Article Title |
Authors Name |
Volume, Issue |
Page Nubmers |
Download papers |
Hamburg Notation System |
Maninder Kaur , Sandeep kaur |
Volume 2, Issue 1 |
1-5 |
Download-pdf |
HamNoSys for Indian Sign Language |
Sandeep Kaur , Maninder Singh , Pardeep Kaur |
Volume 2, Issue 1 |
6-10 |
Download-pdf |
Comparative Analysis of Iterative Waterfall Model and Scrum |
Charanpreet Kaur, Vijay Kumar |
Volume 2, Issue 1 |
11-14 |
Download-pdf |
A Study on Efficient Energy Utilization by Data Centers in Cloud Computing |
Baljinder Aujla, Arvinder Kaur |
Volume 2, Issue 1 |
15-20 |
Download-pdf |
Test Case Prioritization on Regression Testing by Using FTV |
Pratibha, Ishdeep Singla |
Volume 2, Issue 1 |
21-26 |
Download-pdf |
Framework for Covering the Limitations of Web Accessibility Improvement Tools |
Navdeep Kaur, Vijay Kumar |
Volume 2, Issue 1 |
27-31 |
Download-pdf |
Review on the Models of Access Control for Cloud Computing |
Gagandeep Kaur, Arvinder Kaur |
Volume 2, Issue 1 |
32-36 |
Download-pdf |
Analysis of Tools and Techniques in cryptography |
Prof. (Dr.) Amit Verma , Anjali Gakhar |
Volume 2, Issue 1 |
37-44 |
Download-pdf |
Development and Analysis of Software technique in CBSE environment using Feed Forward Neural Network |
Prof. (Dr.) Amit Verma , Pardeep kaur |
Volume 2, Issue 1 |
45-50 |
Download-pdf |
Review on Neural Network Used for Efficient Text Data Classification |
Sandeesh kaur , Parminder Kaur , Sumit Kaur |
Volume 2, Issue 1 |
51-59 |
Download-pdf |
OP: Optimization of Application Packaging Design |
Nataraj.J , Prof. KamalaKannan .J |
Volume 2, Issue 2 |
60-63 |
Download-pdf |
MPN: Monitoring the Proximity of Malware Propagation in Wireless Sensor Network |
Nataraj.J , Prof. KamalaKannan .J |
Volume 2, Issue 2 |
64-67 |
Download-pdf |
Smart Attendance System Using Face Recognition |
Chaudhari Sagar P , Kulkarni Satyajit Devidas , Prof G.R Surawanshi |
Volume 2, Issue 2 |
68-72 |
Download-pdf |
Framework for Web Personalization Using Neural Network |
Ramandeep Kaur , Iqbaldeep Kaur |
Volume 2, Issue 2 |
73-77 |
Download-pdf |
E-ZET: Enhanced Zone and Energy Threshold Based Clustering Routing Protocol Using Greedy Algorithm and Ant Colony Optimization in Wireless Sensor Networks |
Gurpreet kaur , Vinay Bhardwaj |
Volume 2, Issue 2 |
78-82 |
Download-pdf |
Techniques on Prioritization of Software Testing: A Review |
Pratibha , Isha Sharma |
Volume 2, Issue 2 |
83-87 |
Download-pdf |
Cyclostationary Feature Detection in CRN |
Kriti , Vikas Wasson |
Volume 2, Issue 2 |
88-93 |
Download-pdf |
Query Based System for Data Retrieval |
Ankita Sharma , Parminder Kaur |
Volume 2, Issue 2 |
94-97 |
Download-pdf |
Message Exchange Format Using Automatic Protocol Reverse Engineering |
Yamini Pathania , Gurpreet Kaur |
Volume 2, Issue 2 |
98-103 |
Download-pdf |
Compatibility Testing of Component Based Software Modules using Boltzmann Learning |
Parul Rajpal , Amanpreet Kaur |
Volume 2, Issue 2 |
104-108 |
Download-pdf |
Human Opinion Dynamics for Software Cost Estimation |
Ruchi Puri , Iqbaldeep kaur |
Volume 2, Issue 2 |
109-117 |
Download-pdf |
Study on Software Cloning Concept |
Amandeep , Akwinder Kaur |
Volume 2, Issue 2 |
118-121 |
Download-pdf |
Comparative Analysis of Automated Web Accessibility Tools for Developing and Evaluating Accessible Websites |
Navdeep Kaur , Vijay Kumar |
Volume 2, Issue 2 |
122-125 |
Download-pdf |
PCA Based Improved Feature Selection Using Software Metrics Correlation Data for Improved Decision Making |
Shweta, Sugandha, Rupinder Singh |
Volume 2, Issue 2 |
126-131 |
Download-pdf |
Component Retrieval and Clustering for Component Reusability Paradigm |
Iqbaldeep Kaur, Satvir Kaur |
Volume 2, Issue 2 |
132-142 |
Download-pdf |
A Hybrid Chaotic Based Encryption Security in Cloud Computing |
Jaspreet Mahal, Sugandha Sharma |
Volume 2, Issue 2 |
143-147 |
Download-pdf |
Web Personalization: As A Key to Relevant And Precise Information |
Ramandeep Kaur, Iqbaldeep Kaur |
Volume 2, Issue 2 |
148-150 |
Download-pdf |
Design an Algorithm for Face Recognition Using Zernike Moments and Neural Network |
Amit Verma, Charanjeet Kaur, Shruti Gujral |
Volume 2, Issue 2 |
151-154 |
Download-pdf |
Design and Develop an Algorithm for Face Recognition Using Feed Forward Neural Network and Zernike Moment |
Amit Verma, Charanjeet Kaur, Shruti Gujral |
Volume 2, Issue 2 |
155-159 |
Download-pdf |
Design and Develop an Algorithm for Face Recognition Using Feed Forward Neural Network and Zernike Moment |
Amit Verma, Charanjeet Kaur, Shruti Gujral |
Volume 2, Issue 2 |
155-159 |
Download-pdf |
To Enhance A-KNN Algorithm for Improving Software Architecture |
Poojia Gupta, Gurpreet Kaur |
Volume 2, Issue 2 |
160-166 |
Download-pdf |
Automatic Text Classification Using Neural Network |
Dr. Amit Verma, Parminder Kaur, Sandeesh Kaur |
Volume 2, Issue 2 |
167-175 |
Download-pdf |
Agile Software Development Methodologies and Comparative Study of Agile v/s Traditional Approach |
Ankita Sharma, Sumit Kaur, Charanjeet Kaur |
Volume 2, Issue 2 |
176-178 |
Download-pdf |
A Study of Red and White Blood Cell Counting Using Watershed Algorithm: A Review |
Manpreet Bawa, Meenakshi Garg |
Volume 2, Issue 2 |
179-181 |
Download-pdf |
An Energy Transmission Control Leach Protocol: A Review |
Ramandeep Singh, Vinod Sharma |
Volume 2, Issue 2 |
182-185 |
Download-pdf |