TOP Most Read Articles in Informatics Engineeringieijjournal
Informatics is rapidly developing field. The study of informatics involves human-computer interaction and how an interface can be built to maximize user-efficiency. Due to the growth in IT, individuals and organizations increasingly process information digitally. This has led to the study of informatics to solve privacy, security, healthcare, education, poverty, and challenges in our environment. The Informatics Engineering, an International Journal (IEIJ) is a open access peer-reviewed
journal that publishes articles which contribute new results in all areas of Informatics. The goal of this journal is to bring together researchers and practitioners
from academia and industry to focus on the human use of computing fields such as communication, mathematics, multimedia, and human-computer interaction design and establishing new collaborations in these areas.
June 2020: Top Read Articles in Advanced Computational Intelligenceaciijournal
Advanced Computational Intelligence: An International Journal (ACII) is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of computational intelligence. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced computational intelligence concepts and establishing new collaborations in these areas.
Non-Invertible Wavelet Domain Watermarking using Hash Function
*Gangadhar Tiwari1, Debashis Nandi 2, Madhusudhan Mishra3
1,2 IT Department, NIT, Durgapur-713209, West Bengal, India,
3ECE Department, NERIST, Nirjuli-791109, Arunachal Pradesh, India,
Secure Image Encryption using Two Dimensional Logistic Map
* Gangadhar Tiwari1, Debashis Nandi2, Abhishek Kumar3, Madhusudhan Mishra4 1, 2Department of Information Technology, NIT Durgapur (W.B.), India 3Department of Electronics and Electrical Engineering, NITAP, (A.P.), India 4Department of Electronics and Communication Engineering, NERIST, (A.P.), India
Visual Perception Oriented CBIR envisaged through Fractals and Presence Score
Suhas Rautmare, Anjali Bhalchandra
A. Tata Consultancy Services, Mumbai B. Govt. College of Engineering, Aurangabad
TOP Most Read Articles in Informatics Engineeringieijjournal
Informatics is rapidly developing field. The study of informatics involves human-computer interaction and how an interface can be built to maximize user-efficiency. Due to the growth in IT, individuals and organizations increasingly process information digitally. This has led to the study of informatics to solve privacy, security, healthcare, education, poverty, and challenges in our environment. The Informatics Engineering, an International Journal (IEIJ) is a open access peer-reviewed
journal that publishes articles which contribute new results in all areas of Informatics. The goal of this journal is to bring together researchers and practitioners
from academia and industry to focus on the human use of computing fields such as communication, mathematics, multimedia, and human-computer interaction design and establishing new collaborations in these areas.
June 2020: Top Read Articles in Advanced Computational Intelligenceaciijournal
Advanced Computational Intelligence: An International Journal (ACII) is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of computational intelligence. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced computational intelligence concepts and establishing new collaborations in these areas.
Non-Invertible Wavelet Domain Watermarking using Hash Function
*Gangadhar Tiwari1, Debashis Nandi 2, Madhusudhan Mishra3
1,2 IT Department, NIT, Durgapur-713209, West Bengal, India,
3ECE Department, NERIST, Nirjuli-791109, Arunachal Pradesh, India,
Secure Image Encryption using Two Dimensional Logistic Map
* Gangadhar Tiwari1, Debashis Nandi2, Abhishek Kumar3, Madhusudhan Mishra4 1, 2Department of Information Technology, NIT Durgapur (W.B.), India 3Department of Electronics and Electrical Engineering, NITAP, (A.P.), India 4Department of Electronics and Communication Engineering, NERIST, (A.P.), India
Visual Perception Oriented CBIR envisaged through Fractals and Presence Score
Suhas Rautmare, Anjali Bhalchandra
A. Tata Consultancy Services, Mumbai B. Govt. College of Engineering, Aurangabad
This presentation consists of the Seminar, provided by me in the partial fulfillment of my Bachelors Degree in G B Pant Engineering College. Seminar included information about Encryption, Decryption, Cryptosystems and Authenticity in crytosystem.
Hypothesis Testing is important part of research, based on hypothesis testing we can check the truth of presumes hypothesis (Research Statement or Research Methodology )
Keeping Your Finger on the Pulse...of Technologycoffeyac
While the library is the heart of the school, the grasp of digital tools is the pulse. Middle and high school librarians, take note. PowToon, Narrable, Vocaroo and Aurasma are some of the tools you can share with teachers and students to breathe new life into the classroom and beyond.
This ppt give an idea about what metamaterial is? how are they formed? and introduces to the techniques to analyze them. A few applications of metamaterials are also mentioned.
June 2022: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
July 2022: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
April 2023: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
I am a Fresher seeking for job. I have Completed my Master in Mechatronics Engineering and Bachelors in Electronics and Communication. I am very Keen to start up Career and i would like to enjoy my professional life.
April 2022: Top Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
This slide gives you the basic understanding of digital image compression.
Please Note: This is a class teaching PPT, more and detail topics were covered in the classroom.
This slide gives you the basic understanding of digital image compression.
Please Note: This is a class teaching PPT, more and detail topics were covered in the classroom.
Basic Introduction about Image Restoration (Order Statistics Filters)
Median Filter
Max and Min Filter
MidPoint Filter
Alpha-trimmed Mean filter.
and Brief Introduction to Periodic Noise
Any Question contact kalyan.acharjya@gmail.com
Image Enhancement: Introduction to Spatial Filters, Low Pass Filter and High Pass Filters. Here Discussed Image Smoothing and Image Sharping, Gaussian Filters
This slides about brief Introduction to Image Restoration Techniques. How to estimate the degradation function, noise models and its probability density functions.
This is the basic introductory presentation for beginners. It gives you the idea about what is image processing means. The presentation consists of introduction to digital image processing, image enhancement, image filtering, finding an image edge, image analysis, tools for image processing and finally some application of digital image processing.
1. CS-Venue No 2 and 4: IAET-2014-Presentation Schedule Details
Sl.
No
1
Code
2
CS39_DL
3
CS85_DL
4
CS30_SM
5
CS5_RJ
6
CS86_RJ
7
CS13_DL
8
CS14_DL
9
CS16_DL
10
CS17_MH
11
CS19_DL
12
CS20_DL
13
CS21_RJ
14
CS23_RJ
15
CS24_RJ
CS42_DL
Venue-2-Date-7th March, 14-Time-12.05 PM to 1.30 PM : Maximum Time for Each Paper Presentation=15 Min : Chair:
Title
Authors and Affiliation
Cryptographic Primitives for
Multimedia Security
Design of Practical Homomorphic
Schemes
Reconnaissance: an offensive defensive
approach
Effect of Beacons Deployment and
Beacons Radio Range on HiRLoc and
RAL Schemes in Wireless Sensor
Networ
Research Of Load Testing And Result
Application Based on Load Runner
Sakshi Dhall, DTU, Delhi, Saibal K. Pal, DRDO, Delhi, Bhavya Bhatia IGIT, DelhiNitin Jain, DTU, delhi, Saibal K. Pal DRDO, Metcalfe House, Delhi
Amandeep kaur ,Amenable.aman@gmail.com
AIACT&R, Guru Gobind Singh Indraprastha University, Delhi
Ranjit Panigrahi and M.K. Ghose, CSE, SMIT, Sikkim
Email: ranjit.panigrahi@gmail.com, mkghose@smu.edu.in
Dr. Manju Kaushik, Associate Professor (Computer Science and Engineering)
JECRC University, Jaipur, India, Email: manju.kaushik@jecrc.edu.in
Pratibha Fageria, M.Tech (Computer science), JECRC University, Jaipur, India
Email: fageria1405@gmail.com
Bhupendra Sharma?,Sukriti Garg?,Chirag Jainyl,The LNM Institute of Information and
Technology,Malviya
National
Institute
of
Technology,
Jaipur,India.,
Email:
bhupendra.sharma@lnmiit.ac.in
An Approximation of ASER for Square
QAM in
Rayleigh Fading Channel for Dual Hop
Relay Link
Bitcoin & Analysis of its Cryptographic
Saibal K. Pal, DRDO, Delhi
Primitives
Nishu Choudhary, Bansthali University
Venue-4-Date-7th March, 14-Time-2.30 PM to 4.00 PM : Maximum Time for Each Paper Presentation=15 Min : Chair:
Design & Implementation of ECC using
Sanjay Kumar1, S.K. Pal2, Ajay Kumar3, SAG, DRDO, Delhi1,2
Koblitz & ElGamal Method
RAC, DRDO, Delhi3
skparsade@gmail.com1, skptech@yahoo.com2, ak_manaw@redffimail.com3
Optimal Pairing & Design of Pairing
Saibal K. Pal, DRDO, Delhi
Friendly Curves
Rajeev Kumar, Arvind University of Delhi
Design of Secure Passports – Physical,
Amit Tandon, Symbiosis Institute of Technology, Pune
Electronic & Mobile
Saibal K. Pal, DRDO, Metcalfe House, Delhi
Design of a Framework for PKI using
Saibal K. Pal, DRDO, Delhi
Elliptic Curve Cryptography
Nishu Choudhary, Bansthali University
Cryptographic Schemes based on
Sanjay Kumar, Saibal K. Pal, DRDO, Metcalfe House, Delhi,
Elliptic Curves over Integer Rings
Sanjay Kumar Kalindi College, Delhi University, Delhi
SOFTWARE REUSABILITY
Dr. Manju Kaushik and Sonali Jain, CSE
METRICS FRAMEWORK FOR
JECRC University, Jaipur, India
COMPONENT-BASED
SOFTWARE DEVELOPMENT
Possible Threats in VOIP and
Dr. Manju Kaushik Associate Professor (Computer Science & Engineering) JECRC University,
Enhancement of Network Security
Yogesh Bhardwaj M.Tech. (Computer Science) JECRC University, Jaipur, India
A Survey on Web Cache Techniques
Dr. Manju Kaushik , Pramod Saxena and Suyash Raizada, JECRC
used for Web Performance Tuning
Any discrepancies or request send us mail at: iaet.2014@jnujaipur.ac.in.
Remarks
2. CS-Venue No 2 and 4: IAET-2014-Presentation Schedule Details
16
CS26_UP
17
CS3_UP
18
CS32_RJ
19
CS36_DL
20
CS40_DL
21
CS46_RJ
22
CS50_RJ
23
CS52_RJ
24
CS54_HP
24
CS56_UP
25
CS58_RJ
26
CS6_RJ
27
CS60_TRI
28
CS61_JK
Venue-4-Date-7th March, 14-Time-4.00 PM to 5.30 PM : Maximum Time for Each Paper Presentation=15 Min : Chair:
Software Process Models: A
Mr. Vikash Atri, Mr. Ajay Singh, Mr. Subodh Kumar and Mr. Pankaj Varshney, Manglaytan
Comparative Study
University, Aligarh, vkatri777@gmail.com , ajaysingh853@gmail.com
A Framework for Service Categorization
and Requirement Gathering along with
Discovery and Negotiation Threads of
new Services in Service Oriented
Architecture (SOA)
WEB APPLICATION TESTING
USING PENETRATION TESTING
Image Encryption using
3D Chaotic Maps
Biometric based Security Solutions
for Mobile Devices
A COMPARATIVE STUDY OF WEB
SERVICE TESTING TOOLS FOR
FUNCTIONAL REQUIREMENTS
ANDROID AND PATTERN
ANALYSIS
Ashutosh Shukla NIKHIL SHUKLA
Computer Application Department
College of Management Studies, Unnao
DR.VIRENDRA SWARUP GROUP OF
INSTITUTIONS, UNNAO. , 7505426186
Mr. Ajay Kumar#1, Miss. Urmi Chhajed, #Computer Science, JECRC University Jaipur, E-mail
ajay.kumar@jecrcu.edu.in, chhajed.urmi@gmail.com
Bhavya Bhatia, IGIT, delhi, Saibal Pal, DRDO and Sakshi Dhall, DTU, Delhi
Aditi Bhateja, AIT, GGSIP University, Delhi, Saibal K. Pal, A.K. Bhateja DRDO, Metcalfe House,
Delhi
Dr. Manju Kaushik , Garima Singh , JECRC University, Jaipur
Ankit Gangwal [1], Megha Gupta [2] Assistant Professor, Assistant Professor
Dr. Radhakrishnan Institute of Technology, Jaipur, India
Venue-4-Date-8th March, 14-Time-11.15 PM to 1.30 PM : Maximum Time for Each Paper Presentation=15 Min : Chair:
The Y2K38 Bug
Twinkle Mishra MCA (2014) Banasthali University, Jaipur Campus, Jaipur, India
twinklemishra679@gmail.com
An Efficient Round robin
Mohit Sharma1, Suman Saha2Dept. of CSE, JUIT, Waknaghat, Solan, H.P., INDIA
Minimum Spanning Tree
mailtomskaushik@gmail.com1 , saha.suman@gmail.com2
Algorithm in MapReduce
Framework
Impact of Network Size and Traffic to
Shubham#1, Lalit Sagar#2, Vinay Rishiwal#3 Ideal Institute of technology, Ghaziabad, UP, India.
1
Adhoc Routing Protocols over Different
shubhamr71421@gmail.com, 2lksagar@rediff.com
#3
IDM Models in VANETs
MJP Rohilkhand University, Bareilly, India. 3vinayrishiwal@rediffmail.com
Best image selection for data encryption
Nidhi Garg1,,Rahul Gupta2 JNU(CS),Jaipur, Rajasthan, India
based on the image’s capacity to hide
MIT(IT),Manipal,Karnataka,India, nidhigargjaipur@gmail.com, rahul.gupta.engg@gmail.com
data
Real time smart and robust skin color
Jankey Bhallabh Soni Manipal University Jaipur jankeybhallabhsoni@muj.manipal.edu
detection using openCV
Profile Based Access Control Model in
Suyel Namasudra1, Samir Nath2, Abhishek Majumder3
Cloud
Department of Computer Science & Engineering
Computing Environment
Tripura University (A Central University) Suryamaninagar, Tripura West, India
1suyelnamasudra@gmail.com, 2pranrd2010@gmail.com, 3enggtu@gmail.com
Author Name Disambiguation Using
Tasleem Arif1, M. Asger2, Rashid Ali3 1Department of Information Technology
Two Stage Clustering
BGSB University Rajouri-J&K tasleem.ap@gmail.com
2
School of Mathematical Sciences & Engineering BGSB University Rajouri-J&K
Any discrepancies or request send us mail at: iaet.2014@jnujaipur.ac.in.
3. CS-Venue No 2 and 4: IAET-2014-Presentation Schedule Details
29
CS63_TN
SMART TOOTHY
m_asger@yahoo.com 3College of Computers & Information Technology
Taif University-Saudi Arabia rashidaliamu@rediffmail.com
B.S.Sanjeev kumar1 , K.S.M.Praveen2 , G.Komarasamy3
1,2,3Department of CSE, Bannari Amman Institute of Technology, Sathyamangalam, India
1bssanjeevcse94@gmail.com , 2praveenravi208@gmail.com,
3komarasamyg@bitsathy.ac.in
30
CS65_RJ
SQL Injection Attacks on Web
Applications
CS66_MH
32
CS68_PN
33
CS69_HR
34
CS7_RJ
Challenge and Seurity issues of Cloud
computing in Technical Education
35
CS71_UK
Particle Swarm Optimization Technique
for Discrete Tomography
36
CS72_UP
Impact of Mobility Models on
MANETs Routing Protocols
37
CS73_DL
Efficient and Secured Video Encryption
Scheme for Lightweight Devices
CS77_MH
39
CS78_RJ
1Chandershekhar.sharma@gmail.com
2vinodkrmenaria@gmail.com Dr S.C. Jain Professor in Computer Engineering Department
Technical University Kota, India
Rajasthan Technical University Kota, India 2Scjain1@yahoo.com
DATA SECURITY AND PRIVACY IN Trupti Shah, Prof. M.D. Ingle Dept. of Computer Engineering, JSCOE
WIRELESS BODY AREA
Pune University Pune, Maharashtra, India
NETWORKS
trups13@gmail.com ingle.madhav@gmail.com
Venue-4-Date-8th March, 14-Time-2.30- PM to 4.00 PM : Maximum Time for Each Paper Presentation=15 Min : Chair:
Artificial Neural Networks – A Boon for Gagandeep Jagdev#1,Tejinder Singh#2,Sukhpreet Singh#3
Medical Science and Character
#1 Dept. of Computer Science, Punjabi University Guru Kashi College, Damdama Sahib (PB), India.
Recognition
#2#3Students (M.C.A.), Guru Kashi University, Damdama Sahib (PB), India.
#1gagans137@yahoo.co.in, #2tejindersidhu008@gmail.com, #3sukhis005@gmail.com
Noise Robustness Investigation of
Mamta#1, R.K. Aggarwal#2 Computer Engineering Department, National Institute of Technology
Feature Extraction Techniques
Kurukshetra, Indi 1er.mamta.dabra@gmail.com, 2rka15969@gmail.com
31
38
Chandershekhar Sharma#1 Dr S.C. Jain*2 Vinod Kumar Menaria#3 #Research scholar, Rajasthan
Nilam Coudhary[1], Prof.(Dr.)Baldev Singh[2], Tarannum Sheikh[3]
Research Scholar, CSE, SGVU, Jaipur, Rajasthan, India[1] Professor, CSE,VIT, Jaipur, Associate
Professor, CSE, VIT, Jaipur, Rajasthan, India[3]
Narender Kumar, Roopa Kumari2 Department of Computer Sc. Engg, HNB Garhwal
University,Srinagar Uttrakhand, India narenrawal@gmail.com
, narenrawal@gmail.com
Subodh Kumar#1, G.S. Agrawal#, Sudhir Kumar Sharma*2
#
Institute of Computer Applications, Mangalayatan University, Beswan, Aligarh-U.P. (India)
1
Subodh.sharma@mangalayatan.edu.in *IET, Jaipur National University, Jaipur-Raj. (India)
2
sudhir.732000@gmail.com
Rajan Gupta*, Neeharika Chaudhary*, Anika Garg*, Saibal K. Pal*, *Department
of Computer Science, University of Delhi, Delhi - 110007, INDIA **Scientific
Analysis Group Lab, DRDO, Metcalfe House, Delhi - 110054, INDIA Email:
guptarajan2000@gmail.com, neear13@gmail.com
Venue-4-Date-7th March, 14-Time-12.05 PM to 1.30 PM : Maximum Time for Each Paper Presentation=15 Min : Chair:
A Framework for Design &
Amit Tandon1, Saibal K. Pal21Department of Computer Engineering, Symbiosis International
Management of Secure Societies
UniversitySymbiosis Institute of Technology, Pune, Maharashtra, India,2Scientific Analysis Group,
DRDOMetcalfe House, Delhi, India1amittandon94@gmail.com, 2skptech@yahoo.com
Cloud computing: future pillar for eShivangi Singh, Rishank Singh
governance
School. Of computer Science, Jaipur National University, SADTM Jagatpura, Jaipur-302017, Rajasthan,
India School of Computer Science, Swami Keshvanand institute of technology, management and
Any discrepancies or request send us mail at: iaet.2014@jnujaipur.ac.in.
4. CS-Venue No 2 and 4: IAET-2014-Presentation Schedule Details
40
CS79_RJ
41
CS80_AP
42
CS81_GJ
43
CS82_PN
44
CS83_RJ
45
CS84_RJ
46
CS87_DL
47
CS88_RJ
48
CS89_HR
49
CS34_RJ
50
CS11_UP
51
CS45_RJ
Numeral Recognition of Four
Scripts: Bengali-Assamese, Gujarati,
Oriya, Nepali
Soft Computing Techniques for Privacy
Preserving Data Mining
IMPROVEMENTS IN AGILE MODEL
USING
HYBRID THEORY FOR SOFTWARE
DEVLOPMENT
IN
SOFTWARE
ENGINEERING
Cryptosystem Identification and Key
Clustering using Artificial Neural
Networks
gramothan, SKIT Ramnagaria, Jaipur-302017, Rajasthan, India, smilingshivangi11@gmail.com
Rishank19@rediffmail.com
1Manubolu Sreenivasulu,2Prasenjit Kumar Das,3Mr. Rishi Mathur, Dept. Of Computer Science &
Engineering,Manipal University Jaipur,Jaipur.manubolusreenivasulu@muj.manipal.edu
2prasenjitkumardas@muj.manipal.edu ,rishimathur@jaipur.manipal.edu
Sridhar Mandapati #1, Raveendra Babu Bhogapathi#2
#1Associate Professor, Department of Computer Applications, R.V.R & J.C College of Engineering,
Guntur, India. mandapati_s@yahoo.com
#2Professor, Department of Computer Science & Engineering, VNR VJIET, Hyderabad, India.
rbhogapathi@yahoo.com
Ratnmala Raval, Haresh M Rathod, Computer Department, RK University
Kasturbadham-Rajkot-Gujrarat- India Ratnmala.Raval@gmail.com Haresh.Rathod@rku.ac.in
AK Bhateja Member of IEEE,Defence Research & Development Organization
Delhi, India, akbhateja@gmail.com Ankita Gupta Department of Electronics and Communication
Thapar UniversitPunjab, Indi, oshu.gupta@gmail.com, Sonali Jain Department of Computer Scienc,
MaharshiDayanand University Rohtak, Indi, sonalijain104@gmail.com
Venue-5-Date-8th March, 14-Time-11.15 PM to 1.30 PM : Maximum Time for Each Paper Presentation=15 Min : Chair:
Energy Efficient Information Collection Sandeep Swami1, Jitendra Singh Yadav2,M. Tech, Department CSE, JECRC University, Jaipur, India
in Wireless Sensor Networks Using ,Assistant Professor, Department CSE, JECRC University, Jaipur, India 2
Adaptive Compressive Sensing Energy sswami2@gmail.com1, jitendra.yadav@jecrcu.edu.in2
Efficiency Scheduling for WSN
A Review on Security Challenges in Aiman Rais1, Pratima Sharma2, Neetu Thomas3,1, 2, 3 Department of Electronics and Communication
Cloud Computing
Engineering,, Jaipur National University, Jaipur, India
Corresponding Author E-mail Id- aimanrais@gmail.com
A Proposed Framework for Enhancing Himanshu Chaudhary1, Aditi Bhateja2 and Javed Ahmed Khan3
Security of SHA-2
AIACT&R, Guru Gobind Singh Indraprastha University, Delhi, India, lavi10000@gmail.com
aditibhateja89@gmail.com, javedahmad1989@gmail.com
An
Intensified
Steganographic Manoj Kumar Sharma #1, Abhishek Gaurav#2
Algorithm for Cover Images Using GI #1 Ph.D. Scholar, Jaipur National University, Rajasthan, India
Algorithmic Approach
#2 B. Tech. CS (3rd year), Jaipur National University, Rajasthan, India
1manoj186@yahoo.co.in, abhishekgaurav.sci@gmail.com
Comparative Study of
Acoustic Rajan Mehla#1, R.K. Aggarwal#2 Computer Engineering Department, National Institute of Technology
Modeling Techniques
Kurukshetra, India, rajanmehla@gmail.com, rka15969@gmail.com
Efficient Schema Generator algorithm
Dr. Surender Kumar Yadav and Mr. Rahul Kumar Shrivastava
using Data mining techniques.
JECRC University
Impact of I.T. Innovation in retail sector Mr. Jitendra Singh Lecturer, IBM, Mangalayatan University, Beswan-Aligarh
Seema Gupta Asst. Prof., Mgmt. Deptt., Anand Engineering College, Agra.
Dr. Manju Kaushik, Aditi Jain and Nitesh Dugar, JECRC
CHALLENGES TO BIG DATA
SECURITY AND PRIVACY
Any discrepancies or request send us mail at: iaet.2014@jnujaipur.ac.in.