Article No. |
Name of Author and Article |
Page No. |
1. |
Payal Pahwa, Manju Papreja |
1 – 4 |
2. |
Payal Pahwa, Rashmi Chhabra |
5 – 7 |
3. | Deepali Virmani, Ankita Soni, Nikhil Batra Reliability Analysis to Overcome Black Hole Attack in Wireless Sensor Network |
8 – 13 |
4. | Deepali Virmani, Manas Hemrajani, Shringarica Chandel Exponential Trust Based Mechanism to Detect Black Hole attack in Wireless Sensor Network |
14 – 16 |
5. |
Daya Gupta, Payal Pahwa, Rajiv Arora |
17 – 20 |
6. |
Shweta Taneja, Shashank Khanna, Sugandha Tilwalia, Ankita A Hybrid C- Tree Algorithm for Privacy Preserving Data Mining |
21 – 24 |
7. |
Niranjan Bhattacharayya, Akshay Kumar Singh, Siddhant Kapil, Harshul Jain, Abhishek Jain Traffic Light Solution for U.G.V. Using Digital Image Processing |
25 – 27 |
8. | Rajat Jangir, Sagar Bajaj, C.M. Sharma, Akshit Pandey Content Based Scheduling of Virtual Machines using Merkle Tree |
28 – 33 |
9. | Deepali Virmani, Vikrant Malhotra, Ridhi Tyagi Sentiment Analysis Using Collaborated Opinion Mining |
34 – 37 |
10. | Arushi Jain, Pooja Mudgil, Rachna Dabla, Kalyani Satapathy Android Based Tracking Application– DOPE HUNT |
38 – 41 |
11. | Bhawna Suri Continuous New OLAP Operations on Data Streams |
42 – 46 |
12. | Aastha Gupta, Rachna Rajput, Richa Gupta, Monika Arora Improved POS Tagging for Unknown Words |
47 – 50 |
13. | Babita G. Kataria, A.K.Saini, Sangeeta Gupta Implementation Status of Health Care Information System: A Study of Some of the States of Northern India |
51 – 54 |
14. | S.S. Prasad, Sonali Mathur, Sonal Singh Border Security up Gradation using Data Mining |
55 – 60 |
15. | Anshu Bharadwaj, Sonajharia Minz Inductive-Analytical Learning based Stepwise Support Vector Machine (SVM) Model |
61 – 64 |