| Study of Named Entity Recognition for Indian Languages |
| Hinal Shah, Prachi Bhandari, Krunal Mistry, Shivani Thakor, Mishika Patel and Kamini Ahir, UKA Tarsadia University, India |
| Volume : 6 volume number : 1 pdf |
| Cloud Computing - Key Pillar for Digital India |
| Kirtankumar R. Rathod, Indus University, India |
| Volume : 6 volume number : 1 pdf |
| Cloud Computing - Key Pillar for Digital India |
| Kirtankumar R. Rathod, Indus University, India |
| Volume : 6 volume number : 1 pdf |
| A Survey of Big Data Analytics |
| Nirali Honest and Atul Patel, Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, India |
| Volume : 6 volume number : 1 pdf |
| Techniques for Attacking Web Application Security |
| Rutvi Pradipkumar Adhyaru, CHARUSAT, India |
| Volume : 6 volume number : 1 pdf |
| Survey of Data Mining Techniques used in Healthcare Domain |
| Sheenal Patel and Hardik Patel, Charotar University of Science & Technology, India |
| Volume : 6 volume number : 1 pdf |
| Google Cloud Messaging (Gcm): A Light Weight Communication Mechanism Between Client and Server on Android Platform |
| Nilay Ganatra and Rachana Patel, CHARUSAT, India |
| Volume : 6 volume number : 1 pdf |
| New Era of Teaching Learning : 3D Marker Based Augmented Reality |
| Abhijitsinh Jadeja, Richa Mehta and Deepak Sharma, KSV University, India |
| Volume : 6 volume number : 1 pdf |
| A Brief Review of Sentiment Analysis Methods |
| Shreya Banker and Rupal Patel, Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, India |
| Volume : 6 volume number : 1 pdf |
| Survey on Li-Fi Technology and its Applications |
| Hema Patel, CHARUSAT, India |
| Volume : 6 volume number : 1 pdf |
| Survey on Li-Fi Technology and its Applications |
| Hema Patel, CHARUSAT, India |
| Volume : 6 volume number : 1 pdf |
| Mathematical Explanation to Solution for Ex-Nor Problem Using Mlffn |
| Vaibhav Kant Singh, Central University, India |
| Volume : 6 volume number : 1 pdf |
| SWOT of Bigdata Security Using Machine Learning Techniques |
| Ravikumar Muljibhai Rohit, Changa.Charotar University Of Science And Technology, India |
| Volume : 6 volume number : 1 pdf |
| Improving a Lightweight Stemmer for Gujarati Language |
| Chandrakant D. Patel and Jayeshkumar M. Patel, Ganpat University, India |
| Volume : 6 volume number : 1 pdf |
| An Innovative Pattern Based Password Method Using Time Variable with Arithmetic Operations |
| Viral Panchal, RavirajPrajapati and Kalyani Patel, Gujarat University, India |
| Volume : 6 volume number : 1 pdf |
| A Big Data Revolution in Health Care Sector: Opportunities, Challenges and Technological Advancements |
| Sanskruti Patel and Atul Patel, CHARUSAT, India |
| Volume : 6 volume number : 1 pdf |
| Implementation of SOC Core for IOT Engine |
| P.Jennifer and S.Ramasamy, Anna University, India |
| Volume : 6 volume number : 1 pdf |
| Database Security - Attacks and Control Methods |
| Mubina Malik and Trisha Patel, Charotar University of Science & Technology (CHARUSAT), India |
| Volume : 6 volume number : 1 pdf |
| A Study of Traditional Data Analysis and Sensor Data Analytics |
| Kavita Ahuja1 and N.N.Jani2, 1Shree Madhav Institute of Computer & Information Technology, India and 2SKPIMCS - MCA, India |
| Volume : 6 volume number : 1 pdf |
| Mobile Cloud Computing in Business |
| Nilam S. Desai, Charotar University of Science and Technology, India |
| Volume : 6 volume number : 1 pdf |
| Achieving Security Via Speech Recognition |
| Swati Patel and Nita Lokwani, Charusat University, India |
| Volume : 6 volume number : 1 pdf |
| Socio-Technical Collaborative Security Support System(Stcs3) |
| Gopal R Jani1, Avish Puri1 and Tushar Mehta2, 1Florida Institute of technology Melbourne FL - 32901, USA and 2Charusat University, India |
| Volume : 6 volume number : 1 pdf |
| Analytical Study of Brain MRI Protocols, Sequences and Parameters for Detection of Abnormalities |
| Shivang M. Patel1, S. M. Shah2 and Priyanka Sharma3, 1Ganpat University, India, 2Kadi University, India and 3Raksha Shakti University, India |
| Volume : 6 volume number : 1 pdf |
| Mobile Cloud Computing - Future of Next Generation Computing |
| Mahesh Gadhavi and Chirag Patel, Charotar University of Science and Technology (CHARUSAT), India |
| Volume : 6 volume number : 1 pdf |
| Analysis of Security Requirements of Futuristic Mobile Applications |
| Pranav Vyas1 and Bhushan Trivedi2, 1Charotar University of Science & Technology, India and 2GLS University, India |
| Volume : 6 volume number : 1 pdf |
| A Study- Knowledge Discovery Approachesand Its Impact With Reference to Cognitive Internet of Things (CIOT) |
| A Study- Knowledge Discovery Approachesand Its Impact With Reference to Cognitive Internet of Things (CIOT) |
| Volume : 6 volume number : 1 pdf |
| Enhancing Library Resources Access for Different Abled Person Through ICT |
| Suresh b. Solanki1 and shishir mandaliya2, 1CMPICA-CHARUSAT, India and 2I/c librarian bhaikaka library, India |
| Volume : 6 volume number : 1 pdf |
| Secure Cloud Computing Mechanism for Enhancing: MTBAC |
| Payal Buha and Priyanka Sharma, Raksha Shakti University, India |
| Volume : 6 volume number : 1 pdf |