National Conference on Current Research Trends in CLOUD COMPUTING & BIG DATA held at Jaipur National University
Prediction of Student’s Academic Performance using Clustering Prof. Prashant Sahai Saxena, Prof. M. C. Govil |
1-6 |
Ant Colony Optimization – A Prologue AASHDEEP SINGH, V. S. DHAKA, Gurpreet Singh |
7-11 |
Suitability of Ant Colony Optimization as an Application to MANET Amanpreet Kaur, V. S. Dhaka, Gurpreet Singh, T. P. Singh |
12-16 |
Estimating Performance of TCP Alternatives in Wireless Environment Neha Bathla, Amanpreet Kaur, Gurpreet Singh |
17-22 |
A Secure Hardware Based Multifarious Component Authentication Technique Using USB for Cloud Environment Ankit Dhamija, Deepika Dhamija |
27-32 |
Mining Weighted Frequent Patterns using 'Weighted_FPGrowth’ - A modified FP-Growth Deepak Sinwar, Dr. V. S. Dhaka |
33-36 |
A Model for Classification of Issues and Strategies Related To Smart Phones Applications Testing Deepika Dhamija |
37-41 |
Automatic e-mails Classification Using Genetic Algorithm Mandeep Choudhary, V. S. Dhaka |
42-49 |
Developing a CAPTCHA Utilizing Cognitive Ability of Human through PHP Dr. Vijay Dhaka, Mrs. Geeta Gandhi |
50-54 |
Performance Evaluation of Mobile Agent within Domain Using Security Bank Hans Raj, Dr. V.S. Dhaka |
55-57 |
A Study on Recent Trends and Workload Prediction Requirements of Cloud Computing Supreet Kaur Sahi, Dr. V.S.Dhaka |
58-61 |
Speech Recognition: A Review Manoj Kumar Sharma, Omendri kumari |
62-71 |
A Framework for Big Data Analytics as a Scalable Systems Himanshu Shekhar, Manoj Sharma |
72-82 |
Automatic Number Plate Recognition - Approch for Detecting the Vehicle Number Plate On-The-Go Priti Rajvanshi |
83-89 |
Study of MANET Routing Protocols Harshita Tuli, Dr. Sanjay Kumar |
90-93 |
Character Recognition of Offline Handwritten English Scripts: A Review V. S. Dhaka, Manoj Kumar, Harshit Sharma |
94-103 |
Segmentation of Lung Nodule Using Image Processing Techniques from CT Images Santosh Singh, Ritu Vijay, Yogesh Singh |
104-107 |
Decision Support System: A Step towards Improved and Efficient Decision Making in Government Organization Vijay Pal Dhaka, Pooja Nahar |
108-113 |
Offline Handwritten English Script Recognition: A Survey V. S. Dhaka, Manoj Kumar, Prashant Chaudhary |
114-124 |
Optimization Technique in Optical Interconnection Network Vishal Choudhary, Madan Singh |
125-128 |
A Symmetric Key Based Framework for Data Security in Cloud Computing Mrinal Kanti Sarkar, Dr. V S Dhaka, Rupayan Das |
129-134 |
Lossless Image Compression having Compression Ratio Higher than JPEG Madan Singh, Vishal Chaudhary |
135-139 |
Data Management and Big Data Text Analytics
Zaheeruddin Ahmed |
140-144 |
Comparability of Conventional Network and Neural Network Techniques for Image Enhancement Methods
Mamta Sakpal, Nitin Jain |
145-148 |
Tending to Security Issues in Cloud Computing Sumati Manchanda, Manpreet Singh Bajwa |
149-152 |
Scrutinizing Various Approaches towards Green Cloud Computing Sumati Manchanda, Manpreet Singh Bajwa |
153-158 |
Facial Expression Recognition: A Review Dr. Sanjay Kumar, Ayushi Gupta |
159-162 |
A Review: English Online Handwriting Recognition PratishrutiSaxena |
163-169 |
Modern Compiler Design: An approach to make Compiler Design a Significant Study for Studentse Namit Bhati |
170-175 |
A Survey on Rule Extraction for Achieving a Trade off Between Accuracy and Comprehensibility Vikash Gupta, Mamta Sakpal Surve |
176-179 |
Comparative Study of Reactive Routing Protocols for MANETs Keren Lois |
180-183 |
Data Mining in Education Sector: A Review Jaya Srivastava, Dr Abhay Kumar Srivastava |
184-190 |
HPCC System and its Future Aspects in Maintaining Big Data Tarun Goya, Ved Prakash Upadhyay, Bhartendu Shrimali |
191-194 |
Analysis of different Routing Protocols in Mobile Ad Hoc Network (MANET) Latika Mehrotra |
195-200 |
Security and Data Compression in Cloud Computing Using BlobSeer Technique Ashwin Dhivakar M R, Prof. D Ravichandran, Dr. Vijay Dakha |
201-203 |
Common Fixed Point of Compatible and Weakly Compatible Maps in Fuzzy Metric Spaces Dr. DEEPTI SHARMA, NIDHI SHARMA |
204-207 |
Feature Extraction Techniques Based on Color Images Dr. Sanjay Kumar, Ankur Chauhan |
208-214 |
Multi-Level authentication in Cloud Computing using 3D security Jeena Jha, Jalak Pansuriya |
215-218 |
Copyright © All rights reserved | by IJANA - The International Journal of Advanced Networking and Applications, Published by Eswar Publications.