1. |
Sentiment Analysis of Social web data: A Review
Raj Kumar Verma, Dr. Ritu Tiwari, Prof. Nirmal Roberts
PDF |
2. |
Reliable Data Transmission Using Improved Packet Retransmission Timeout Calculation For Wireless Sensor Network
Roshan Jahan, Nida Khan, Shoeb Ahad Siddiqui, Mohd. Ishaque
PDF |
3. |
Recognition and Anticipation of Wormhole Attack in ALARM Protocol (MANETs)
Preetam Suman, Amrit Suman, Mohd. Amir Siddiqui, Rupshi Jha
PDF |
4. |
AEvolution of Knowledge Engineering Infrastructure at SGPGIMS, Lucknow Network Application in Hospital Environment
Repu Daman, Saroj K. Mishra
PDF |
5. |
Remote Sensing and GIS Application: An Overview
Dinesh Kumar Misra, Asif Siddiqui
PDF |
6. |
Secure Data Transfer & File Sharing Use of Cloud Service for Mobile Application
Swati Sharma, Ravindra Sharma
PDF |
7. |
A Review on Shifting Software Testing to Cloud
Akanksha Singh, Kusum Kardam , Mohammad Suaib
PDF |
8. |
Data and Virtualization Security in Cloud
Khushbu Dixit, Amrit Suman, Sadhna K. Mishra
PDF |
9. |
Approach to Prioritize the Requirements Using Fuzzy Logic
Neha Mishra, M.Akheela Khanum, Kavita Agrawal
PDF |
10. |
A Ubiquitous Computing – One of the Step Towards Smart Environment
Saba Khan, Dinesh Kumar Tiwari
PDF |
11. |
Preventive Measures for Security Threat in Big Data Environment
Sheeba Praveen, Sumaiya
PDF |
12. |
Energy Efficient Congestion Control mechanism in MANET
Pratibha Tripathi, Dr. Shish Ahmad
PDF |
13. |
AEnergy Efficient Routing Algorithm in MANET Using Optimized Euler Digraph
Mohita Dixit, Shish Ahmad, Mohd. Arif
PDF |
14. |
Proposal for Avoiding Ambiguity in Requirement Engineering using Artificial Intelligence
Shagun Sinha, Mohd Shahid Husain
PDF |
15. |
Software Quality Management: A Process to Improve the Quality of Software Project Using SQA
Chinmaya Dash, Dr. D Ramesh , Prakash C Behera
PDF |
16. |
4G Wireless Network: A Review
Dr NitinGoel, Sudheer Kumar Singh, Shashank Singh, Mohd Sameer, Kavita Agrawal
PDF |
17. |
Use of Social Media to Drive Business Advantage in Banking
M.Akheela Khanum, Sajjad Anees Nagrami, Prof. M.C.Trivedi
PDF |
18. |
Detection of Knee Osteoarthritis Using X-Ray
Mahima Shanker Pandey, Dr. S S Soam , Dr. Surya Prakash Tripathi
PDF |
19. |
Analysis of Security Challenges in Vehicular Adhoc Network
Nazish Siddiqui, Mohd Shahid Husain, Mohammad Akbar
PDF |
20. |
Collision Free Cichelli Perfect Hash Function
Rajeev Ranjan Kumar Tripathi, Deepak Singh Dikhit, Rajesh Kumar Singh
PDF |
21. |
A Survey of Sequence Alignment Algorithms
Arunima Mishra,Sudhir Singh Soam, Surya Prakash Tripathi
PDF |
22. |
Real Time Video Content Based Contextual Advertisement
Tarun Sharma , Susheel S, Prashanth T.K, Uthej Mopathi, Tarun S,Rugwed Mahamune
PDF |
23. |
Zigbee Sensor Based Automatic Room Light Controller with Visitor Counter
Faizan Arif Khan, Prabhat Ranjan Sarkar, Saima Rahman, Fatima Yasmeen
PDF |
24. |
Identification of Systems With Multi-Model Error Surface by Ant Colony Optimization
Shikha Tripathi , Mohd Asif Ikbal
PDF |
25. |
An Intelligent Spatial Aware Search Engine Using Lucene and Solr
Thirunavukkarasu K, Priyank Tripathi, Deepak Upadhay and Dr.Manoj Wadhawa
PDF |
26. |
Metrics for Dynamic Load Balancing in a Parallel System
Mohd Haroon, Manish Madhav Tripathi, Riyazuddin
PDF |
27. |
Improvement Opportunities in the Design of Multi-Objective Evolutionary Fuzzy Classifiers: Handling Rule Selection and Interpretability-Accuracy Tradeoff
Praveen Kumar Dwivedi , Surya Prakash Tripathi
PDF |
28. |
Performance Analysis of AODV, DSR & LAR1 Routing Protocols for MANET
Ajay Kumar, Amit Kumar Kar, Abhishek Kumar, Deepak Dikhit
PDF |
29. |
Web Personalization and Recommendation: A Review
Nayab Zya , Mohammad Suaib, M S Husain
PDF |
30. |
A Comparative Study & Performance Evaluation of Different Clustering Techniques in Data Mining
Amit Kumar Kar, Shailesh Kumar Patel, Rajkishor Yadav
PDF |
31. |
Analytical Study of Big Data Classification
Neha Khan, Mohd Shahid Husain, Manish Madhav Tripathi
PDF |
32. |
Optimization and Performance Analysis of AODV Routing Protocol in MANET Using AI
Shriom Maurya, Dr. Shish Ahmad, Mohd Haroon
PDF |
33. |
StableWatermarking for Geometrical Attacks
Manish Madhava Tripathi, Dr. S P Tripathi, Mohd Haroon
PDF |
34. |
Cloud Computing for Medical Applications & Healthcare Delivery:Technology, Application, Security and Swot Analysis
Repu Daman, Manish M. Tripathi, Saroj K. Mishra
PDF |
35. |
Bayesian Equalizers Literature Survey with Analytical Comparison
Anurag Srivastava, Kavita Agarwal, Md. Shahid Hussain
PDF |
36. |
Bayesian Equalizer for Inter-symbol and Co-channel Interference using Mamdani Fuzzy System
Anurag Srivastava, Kavita Agarwal, Md. Shahid Hussain
PDF |
37. |
An Indiscriminate Semantic Similarity Search Using Latent Semantic Indexing in Data Mining
Nudrat Fatima, Saba Khalid, Halima Sadia
PDF |
38. |
Fuzzy Query: An Impression in Query processing
Ankita Srivastava, Sonali Yadav, Niharika Srivastava, Zaina Khan
PDF |
39. |
AUnderstanding Decision tree Algorithm by using R Programming Language
Akshat Sharma, Anuj Srivastava
PDF |
40. |
Role and Responsibility of Membership Service in Group Communication
Rajeev Ranjan Kumar Tripathi, Rajesh Kumar Singh, Shrawan Kumar Pandey, Rakesh Kumar Pandey
PDF |
41. |
Detection and Prevention Methods of Block Hole & Gray Hole Attacks in MANET - A Critical Survey
Vipin Dwivedi, Shish Ahmad
PDF |
42. |
Smart Feedback System Based E-Learning Model
Prof. Mohammad Ubaidullah Bokhari, Rizwan Alam
PDF |
43. |
Role of Semantically Enriched Ontologies for Information Retrieval in Indian E-Governance
Namrata Rastogi, Dr. Parul Verma
PDF |
44. |
Buffer Overflow : Anomaly in Application Security
Anwar Ahamed Shaikh,Anurag Srivastava,Ariq Ahmad,Ashutosh Singh and Adnan Abdul Rashid
PDF |
45. |
Key Management in Hierarchical MANET Using Kerberos
Satyendra Kr. Srivastav, Mohammad Arif, Bably Dolly
PDF |
46. |
A Novel Microwave Bandpass Filter for Rf Applications
Er. Ashish Tripathi
PDF |
47. |
Application of Information Technology in Construction Management
Abdul Ahad, Zishan Raza Khan, Mohammad Khasif Khan
PDF |
48. |
Role of IT in Parking Management
Abdul Ahad, Zishan Raza Khan, Syed Aqeel Ahmad, Mohammad Tayyab
PDF |
49. |
Comparative Study of Plasma and Metallic Antenna
Syed Mohammad Adnan, PallaviAsthana , O. P. Singh, Mohd. Maroof Siddiqui
PDF |
50. |
Applications of Metamaterials for Antenna
Syed Mohammad Adnan, PallaviAsthana, O. P. Singh, Mohd. Maroof Siddiqui
PDF |
51. |
A COMPARATIVE STUDY OF CLUSTERING ALGORITHMS FOR WHEAT DATA
Dileep Kumar Yadav, Maitreyee Dutta
PDF |
52. |
Requirement Elicitation in Mobile Apps: A Review
Bably Dolly, M. Akheela Khanum
PDF |
53. |
Parallel Algorithm for Adding Long Integers
Sanjeev Gangwar, Prashant Kumar Yadav
PDF |
54. |
The Factors of Quality Assurance in Agile Environment
Ayesha Saad, Manish Madhav Tripathi, Preetam Suman
PDF |
55. |
Software Effort Estimation Using Fuzzy Approach
Salma Tarannum, Mohammad Arif, Dr. Shish Ahmad
PDF |
56. |
Software Quality Model - Comparative Study
Falak khursheed, Mohd Haroon, Jameel Ahmad
PDF |
57. |
Distributed Job Processing Approach in Distributed Network
Anwar Ahmad Sheikh, Afsaruddin, Ijtaba Saleem Khan
PDF |
58. |
Software Elicitation Technique
Rudrendra Bahudar Singh, Mohammad Arif , Manish Madhav Tripathi
PDF |
59. |
A Critical Survey on Requirement Prioritization Techniques
Saman Khan, Shish Ahmad, Jameel Ahmad, Mohd Haider
PDF |
60. |
Development Effort, Software Quality and Cycle Time of Software Projects
Sadaf, Jameel ahmad, Afsaruddin
PDF |
61. |
An Analytical Study of Software Estimation Models: A Review
Tabbassum Iqbal, Kavita Agarwal, Jameel Ahmad
PDF |
62. |
A Critical Survey on Quality Models in Software Engineering
Saurabh Pandey, Sheikh Fahad Ahmad, Mohd. Hussain
PDF |
63. |
A Survey on Object-Oriented Software Testing
Harendra Singh Kharkwal, Mohammad Arif, Abu Daud Mohd Fayak, Afsaruddin Khan
PDF |