Vol.2, No.4
- Cover Page
- Table of Contents
- Identifying Trojan Facebook Applications
- Recognition using Cyber bullying in view of Semantic-Enhanced Minimized Auto-Encoder
- Mining User-Aware Uncommon Consecutive Topic Patterns in Report Streams
- Implementation of Decision Based Fruits Protection System Using Classification and Clustering Techniques
- Cost Minimization for Big Data Processing in Geo-Distributed Data Centres
- A review on EEG artifacts and its different removal technique
- Cloud Computing based Health Information Exchange using CDA Generation and Integration
- Copyright