3rd International Conference on
Communication Systems, Computing & IT Applications
RECEPIENT OF AICTE QIS GRANT FOR ORGANIZING CONFERENCE
April 3-4, 2020
Article / Infographic
|
URL / Source
|
Various Techniques of Data Mining in Social Network Mining
|
Journal of Advanced Database Management & Systems
Vol.6,No,2,2019 Pages 15-17
|
Solar System Tracking Using MPPT Tracking
|
Journal of Advancements in Robotics
Vol.6,No,2,2019 Pages 15-17
|
Underground Cable Fault Detector Using IoT
|
Journal of Open Source Development
Vol.6,No,2,2019 Pages 21-25
|
IoT Based Smart Home Security System Using Arduino Uno
|
Journal of Open Source Development
Vol.6,No,2,2019 Pages 12-14
|
Intelligent Computing with Natural Language Processing
|
Journal of Artificial Intelligence Research &
Advances
Vol.6,No,2,2019 Pages 63-68
|
Tracking of Solar System
|
Journal of Web Engineering & Technology
Vol.6,No,2,2019 Pages 20-24
|
Machine Learning Cluster Analysis for Large Categorical Data
Using R Programming
|
Recent Trends in Programming Languages Vol.6,No,2,2019 Pages
23-34
|
The Power of One!
|
The Machinist, Vol.14,No.10, Pages 36-44
|
Optimistic About Future
|
The Machinist, Vol.14,No.10, Pages 58-60
|
Article / Infographic
|
Gist
|
URL / Source
|
Accessed On
|
Neural Network-based
classification of Germinated Hang Rice Using Image Processing
|
IETE Technical Review
July-August 2019
Vol 36 No.4
Pages 375-381
|
||
Digital Disruption, AI
and IOT in CRM
|
Colleen Berube,
CIO,Zendesk, talks about Customer Relationship Management, solutions, how
small and large companies should deal with them respectively and also the
future that is shaping the industry.
|
PC Quest,September
2019
Vol.32 No.9
65-67
|
|
Why Blockchain Matters
in Cybersecurity and in Open Internet
|
Blockchain can be used
for protecting personal data. It Provides identify protection solutions
that can be more effective than the existing password-based security as well
as multi-factor authentication.
|
PC Quest,September
2019
Vol.32 No.9
30-32
|
|
Dataquest Top 20
Companies
|
TCS,CTS,Infosys,HCL
Technologies,Wipro, Tech Mahindra, Ingram Micro, Redington, Dell
Technologies,IBM, L & T Infotech, HP Inc, Lenovo, Intel, HP Enterprise,
Microsoft, Cisco Systems, L & T Technology Services, SAP, Oracle
|
Dataquest, September
2019
Vol.xxxvi, No.9
Pages, 16-50
|
|
The Outlook :How are
India’s top IT companies gearing up to be a part of the national vision to be
a $1 Trillion digital economy by 2023.
|
Dataquest, September
2019
Vol.xxxvi, No.9
Pages, 10-14
|
||
IoT for ICT
|
Ninad Desai,District
Chair, BICSI India, in an interaction with us, unearths how the evolution of
IoT is setting certain demands-in terms of equipment and talent-for
redefining the telecom infrastructure to suit the needs of the current and
the future generation networks.
|
Voice & Data
September 2019
Vol.26,No.09
Pages 58-59
|
|
5G and Machine Leaning
|
Voice & Data
September 2019
Vol.26,No.09
Pages 34-39
|
Sr. No.
|
Member
|
No of Transactions
|
1
|
AHUJA RISHIKA SANDEEP DIPALI
|
30
|
2
|
SAHU MADHUSHREE DAMBARUDHAR SONALI
|
27
|
3
|
LOBO ANDREA KARLTON ALICE
|
26
|
4
|
CLETUS AGNELLO DSOUZA
|
24
|
5
|
RODRIGUES DAVID DARIN MAXCY
|
24
|
6
|
REDDY KRISHNA ANBALAGAN PARIMALA
|
23
|
Article / Infographic
|
Gist
|
URL / Source
|
Company Highlights: Key developments in the past 12 Months
|
An Annual Review of the key developments relating to power
sector majours in the past 12 Months
|
Power Line, Vol.24 No.1
Pages 166-174
|
Cloud-Based Security Solutions
|
The IUP Journal of Computer Sciences, Vol XIII No.4, Pages 72-78
|
|
Hackers are Leveraging Radical Attack Vectors
|
Banks should have a very good Last line of Defence with EDR
Solutions to protect their endpoints as these endpoints are the weakest link
in the network and very easy to compromise
|
PC Quest, October 2019, Vol 32, Issue 10, Page 40-42
|
The Learning and Information Resource Centre is pleased to inform you about the Top Searches from " IEEE Xplore Digital Library...