ICETEAS 2018: Author Index| Author | Papers |
|---|
| C | | Chawla, Harshita | Security Challenges and Application for Underwater Wireless Sensor Network | | Chhipa, Indu | Design and Implementation of Modified Butterworth Filter for Watermarking | | D | | Dahiya, Neeraj | Data Mining and its Various Concepts | | Dalal, Surjeet | Data Mining and its Various Concepts | | Dipakkumar Pandya, Darshanaben | Detection of Anomalous Value in Data Mining. | | G | | Gaur, Sanjay | Detection of Anomalous Value in Data Mining. | | Goyal, Jayanti | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing | | Gupta, Hemant Kumar | Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis | | Gupta, Nishi | Unlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India | | Gupta, Priya | A Survey Paper on Different Steganography Technique | | Gupta, Rohita | Design and Implementation of Modified Butterworth Filter for Watermarking | | J | | Jain, Arihant Kumar | A Review of Face Recognition System Using Raspberry Pi in the Field of IoT | | K | | Kalani, Geet | Utility of Li-Fi in Railways | | Kumar, Sarvesh Kumar | Security Challenges and Application for Underwater Wireless Sensor Network | | Kumari, Bersha | Security Challenges and Application for Underwater Wireless Sensor Network | | L | | Lavania, Geerija | Comparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks | | Li, Congmiao | Malware Detection for Cyber Security Enhancement in Smart Grid | | M | | Mitra, Priyanka | Abnormality Detection in Brain CT Image Using Support Vector Machine | | O | | Ojha, Garima | Utility of Li-Fi in Railways | | P | | Porwal, Arpit | Utility of Li-Fi in Railways | | R | | Raj, Ankur | A Survey Paper on Different Steganography Technique | | Rana, Sanjeev | Unlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India | | Reindl, Thomas | Malware Detection for Cyber Security Enhancement in Smart Grid | | S | | Saxena, Akash | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing | | Saxena, Chhavi | Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis | | Saxena, Shubhra | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing | | Sharma, Anima | A Review of Face Recognition System Using Raspberry Pi in the Field of IoT | | Sharma, Avinash | Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis Unlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India | | Sharma, Bhavna | Abnormality Detection in Brain CT Image Using Support Vector Machine | | Sharma, Manish | Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud | | Sharma, Manu | Reliablity in the Fog Computing | | Sharma, Navneet | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing | | Sharma, Preeti | Comparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks | | Sharma, Richa | A Review of Face Recognition System Using Raspberry Pi in the Field of IoT | | Sharma, Shilpi | Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud | | Sikri, Alisha | Data Mining and its Various Concepts | | Singh, Netra Pal | Data Mining and its Various Concepts | | Singh, Shashi Kant | A Survey Paper on Different Steganography Technique | | Somwanshi, Devendra Kumar | Design and Implementation of Modified Butterworth Filter for Watermarking | | Srinivasan, Dipti | Malware Detection for Cyber Security Enhancement in Smart Grid | | U | | Upadhyay, Richa | Comparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks | | Upadhyaya, Vivek | Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis | | Y | | Yadav, Seema | A Survey Paper on Different Steganography Technique |
|
|