification Of Various Indian Script Recognition: A Survey<\/a><\/span><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_6.pdf\" target=\"_blank\" rel=\"noopener\"><br \/>\n<\/a><\/td>\n<td style=\"vertical-align: middle; width: 7%; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_6.pdf\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/> <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 90%; height: 24px;\">Divyang Vijayvergiya ,Akhilesh Pandey<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; width: 3%; height: 48px;\" rowspan=\"2\">7<\/td>\n<td style=\"width: 90%; height: 24px;\"><a href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/05\/a-value-creation-approach-towards-cyber-safety-mechanism-analysis-and-evaluation\/\"><span style=\"color: #003366;\">A Value Creation Approach towards cyber safety mechanism: Analysis and Evaluation\u00a0<\/span><\/a><\/td>\n<td style=\"vertical-align: middle; width: 7%; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_7.pdf\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/> <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 90%; height: 24px;\">Raksha Chouhan<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; width: 3%; height: 48px;\" rowspan=\"2\">8<\/td>\n<td style=\"width: 90%; height: 24px;\"><a href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/05\/a-classification-of-multi-script-numerals-using-intelligent-agent\/\"><span style=\"color: #003366;\">A classification Of Multi Script Numerals Using Intelligent Agent.<\/span><\/a><\/td>\n<td style=\"vertical-align: middle; width: 7%; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_8.pdf\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/> <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 90%; height: 24px;\">Rakshak Porwal, Akhilesh Pandey<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; width: 3%; height: 48px;\" rowspan=\"2\">9<\/td>\n<td style=\"width: 90%; height: 24px;\"><a href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/05\/smac-in-it-bpo\/\"><span style=\"color: #003366;\">SMAC in IT-BPO<\/span><\/a><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_9.pdf\" target=\"_blank\" rel=\"noopener\"><br \/>\n<\/a><\/td>\n<td style=\"vertical-align: middle; width: 7%; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_9.pdf\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/> <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 90%; height: 24px;\">Shreya Rani<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; width: 3%; height: 48px;\" rowspan=\"2\">10<\/td>\n<td style=\"width: 90%; height: 24px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/05\/issues-in-deploying-ipv6\/\">ISSUES IN DEPLOYING IPv6\u00a0<\/a><\/span><\/td>\n<td style=\"vertical-align: middle; width: 7%; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_10.pdf\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/> <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 90%; height: 24px;\">Roshan Koshy<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; width: 3%; height: 48px;\" rowspan=\"2\">11<\/td>\n<td style=\"width: 90%; height: 24px;\"><a href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/04\/comparative-study-of-various-clustering-techniques-in-data-mining\/\"><span style=\"color: #003366;\">Comparative Study of Various Clustering Techniques in Data Mining<\/span><\/a><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_11.pdf\" target=\"_blank\" rel=\"noopener\"><br \/>\n<\/a><\/td>\n<td style=\"vertical-align: middle; width: 7%; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_11.pdf\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/> <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 90%; height: 24px;\">Sakshi Chaudhary, Ms. Nidhi Gupta<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; width: 3%; height: 48px;\" rowspan=\"2\">12<\/td>\n<td style=\"width: 90%; height: 24px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/04\/agile-adoption-in-tech-startups-our-findings\/\">Agile Adoption in Tech Startups Our Findings<\/a><\/span><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_12.pdf\" target=\"_blank\" rel=\"noopener\"><br \/>\n<\/a><\/td>\n<td style=\"vertical-align: middle; width: 7%; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_12.pdf\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/> <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 90%; height: 24px;\">Sagar Jain<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; width: 3%; height: 48px;\" rowspan=\"2\">13<\/td>\n<td style=\"width: 90%; height: 24px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/04\/a-study-of-handwritten-numerals-for-profile-based-classification\/\">A Study of Handwritten Numerals for Profile Based Classification<\/a><\/span><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_13.pdf\" target=\"_blank\" rel=\"noopener\"><br \/>\n<\/a><\/td>\n<td style=\"vertical-align: middle; width: 7%; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_13.pdf\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/> <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 90%; height: 24px;\">Govindan<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 25px;\">\n<td style=\"vertical-align: middle; width: 3%; height: 49px;\" rowspan=\"2\">14<\/td>\n<td style=\"width: 90%; height: 25px;\"><a href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/04\/spatio-temporal-filtering-for-images-and-videos\/\"><span style=\"color: #003366;\">Spatio-Temporal Filtering for Images and Videos<\/span><\/a><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_14.pdf\" target=\"_blank\" rel=\"noopener\"><br \/>\n<\/a><\/td>\n<td style=\"vertical-align: middle; width: 7%; height: 49px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_14.pdf\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/> <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 90%; height: 24px;\">Swati Sharma<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 10px;\">\n<td style=\"vertical-align: middle; width: 3%; height: 34px;\" rowspan=\"2\">15<\/td>\n<td style=\"width: 90%; height: 10px;\"><a href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/04\/improvisation-of-ad-hoc-on-demand-distance-vector-aodv-routing-protocol-using-sumo-on-omnet\/\">Improvisation of Ad-hoc On Demand Distance Vector (AODV) routing protocol using SUMO on OMNeT++<\/a><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_15.pdf\" target=\"_blank\" rel=\"noopener\"><br \/>\n<\/a><\/td>\n<td style=\"vertical-align: middle; width: 7%; height: 34px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/cmt_vol_2_15.pdf\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/> <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 90%; height: 24px;\">Aniruddh Pandey, Sapan Gupta<\/td>\n<\/tr>\n<p><!-- Row End Here --><\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Volume 1, Issue 2, 2015 1 Fuzzy driven approach for spam filter to avoid unregistered calls Rishi Kant Shukla ,Dr. Savita Shiwani 2 Cyber crime Escalation Vs solutions: a Literature Snapshot Dr. Raksha Chouhan 3 PROTOTYPING AN Cloud Computing: Analysis of Cloud Storage In Robotic Environment Tushar Gupta,Sunil Yadav 4 Generate E-Services using cloud Storage [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2131","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>research journal - Research Journal<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"International Journal of Converging Technologies &amp; Management - Volume 1, Issue 2, 2015 - research journal\" \/>\n<meta property=\"og:description\" content=\"Volume 1, Issue 2, 2015 1 Fuzzy driven approach for spam filter to avoid unregistered calls Rishi Kant Shukla ,Dr. Savita Shiwani 2 Cyber crime Escalation Vs solutions: a Literature Snapshot Dr. Raksha Chouhan 3 PROTOTYPING AN Cloud Computing: Analysis of Cloud Storage In Robotic Environment Tushar Gupta,Sunil Yadav 4 Generate E-Services using cloud Storage [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/\" \/>\n<meta property=\"og:site_name\" content=\"research journal\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/\",\"name\":\"International Journal of Converging Technologies & Management - Volume 1, Issue 2, 2015 - research journal\",\"isPartOf\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\",\"datePublished\":\"2018-12-13T07:41:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/#primaryimage\",\"url\":\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\",\"contentUrl\":\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.gyanvihar.org\/journals\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"International Journal of Converging Technologies &#038; Management &#8211; Volume 1, Issue 2, 2015\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/\",\"name\":\"research journal\",\"description\":\"Research Journal\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"research journal - Research Journal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/","og_locale":"en_US","og_type":"article","og_title":"International Journal of Converging Technologies & Management - Volume 1, Issue 2, 2015 - research journal","og_description":"Volume 1, Issue 2, 2015 1 Fuzzy driven approach for spam filter to avoid unregistered calls Rishi Kant Shukla ,Dr. Savita Shiwani 2 Cyber crime Escalation Vs solutions: a Literature Snapshot Dr. Raksha Chouhan 3 PROTOTYPING AN Cloud Computing: Analysis of Cloud Storage In Robotic Environment Tushar Gupta,Sunil Yadav 4 Generate E-Services using cloud Storage [&hellip;]","og_url":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/","og_site_name":"research journal","og_image":[{"url":"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/","url":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/","name":"International Journal of Converging Technologies & Management - Volume 1, Issue 2, 2015 - research journal","isPartOf":{"@id":"https:\/\/www.gyanvihar.org\/journals\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/#primaryimage"},"image":{"@id":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/#primaryimage"},"thumbnailUrl":"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png","datePublished":"2018-12-13T07:41:14+00:00","breadcrumb":{"@id":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/#primaryimage","url":"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png","contentUrl":"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-1-issue-2-2015\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gyanvihar.org\/journals\/"},{"@type":"ListItem","position":2,"name":"International Journal of Converging Technologies &#038; Management &#8211; Volume 1, Issue 2, 2015"}]},{"@type":"WebSite","@id":"https:\/\/www.gyanvihar.org\/journals\/#website","url":"https:\/\/www.gyanvihar.org\/journals\/","name":"research journal","description":"Research Journal","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/pages\/2131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/comments?post=2131"}],"version-history":[{"count":1,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/pages\/2131\/revisions"}],"predecessor-version":[{"id":2132,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/pages\/2131\/revisions\/2132"}],"wp:attachment":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/media?parent=2131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}