International Journal of Technology Research and Management
Beta
ISSN (Online): 2348-9006
*
UGC Approved Journal
*
Till - May 2018
Click here for Details
Home
Process
About Us
Join Us
Editorial Board
Contact Us
Guidelines
Scope & Topics
Author Guidelines
Ethics
Copyright Claims
Fees Structure
Paper Submission
Accepted Papers
Search By Index
Search By Content
Indexing
Notice Board
Register
Notice Board :
Call for Paper
Vol.
9
Issue
7
Submission Start Date:
July 01, 2022
Acceptence Notification Start:
July 10, 2022
Submission End:
July 15, 2022
Final MenuScript Due:
July 28, 2022
Publication Date:
July 31, 2022
Notice Board:
Call for PaperVol.
9
Issue
7
Submission Start Date:
July 01, 2022
Acceptence Notification Start:
July 10, 2022
Submission End:
July 15, 2022
Final MenuScript Due:
July 28, 2022
Publication Date:
July 31, 2022
Volume IV Issue VII
Paper Title
Multi-Class Hierarchical EmotionClassification using Twitter Data: A Survey Paper
Author Name
Nidhi Jathar, Abilasha Vyas
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 7
Abstract
Community networks have revolutionized the way in which people communicate. Information available from social networks is valuable for analysis of user opinion, looking at the response to policy change or the enjoyment of an ongoing event. Now a day’s witnessing an information explosion with aid of many micro-blogging toolkits like the Twitter. This paper presents an overview of recent research on complex sentiment analysis and sentiment dynamics analysis problems. Additionally, we suggest the solution for the model of the twitter data classification associate to their problem. Among the text classification and their emotional orientation discovery is also part of this domain. In this paper sentiment based text classification is introduced. This paper provides the key issues addressed and their promising solution for future design and implementation.
PaperID
2017/IJTRM/7/2017/9112
Paper Title
A Survey on Multi User Detection in Wireless Networks
Author Name
Pramod Lotan Patil, Amit Vajpayee
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 7
Abstract
With increasing number of users using cellular networks, challenges pertaining to the same have gained great significance. Cellular traffic has resulted in degraded BER performance for multipath channels. The main challenge is detecting the signals of weaker users in the presence of stronger users. Several techniques have been proposed to detect the signals with weaker strength in the presence of stronger signals often termed as multi-user detection (MUD). This paper puts forth previous techniques used for multi user detection
PaperID
2017/IJTRM/7/2017/9114
Paper Title
Role of E-Governance- Enhancing Effectiveness with new Centralized E-Projects in India
Author Name
Dr. Ramnik Kaur
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 7
Abstract
The NeGP with state mission mode projects integrated across the departments of various states of India to deliver public e-services to its citizens on anytime, anywhere basis, through Common Service Centre which is set up by Department of Information Technology. In many states e-governance is used to improve service delivery system for the citizens. This paper revolves around effective centralized projects framed by e-Kranti (NeGP) for future, which are operational to examine the experiences and delivery system initiated in various states. It discusses the 6 new state Mission Mode Projects which are operational to provide centralized e-services to the citizens of the nation in various states.
PaperID
2017/IJTRM/7/2017/9117
Paper Title
A Review of Modern Cryptography Techniques with Special Emphasis on RSA
Author Name
Chandni Vyas, Jitendra Dangra
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 7
Abstract
The backbone of the modern world is electronic communication. Data is transferred from one place to another in almost no time using the electronic medium. But it also exposes the confidential data to the intruder. RSA is the most common and efficient cryptography technique that is used for the purpose of encrypting the content and then sending it over the channel, then than at receivers end the content is decrypted and converted in to original form. Although there are many security mechanisms are available. But there is a continuous need to improve the existing methods.
PaperID
2017/IJTRM/7/2017/9120
Prev
1
Next