Volume-7 , Issue-2 , Apr 2019, ISSN 2321-3256 (Electronic Version) Go Back

  • Open Access   Article

    Analysis of Various Techniques for Audio Steganography in Data Security

    Manisha Verma, Hardeep Singh Saini

    Research Paper | Journal (IJSRNSC)

    Vol.7 , Issue.2 , pp.1-5, Apr-2019

  • Open Access   Article

    Data Mining: A Distinctive Approach to CRM

    Latika Kharb

    Review Paper | Journal (IJSRNSC)

    Vol.7 , Issue.2 , pp.6-10, Apr-2019

  • Open Access   Article

    Data Mining tools and challenges for current market trends-A Review

    Rakesh Kumar Saini

    Review Paper | Journal (IJSRNSC)

    Vol.7 , Issue.2 , pp.11-14, Apr-2019

  • Open Access   Article

    Load Forecasting Algorithms with Simulation & Coding

    Amogha A.K.

    Research Paper | Journal (IJSRNSC)

    Vol.7 , Issue.2 , pp.15-20, Apr-2019

  • Open Access   Article

    A Critical Analysis on Encryption Techniques used for Data Security in Cloud Computing and IOT (Internet of Things) based Smart cloud storage System: A Survey

    Jignesh Patel, Foram Suthar, Samrat.V.O.Khanna

    Survey Paper | Journal (IJSRNSC)

    Vol.7 , Issue.2 , pp.21-25, Apr-2019

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation