{"id":2172,"date":"2018-12-18T09:08:44","date_gmt":"2018-12-18T09:08:44","guid":{"rendered":"http:\/\/www.gyanvihar.org\/journals\/?page_id=2172"},"modified":"2019-06-24T06:09:56","modified_gmt":"2019-06-24T06:09:56","slug":"international-journal-of-converging-technologies-management-volume-3-issue-1-2017","status":"publish","type":"page","link":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/","title":{"rendered":"International Journal of Converging Technologies &#038; Management \u2013 Volume 3, Issue 1, 2017"},"content":{"rendered":"<h3>Volume 3, Issue 1, 2017<\/h3>\n<table class=\"table table-bordered\" style=\"border: 1px solid #000000; height: 624px; width: 100%;\" width=\"100%\"><!-- Row Start Here --><\/p>\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\" width=\"2%\">1<\/td>\n<td style=\"height: 24px;\" width=\"92%\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/03\/new-framework-for-enhanced-the-image-visibility-which-is-degraded-due-to-fog-and-weather-condition\/\">New framework for enhanced the image visibility which is degraded due to fog and Weather Condition<\/a><\/span><\/td>\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\" width=\"6%\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/ctmpaper2017\/CTM_VOL_3_1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">Niranjan Kumar, Ravishankar Sharma<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\">2<\/td>\n<td style=\"height: 24px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/03\/enhancing-security-of-steganographic-system-using-tdea\/\">Enhancing Security of Steganographic System using TDEA<\/a><\/span><\/td>\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/ctmpaper2017\/CTM_VOL_3_2.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">Manoj Kumar Ramaiya, Dr. Dinesh Goyal, Dr. Naveen Hemrajani<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\">3<\/td>\n<td style=\"height: 24px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/04\/rotation-attack-analysis-of-non-blind-multiplicative-watermarking-using-2d-dwt\/\">Rotation attack analysis of Non Blind Multiplicative Watermarking using 2D-DWT<\/a><\/span><\/td>\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/ctmpaper2017\/CTM_VOL_3_3.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">Rohit Chhabra, Dr. R R Sinha<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\">4<\/td>\n<td style=\"height: 24px;\">Improved Security of Neural Cryptography Using Don&#8217;t-Trust-My-Partner and Error Prediction<\/td>\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/ctmpaper2017\/CTM_VOL_3_4.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">Robert Kozma<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\">5<\/td>\n<td style=\"height: 24px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/04\/big-data-security-and-privacy-issues-in-smes\/\">Big data security and privacy issues in SMEs<\/a><\/span><\/td>\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/ctmpaper2017\/CTM_VOL_3_5.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">Reena Singh<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start Here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\">6<\/td>\n<td style=\"height: 24px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/04\/web-mining-prominent-application\/\">Web Mining: Prominent application<\/a><\/span><\/td>\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/ctmpaper2017\/CTM_VOL_3_6.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">Neha Mittal<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 48px;\">\n<td style=\"vertical-align: middle; height: 72px;\" rowspan=\"2\">7<\/td>\n<td style=\"height: 48px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/04\/implementation-of-neural-network-model-for-cancer-detection-based-on-back-propagation-with-the-help-of-python-based-hardware-description-language\/\">Implementation of Neural Network Model For Cancer Detection Based On Back Propagation With The Help of Python Based Hardware Description Language<\/a><\/span><\/td>\n<td style=\"vertical-align: middle; height: 72px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/ctmpaper2017\/CTM_VOL_3_7.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">Pankaj kumar Sharma , Mr. Ravishanker Sharma<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\">8<\/td>\n<td style=\"height: 24px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/04\/design-development-of-low-bit-rate-efficient-secure-video-transmission-using-zigbee\/\">Design &amp; Development Of Low Bit Rate Efficient secure Video Transmission Using Zigbee<\/a><\/span><\/td>\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/ctmpaper2017\/CTM_VOL_3_8.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">Pooja Mishra, Gajanand Sharma<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 48px;\">\n<td style=\"vertical-align: middle; height: 72px;\" rowspan=\"2\">9<\/td>\n<td style=\"height: 48px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/04\/review-paper-on-improving-over-novel-framwork-for-secure-the-live-video-streaming-over-p2p-network\/\">REVIEW PAPER ON IMPROVING OVER NOVEL FRAMWORK FOR SECURE THE LIVE VIDEO STREAMING OVER P2P NETWORK<\/a><\/span><\/td>\n<td style=\"vertical-align: middle; height: 72px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/ctmpaper2017\/CTM_VOL_3_9.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">Rahul Soni, Gajanand Sharma<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\">10<\/td>\n<td style=\"height: 24px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/03\/wireless-sensor-network-based-agriculture-system\/\">Wireless Sensor Network Based Agriculture System<\/a><\/span><\/td>\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/ctmpaper2017\/CTM_VOL_3_10.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">Sumit Singh<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\">11<\/td>\n<td style=\"height: 24px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/03\/a-new-secure-framework-for-provide-the-security-of-vanet-network-for-secure-communication\/\">A new Secure Framework for Provide the security of VANET network for Secure Communication<\/a><\/span><\/td>\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/ctmpaper2017\/CTM_VOL_3_11.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">Vikash Poonia, Dr Dinesh Goyal<\/td>\n<\/tr>\n<p><!-- Row End Here --><!-- Row Start here --><\/p>\n<tr style=\"height: 24px;\">\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\">12<\/td>\n<td style=\"height: 24px;\"><span style=\"color: #003366;\"><a style=\"color: #003366;\" href=\"http:\/\/www.gyanvihar.org\/journals\/index.php\/2018\/12\/03\/image-authentication-watermarking-using-message-digest\/\">Image Authentication &amp; Watermarking Using Message Digest<\/a><\/span><\/td>\n<td style=\"vertical-align: middle; height: 48px;\" rowspan=\"2\"><a href=\"http:\/\/www.gyanvihar.org\/researchjournals\/ctmpaper2017\/CTM_VOL_3_12.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">Gajanand Sharma, Prof (Dr.) Dinesh Goyal<\/td>\n<\/tr>\n<p><!-- Row End Here --><\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Volume 3, Issue 1, 2017 1 New framework for enhanced the image visibility which is degraded due to fog and Weather Condition Niranjan Kumar, Ravishankar Sharma 2 Enhancing Security of Steganographic System using TDEA Manoj Kumar Ramaiya, Dr. Dinesh Goyal, Dr. Naveen Hemrajani 3 Rotation attack analysis of Non Blind Multiplicative Watermarking using 2D-DWT Rohit [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2172","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>research journal - Research Journal<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"International Journal of Converging Technologies &amp; Management \u2013 Volume 3, Issue 1, 2017 - research journal\" \/>\n<meta property=\"og:description\" content=\"Volume 3, Issue 1, 2017 1 New framework for enhanced the image visibility which is degraded due to fog and Weather Condition Niranjan Kumar, Ravishankar Sharma 2 Enhancing Security of Steganographic System using TDEA Manoj Kumar Ramaiya, Dr. Dinesh Goyal, Dr. Naveen Hemrajani 3 Rotation attack analysis of Non Blind Multiplicative Watermarking using 2D-DWT Rohit [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"research journal\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-24T06:09:56+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/\",\"name\":\"International Journal of Converging Technologies & Management \u2013 Volume 3, Issue 1, 2017 - research journal\",\"isPartOf\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\",\"datePublished\":\"2018-12-18T09:08:44+00:00\",\"dateModified\":\"2019-06-24T06:09:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/#primaryimage\",\"url\":\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\",\"contentUrl\":\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.gyanvihar.org\/journals\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"International Journal of Converging Technologies &#038; Management \u2013 Volume 3, Issue 1, 2017\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/\",\"name\":\"research journal\",\"description\":\"Research Journal\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"research journal - Research Journal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/","og_locale":"en_US","og_type":"article","og_title":"International Journal of Converging Technologies & Management \u2013 Volume 3, Issue 1, 2017 - research journal","og_description":"Volume 3, Issue 1, 2017 1 New framework for enhanced the image visibility which is degraded due to fog and Weather Condition Niranjan Kumar, Ravishankar Sharma 2 Enhancing Security of Steganographic System using TDEA Manoj Kumar Ramaiya, Dr. Dinesh Goyal, Dr. Naveen Hemrajani 3 Rotation attack analysis of Non Blind Multiplicative Watermarking using 2D-DWT Rohit [&hellip;]","og_url":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/","og_site_name":"research journal","article_modified_time":"2019-06-24T06:09:56+00:00","og_image":[{"url":"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/","url":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/","name":"International Journal of Converging Technologies & Management \u2013 Volume 3, Issue 1, 2017 - research journal","isPartOf":{"@id":"https:\/\/www.gyanvihar.org\/journals\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/#primaryimage"},"image":{"@id":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/#primaryimage"},"thumbnailUrl":"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png","datePublished":"2018-12-18T09:08:44+00:00","dateModified":"2019-06-24T06:09:56+00:00","breadcrumb":{"@id":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/#primaryimage","url":"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png","contentUrl":"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/11\/download-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.gyanvihar.org\/journals\/international-journal-of-converging-technologies-management-volume-3-issue-1-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gyanvihar.org\/journals\/"},{"@type":"ListItem","position":2,"name":"International Journal of Converging Technologies &#038; Management \u2013 Volume 3, Issue 1, 2017"}]},{"@type":"WebSite","@id":"https:\/\/www.gyanvihar.org\/journals\/#website","url":"https:\/\/www.gyanvihar.org\/journals\/","name":"research journal","description":"Research Journal","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/pages\/2172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/comments?post=2172"}],"version-history":[{"count":4,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/pages\/2172\/revisions"}],"predecessor-version":[{"id":2855,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/pages\/2172\/revisions\/2855"}],"wp:attachment":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/media?parent=2172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}