S.No. |
Title and Authors of Paper |
Page.No. |
01 |
A Brief Survey for investigating factors behind Cryptocurrency Systems
Sunil Kumar R.M |
535-538 |
02 |
Building A Vietnamese-Ede Machine Translation System For The Weather Bulletins
Hoang Thi My Le, Hoang Le Uyen Thuc |
539-543 |
03 |
A Review Based Web Mining for Online Store Selection
Sanjeev P. Kaulgud |
544-548 |
04 |
NOVEL AND EFFICIENT SCHEME FOR THAT GUARANTEED DATA CONFIDENTIALITY USING CRYPTOGRAPHIC KEYS
Md Fayyaz Ahmed, Md Ateeq Ur Rahman |
549-554 |
05 |
SECURELY MAINTAINED CONFIDENTIALITY OVER ACCESS CONTROL METHOD IN CLOUD-BASED SERVICES
Mohd. Abrar ul haq ansari, MdAteeq Ur Rahman |
555-560 |
06 |
EFFECTIVELY SECURED LITERATURE ANALYTICS: EXPECTATIONS AND PRACTICES
Afreen Firdos, MdAteeq Ur Rahman |
561-567 |
07 |
INTEREST FEEDBACK OF IPTV USERS BASED ON COMMUNAL PUBLIC ACTIVITY PULSE
Altafattar, MdAteeq Ur Rahman |
568-575 |
08 |
Study of mobility issues and different types of attacks on Smartphone
Tejas amrut patil, Shraddha Subhash gujar |
576-581 |
09 |
ACCOMPLISHING SECURE, WORLDWIDE AND FINE GRAINED QUERY RESULTS VERIFICATION FOR SAFE SEARCH SYSTEM OVER ENCRYPTED CLOUD RECORD
SAMEENA ANJUM,Prof. Shivleela Patil |
582-586 |
10 |
MOBILE MALICIOUS WEBPAGES IDENTIFICATION IN REAL TIME
ZAMIN, Prof. Jyoti Neginal |
587-592 |
11 |
AUTOMATIC WASTE SORTING BASED ON IMAGE PROCESSING
Mohini Ghuge, Dr. S. N. Bhadoria |
593-595 |
12 |
EFFECTIVELY SERVING MALEVOLENT USERS IDENTIFICATION OVER BENEFICIAL CROWDSOURCING IN LARGE-SCALE SOCIAL NETWORKS
Md Saifullah, Md Ateeq Ur Rahman |
596-601 |
13 |
Optimization of Assignment Plan of Workers to Jobs in Kere Farms
Agarana M. C, Okon E. J, Bassey A.I, Makinde O.S, Emmanuel A.I |
602-605 |
|
Remaining Papers will be available soon…. |
|