SUBJECT CATEGORY : Computer Science Engg., Information Technology, Electronic and Telecommunication Engineering, Electrical Engineering

Volume 8, Special Issue 4, April 2018 ( ISSN 2250 – 2459 (Online))

International Conference On Information Technology & Digital Applications 2018, organized by JECRC Foundation, Jaipur, Rajasthan, India.

S.No.

Title of Paper

Page No.
1.

Confidentiality Evaluation schemes of Data on Cloud in Service Oriented Architecture

Authors: Shashi, Dr. Anuranjan Mishra

1-4
2.

Various Techniques for Spam Filtering Using Machine Learning Algorithms

Authors: Deepak Sharma, Rajendra Kachhwaha, Manju Vyas

5-8
3.

Analysis and Performance Overview of RSA Algorithm

Authors: Dr. Himanshu Arora, Gaurav Kumar Soni, Deepti Arora

9-12
4.

Ethical Hacking: A Technique To Enhance Information Security

Authors: Harshit Janjani, Pallavi Gupta, Pradeep Jha, Himanshu Arora

13-17
5.

Development of the Framework for the Solution of the Security Problems in Data Transmission Involving Advanced Asymmetric Algorithm

Authors: Dr. Himanshu Arora, Shilpi Mishra, Manish Dubey

18-20
6.

An Empirical Review of Data Mining Applications

Authors: Vani V G , Dr Thippeswamy K

21-29
7.

Discrepancy Removal From Specific Imaging Modalities Using Image Processing Features in MATLAB R2013a.

Authors: Rajal Bansal, Vanshika Gupta

28-32
8.

Inliers Detection and Recovered Missing value in Data Mining

Authors: Darshanaben Dipakkumar Pandya, Dr.Sanjay Gaur

33-38
9.

Identifying Candidate Symmetric and Candidate Transitive Binary Relations

Authors: Khalid Al-Barrak, Dr. Mohammed Alawairdhi, Dr. Kailash Kumar

39-42
10.

IoT Security: A Challenge in Wireless Technology

Authors: Mamata Rath, Jhum Swain

43-46
11.

New Approach of Software Development Life Cycle to improve Software Quality Management

Authors: Kunal Gupta, Naresh Lodha, Radha Krishna Rambola

47-50
12.

Blowfish Encryption Algorithm for IoT Security: A study and Analysis

Authors: Aastha Sharma, Nitin Kumar, Saurabh Allawadhi

51-54
13.

Sentiment Analysis in Social Media using Data Mining Techniques

Authors: Nitin, Saurabh Allawadhi, Aastha Sharma

55-57
14.

Design Pattern and Antipatterns in Cloud Computing

Authors: Shivani Saluja, Dr.Usha Batra

58-62
15.

Trustworthiness of Social Interactive Sites News Real or Fake

Authors: Pragya Rawat, Dr C P Gupta

63-66
16.

E-Commerce- Consumer’s Perspective on Privacy, Trust and Security

Authors: Dr. Syed Akmal

67-71
17.

Study of HALLUCINATIONS using (Medical Image Processing)

Authors: Aditi Tripathi, Riya Arora

72-78
18.

Quantum Networks: Possibilities of Hacking in an Unhackable Network

Authors: Shipra Sarkar, Dr.Shaligram Prajapat

79-84
19.

A Survey of Email Sevice - Attack , Security Method and Protocols

Authors: Sanjukta Mohanta, Shriti Banerjee, Shivani Awasthi, Shivani Awasthi

85-90
20.

Intrusion Detection on Cyber Security Policy Issues and Challenges in India for Mobile Ad-Hoc Networks

Authors: Chilakalapudi Meher Babu, Dr.Ashish B.Sasankar, Nuthakki Praveena

91-95
21.

Culturally based User Resistance to New Technologies in the Age of IoT in Developing Countries: Perspectives from Ethiopia

Authors: Joseph Kofi Wireko, Kamal Kant Hiran, Ruchi Doshi

96-105
22.

Scheduling Techniques On Real Time

Authors: Utsav Sinha, Deepak Swami, Shaina Arora, Naveen Tiwari

106-111
23.

Encryption Safe Guarded RDH for Secret Communication

Authors: Shweta Joshi, Dr. Rekha Mehra

112-116