ICETEAS 2018: Author IndexAuthor | Papers |
---|
C | Chawla, Harshita | Security Challenges and Application for Underwater Wireless Sensor Network | Chhipa, Indu | Design and Implementation of Modified Butterworth Filter for Watermarking | D | Dahiya, Neeraj | Data Mining and its Various Concepts | Dalal, Surjeet | Data Mining and its Various Concepts | Dipakkumar Pandya, Darshanaben | Detection of Anomalous Value in Data Mining. | G | Gaur, Sanjay | Detection of Anomalous Value in Data Mining. | Goyal, Jayanti | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing | Gupta, Hemant Kumar | Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis | Gupta, Nishi | Unlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India | Gupta, Priya | A Survey Paper on Different Steganography Technique | Gupta, Rohita | Design and Implementation of Modified Butterworth Filter for Watermarking | J | Jain, Arihant Kumar | A Review of Face Recognition System Using Raspberry Pi in the Field of IoT | K | Kalani, Geet | Utility of Li-Fi in Railways | Kumar, Sarvesh Kumar | Security Challenges and Application for Underwater Wireless Sensor Network | Kumari, Bersha | Security Challenges and Application for Underwater Wireless Sensor Network | L | Lavania, Geerija | Comparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks | Li, Congmiao | Malware Detection for Cyber Security Enhancement in Smart Grid | M | Mitra, Priyanka | Abnormality Detection in Brain CT Image Using Support Vector Machine | O | Ojha, Garima | Utility of Li-Fi in Railways | P | Porwal, Arpit | Utility of Li-Fi in Railways | R | Raj, Ankur | A Survey Paper on Different Steganography Technique | Rana, Sanjeev | Unlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India | Reindl, Thomas | Malware Detection for Cyber Security Enhancement in Smart Grid | S | Saxena, Akash | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing | Saxena, Chhavi | Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis | Saxena, Shubhra | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing | Sharma, Anima | A Review of Face Recognition System Using Raspberry Pi in the Field of IoT | Sharma, Avinash | Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis Unlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India | Sharma, Bhavna | Abnormality Detection in Brain CT Image Using Support Vector Machine | Sharma, Manish | Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud | Sharma, Manu | Reliablity in the Fog Computing | Sharma, Navneet | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing | Sharma, Preeti | Comparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks | Sharma, Richa | A Review of Face Recognition System Using Raspberry Pi in the Field of IoT | Sharma, Shilpi | Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud | Sikri, Alisha | Data Mining and its Various Concepts | Singh, Netra Pal | Data Mining and its Various Concepts | Singh, Shashi Kant | A Survey Paper on Different Steganography Technique | Somwanshi, Devendra Kumar | Design and Implementation of Modified Butterworth Filter for Watermarking | Srinivasan, Dipti | Malware Detection for Cyber Security Enhancement in Smart Grid | U | Upadhyay, Richa | Comparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks | Upadhyaya, Vivek | Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis | Y | Yadav, Seema | A Survey Paper on Different Steganography Technique |
|
|