ICETEAS 2018: Author Index| Author | Papers | 
|---|
 | C |  | Chawla, Harshita | Security Challenges and Application for Underwater Wireless Sensor Network |  | Chhipa, Indu | Design and Implementation of Modified Butterworth Filter for Watermarking |  | D |  | Dahiya, Neeraj | Data Mining and its Various Concepts |  | Dalal, Surjeet | Data Mining and its Various Concepts |  | Dipakkumar Pandya, Darshanaben | Detection of Anomalous Value in Data Mining. |  | G |  | Gaur, Sanjay | Detection of Anomalous Value in Data Mining. |  | Goyal, Jayanti | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing |  | Gupta, Hemant Kumar | Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis |  | Gupta, Nishi | Unlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India |  | Gupta, Priya | A Survey Paper on Different Steganography Technique |  | Gupta, Rohita | Design and Implementation of Modified Butterworth Filter for Watermarking |  | J |  | Jain, Arihant Kumar | A Review of Face Recognition System Using Raspberry Pi in the Field of IoT |  | K |  | Kalani, Geet | Utility of Li-Fi in Railways |  | Kumar, Sarvesh Kumar | Security Challenges and Application for Underwater Wireless Sensor Network |  | Kumari, Bersha | Security Challenges and Application for Underwater Wireless Sensor Network |  | L |  | Lavania, Geerija | Comparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks |  | Li, Congmiao | Malware Detection for Cyber Security Enhancement in Smart Grid |  | M |  | Mitra, Priyanka | Abnormality Detection in Brain CT Image Using Support Vector Machine |  | O |  | Ojha, Garima | Utility of Li-Fi in Railways |  | P |  | Porwal, Arpit | Utility of Li-Fi in Railways |  | R |  | Raj, Ankur | A Survey Paper on Different Steganography Technique |  | Rana, Sanjeev | Unlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India |  | Reindl, Thomas | Malware Detection for Cyber Security Enhancement in Smart Grid |  | S |  | Saxena, Akash | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing |  | Saxena, Chhavi | Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis |  | Saxena, Shubhra | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing |  | Sharma, Anima | A Review of Face Recognition System Using Raspberry Pi in the Field of IoT |  | Sharma, Avinash | Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis Unlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India |  | Sharma, Bhavna | Abnormality Detection in Brain CT Image Using Support Vector Machine |  | Sharma, Manish | Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud |  | Sharma, Manu | Reliablity in the Fog Computing |  | Sharma, Navneet | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing |  | Sharma, Preeti | Comparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks |  | Sharma, Richa | A Review of Face Recognition System Using Raspberry Pi in the Field of IoT |  | Sharma, Shilpi | Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud |  | Sikri, Alisha | Data Mining and its Various Concepts |  | Singh, Netra Pal | Data Mining and its Various Concepts |  | Singh, Shashi Kant | A Survey Paper on Different Steganography Technique |  | Somwanshi, Devendra Kumar | Design and Implementation of Modified Butterworth Filter for Watermarking |  | Srinivasan, Dipti | Malware Detection for Cyber Security Enhancement in Smart Grid |  | U |  | Upadhyay, Richa | Comparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks |  | Upadhyaya, Vivek | Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis |  | Y |  | Yadav, Seema | A Survey Paper on Different Steganography Technique |  
  |  
  |