Table of Contents
Research Articles
| Professional and Ethical Issues in Semantic Web | |
| Pankaj Kumar, Ajay Kumar Singh | pp. 1-4 |
| Migrating Process and Virtual Machine in the Cloud: Load Balancing and Security Perspectives | |
| Varsha P. Patil, G. A. Patil | pp. 11-19 |
| New Generation Networks Architecture between H.323 and SIP Protocol | |
| Anshuman Srivastava, Kumud Sharma | pp. 34-41 |
| Comparative Analysis of Trends of Cyber Crime Laws in USA and India | |
| Rajlakshmi Wagh | pp. 42-50 |
| Analysis and Evaluation of NLP Training Effectiveness | |
| Abha Purohit, Chiranjiv Kumar Kantiya | pp. 68-77 |
| Analysis of Different Methods for Measuring the Performance of Database on Cloud Environment | |
| Akrati Sharma, Sanjiv Sharma | pp. 83-100 |
| A Study of Scheduling Algorithms to Maintain Small Overflow Probability in Cellular Networks with a Single Cell | |
| Nagarajan B., Venkatesan G., Santhosh Kumar C. | pp. 78-82 |
| Comparison of Back Propagation, Long Short-Term Memory (LSTM), Attention-Based LSTM Neural Networks Application in Futures Market of China using R Programming | |
| Wang Shuangao, Liu Yi, Rajchandar Padmanaban, Mohamed Shamsudeen, Subalakshmi R | pp. 101-114 |
Review Articles
| Password Authentication System (PAS) for Cloud Environment | |
| Bhavana A., Alekhya V., Deepak K., Sreenivas V. | pp. 29-33 |
| Computer Crimes: Factors of Cybercriminal Activities | |
| Okechukwu Wori | pp. 51-67 |
Case Study/ Case Report
| Performance Analysis of Database on Different Cloud Computing Environments | |
| Gaurav Sharma | pp. 5-10 |
| Use of Internet Resources in University BDT College of Engineering Davanagere: A Study | |
| M. S. Lohar, Nasreen Banu | pp. 20-28 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 2320 – 0235




