Paper Type | :: | Research Paper |
Title | :: | Smart Eye for Security System |
Country | :: | India |
Authors | :: | Vandana Dubey || Anushka Garg |
Page No. | :: | 01-03 |
Keyword :Smart Eye, PIR Sensor, Face Recognition, Home Security, Indicator.
Paper Type | :: | Research Paper |
Title | :: | Application of Fuzzy C-Means (FCM) Algorithm in Image Apportionment |
Country | :: | India |
Authors | :: | Anubhav Srivastava || Dr.Bramah Hazela || Dr.Pooja Khanna || Dr. Deepak Arora |
Page No. | :: | 04-08 |
In this paper, we are proposing an analysis of images via the fuzzy c-means (FCM) algorithm by performing the apportionment procedure. In an image apportionment process, images can be treated as an object and divided into sub-images of same classes, labels, and characteristics that belong to the same cluster to investigate meaningful outcomes. There are various techniques for apportionment like thresholding, clustering, interactive segment analysis, compression based, histogram, edge finding, region extension, partial differentiation based, graph-based, multi-scale, watershed, semi-automatic analysis but among these fuzzy cmeans (FCM) algorithm is one of efficient technique.............
Keywords: Image apportionment, noise sensitivity, membership function, fuzzy, histogram.
Paper Type | :: | Research Paper |
Title | :: | Analytical Study of ANN Modelling Based Estimation of Solar Radiation |
Country | :: | India |
Authors | :: | Deepa Rani Yadav || Dr. Deependra Pandey |
Page No. | :: | 09-12 |
Energy provided by the sun is solar energy which is in the form of solar radiation. It is advantageous because it is renewable and sustainable source of energy which never runs out since it is a natural power source[1].Solar energy system's potential is beyond imagination with limitless advantages and minor negative impacts as there is nothing completely risk free [1]. A rough calculation that is the estimation of solar technology is done. Number of expressions, estimation models are used for proper monitoring ,utilization and and record of solar radiation data[2]. ANN are the excellent and one of the main tools used in machine learning. Artificial intelligence is the emerging trend that is basically a intelligent machine that performs and behaves like humans. ANN based models have been successfully trained to have different solar radiation variables, so as to improve the existing empirical and statistical approaches.
Keywords: Artificial Neural Network (ANN), Machine Learning, Solar Radiation Estimation.
[1]. TheocharisTsoutsos , Niki Frantzeskaki, Vassilis Gekas (2003) . Environmental effects from solar energy technologies. Energy
policy 33, 2003 Elsevier Ltd.
[2]. David B. Ampratwum, Atsu S.S. Dorvlo (1999). Estimation of solar radiation from the number of sunshine hours. Applied energy
63, Elsevier Science Ltd.
[3]. Estimation of global solar radiation using four sunshine based models from pelagia research library
[4]. M Jamil ahmed and G N Tiwari (2010). Solar radiation models -a review. International journal of energy research. john willey and
sons Ltd.
[5]. C. K. Pandey and A. K. Katiyar. Solar radiation: Models and Measurement Techniques
Paper Type | :: | Research Paper |
Title | :: | Survival of Biological Species under The Effect of Toxins: A Study Through Mathematical Models |
Country | :: | India |
Authors | :: | A.K. Agrawal || Piyush Kumar Tripathi || Anuj Kumar Agarwal |
Page No. | :: | 13-17 |
In this paper, we have tried to study the effect of toxins on logistically growing biological species. We
have proposed some non linear mathematical models to study the effect in various cases, such as:
(i) The toxin is being emitted in to the environment by some external source.
(ii) The toxin is being discharged by the species itself.
(iii) Simultaneous effect of two toxins.
These models involve system of non linear ordinary differential equations. The qualitative analysis has been
done using stability theory. These models have been simulated using MATLAB.
Keywords: Biological species, Toxins, Mathematical models, Simulation
[1]. Agrawal, A.K. (1999): Effects of toxicants on biological species: some non-linear mathematical models and their analyses. Ph.D.
thesis, Department of Mathematics, I.I.T. Kanpur, U.P., INDIA.
[2]. Agarwal, A.K, Khan, A.W. and Agrawal, A.K. (2016): The effect of an external toxicant on a biological species in case of
deformity: A model, Modeling Earth System and Environment,2(3), 1-8.
[3]. Agrawal, A.K., Sinha, P., Dubey, B. and Shukla, J.B. (2000): Effects of two or more toxicants on a biological species: a non linear
mathematical model and its analysis, Dwivedi AP (ed) Mathematical analysis and applications, Narosa Publishing House, New
Delhi, 97–113.
[4]. Agarwal, A.K., Khan, A.W. and Agrawal A.K. (2015): A model for the adverse effect of two toxicants causing deformity in a
subclass of a biological species, International Journal of Pure and Applied Mathematics, 110(3), 447-462.
[5]. Deluna JT, Hallam TG (1987): Effect of toxicants on population: aqualitative approach IV. Resource–consumer– toxicant
models.Ecol Modell,35, 249–273.
Paper Type | :: | Research Paper |
Title | :: | IOT Based Indoor Localization with LiFi in Smart Homes |
Country | :: | India |
Authors | :: | Huma Khan || O P Singh |
Page No. | :: | 18-20 |
In present era, the information technology is increasing day by day across the world. There are various applications of the information technologies especially in the smart homes. Smart home technology means home automation. The smart home is a well connected internet based devices to empower the remote monitoring & management of appliances such as lighting and heating etc. Smart buildings to know the location of each resident and provide secure internet facility through LiFi technology. It is thousand times faster than WiFi and provides high security as visible light cannot penetrate through the walls of the home, which leads to a new generation of optical wireless communication. These locations are aware indoor services such as path finding, IoT and location based advertising etc. The LiFi receives visible light communication through LED to realise fully automated secure network for smart homes. This paper presents the IoT based indoor localization to improve the accuracy with LiFi technology.
Keywords: Smart home, WiFi, IoT, LiFi, Accuracy
[1]. A. Bhati, M. Hansen, and C. M. Chan, "Energy conservation through smart homes in a smart city: A lesson for Singapore
households," Energy Policy, vol. 104, no. February, pp. 230–239, 2017.
[2]. I. Meena and D. Kumar, "A Review Paper on LiFi," in National Conference on Innovations in Micro-electronics, Signal Processing
and Communication Technologies, 2016, no. February, pp. 9–11.
[3]. A. Jovicic, J. Li, and T. Richardson, "Visible light communication: opportunities, challenges and the path to market," IEEE
Commun. Mag., vol. 51, no. 12, pp. 26–32, Dec. 2013.
[4]. P. Mishra, J. Poddar, and S. Priya, "A Review On LiFi : The Green WiFi," Int. Res. J. Eng. Technol., vol. 3, no. 3, pp. 99–103,
2016.
[5]. S. Wu, H. Wang, and C. Youn, "Visible Light Communications for 5G Wireless Networking Systems: From Fixed to Mobile
Communications," IEEE Netw., vol. 28, no. 6, pp. 41–45, 2014.
Paper Type | :: | Research Paper |
Title | :: | Strategy for The Development of Information Security Policy Document: A Systematic Liteature Review |
Country | :: | India |
Authors | :: | Rishab Dixit || Dr Pankaj Kumar |
Page No. | :: | 21-28 |
The purpose of this research paper is tofocus on strategic development of information security policy document and itsmanagement within the organization. The research work also surveyedthe ways of information security policy development and itsfunctions, development methods, policy lifecycle and scope of policy. In order to study the issue related to information security policy document and its implementation in organizations, a research analysis based on literature review is also accomplished.Thissystematic review will help all, thesecurity specialists and senior management executive of any enterprise thatplans to start development of security policy document and its implementation to make a better decision for the security of their assets.
Keywords- Information Security Policy,Organization Management and Data &Business Security.
[1]. Abrams, M., & Bailey, D. (n.d.). Abstraction and Refinement of Layered Security Policy.
[2]. Albright, J. G. (2000). The Basics of an IT Security Policy. SANS Institutes. Anderson, R. (1996). A Security Policy Model for
Clinical Information Systems. InProceedings of the IEEE Symposium on Security and Privacy, 30–43.
[3]. Antón, A. I., & Earp, J. B. (2000). Strategies for developing policies and requirements for secure electronic commerce systems. ECommerce
Security and Privacy, 2, 29–46.
[4]. Avolio, F. M., Consulting, a., Fallin, S., & Pinzon, D. S. (2007). Producing Your Network Security Policy. Watchguard. Com. July,
(July), 1–13.
[5]. Banks, S. (1990). Security Policy. Computer & Security, 9, 605–610.
Paper Type | :: | Research Paper |
Title | :: | Modernization of Power Generation and Distribution System |
Country | :: | India |
Authors | :: | Kamlesh Kumar Singh || Amit Kumar |
Page No. | :: | 29-32 |
Last two decade has seen lot of changes in power generation and distribution sector. The use of PLC and SCADA plays instrumental role in performing load flow analysis.Today the power plants are constructed with modern techniques. This paper discuss about the modern approaches used in power sector and gives the idea about the switchyard ,oil circuit breaker ,air blast circuit breaker, vacuum circuit breaker etc. It also discusses how the boiler works and briefly describes the components of boiler. This technical paper gives the brief idea of the NTPC vindhyanchal, some of the data of the turbo generator of vindhyanchal is also given in this paper. There is a brief discussion on the transformer and switchgear which are used in modern power plants.
[1]. V.K Mehta, Rohit Mehta, "Principles of Power System", S.CHAND,2000.
[2]. D. Das, "Electrical Power System", New Age Publisher, 2006.
[3]. J.B Gupta, "Switchgear and Protection" ,S.K KATARIA AND SONS,2008.
[4]. P.S.R, "Multy Power System Analysis", B.S,2007.
[5]. J Blackburn "Electrical Power System Protection",Willey-IEEE ,2000.
Paper Type | :: | Research Paper |
Title | :: | Mathematical Morphology and Medical Image Processing |
Country | :: | India |
Authors | :: | Rajan Chaturvedi || Dr. Naresh Kumar Chaudhary |
Page No. | :: | 33-40 |
In the medical images such as X-ray, CT, there may be some kind of abnormal entities like cancer cells, tumor in such close proximity it is difficult to find out contrast and resolution between two entities hence diagnosis and treatment highly depends upon reliable and accurate finding of Radiologist. The medical image processing plays a crucial role in artificial detection and diagnosis of diseases along with automation of medical industry. The aim of medical image processing is to enhance contrast and resolution between closely packed entities on the basis of features like intensity value, color, texture so that visual perception can be increased. This paper introduces mathematical model of morphological operation of erosion and dilation operation with real time CT scan images with various structuring element. The erosion and dilatation operation on brain tumor images is performed with various structuring element. The results shows that affected area with tumor can be prominently distinguished from the original images obtained using CT scan.
Keywords : Mathematical Morphology, dilation and erosion
[1]. Ahmed Kharrat, MH. Ben Messaoud, Nacera Benamrane, Mh. Abid, ―Detection of Brain Tumor in Medical images‖, IEEE Trans.
2009, Interaction Conference on signals. Circuit and system.
[2]. Serra, Image Analysis and Mathematical Morphology, London, U.K.: Academic, 1982.
[3]. R.C. Gonazlez, Richard E Woods, Digital Image Processing, Second edition, prentice Hall Publication 2002.
[4]. M. Sonka, J.M. Fitzpatrick : ―Handbook of Medical image processing and analysis‖, I.N. IEEE Trans. Med. Imaging 20(3): 249-250
(2001).
[5]. P. Soille, ―Morphological Image Analysis, Principle and Application‖, Springer, 1999.
Paper Type | :: | Research Paper |
Title | :: | Indian It Cos Trying To De Bug 'Foreign Exchange' `Risk |
Country | :: | India |
Authors | :: | Mr. Nitin Shankar || Dr. Alka Singh || Dr. Amit kr Sinha |
Page No. | :: | 41-47 |
Foreign Exchange Rate Fluctuations has been boon and bane for international business. It has been established and believed that foreign exchange rate fluctuation do affect the valuation of the firm over a period of time. Small businesses dealing in foreign exchange has been wiped out due to transgression in risk management of the foreign exchange. The Indian IT industry has been the harbinger of the world's outlook towards Indian talent and skill set. It has been an extraordinary journey considering that the India missed the manufacturing boom bus thus we leap frogged an entire set of stairs to an advanced stage of IT revolution. IT multinationals has been India's Foreign Exchange Rain Man and thus the perils of foreign exchange risk also came along with it.............
Keywords- Foreign Exchange Risk Management, IT, BSE.
[1]. Blanchard,Olivier, and Summers,Lawrence. (1984). Perspectiveson high world real interest rates. Brookings Papers on Economic
Activity, no. 2, pp. 273-324.
[2]. Dumas, Bernard (1978).The theory of the trading firm revisited. Journalof Finance 33 (June): 1019-29.
[3]. Adler,Michael,andDumas,Bernard(1980).The exposureof long-termforeigncurrency bonds. Journal of Financial and Quantitative
Analysis 15 (November): 973-95.
[4]. He, Jia, and Lilian Ng. (1998). Foreign exchange exposure of Japanese multinational corporations. Journal of Finance 53:733–753.
[5]. Jorion, Philippe. (1991).The pricing of exchange rate risk in the stock market. Journal of Financial and Quantitative Analysis
26:363–376.
Paper Type | :: | Research Paper |
Title | :: | Secured Data Aggregation Techniques for Wireless Sensor Network |
Country | :: | India |
Authors | :: | Tiwari Priti Ramesh || Satish Kumar |
Page No. | :: | 48-51 |
Wireless Sensor Network (WSN) is an arrangement of numerous sensing nodes that collects and process data from surroundings and sends them through wireless/ radio links. A sensor node may contain sensitive data especially if the network is dedicated to military applications where secured transmission of data is highly recommended. This secured transmission demand privacy which is very challenging in WSN as the network is vulnerable to attack. A security approach that can be utilized for wireless sensor network is cryptography. An efficient secret key encryption and decryption along with key management can preserve the integrity of data in transmission and reception..........
Keywords: WSN, Security, Attacks,Cryptography, RSA, ECC.
[1]. M. Welsh, D. Myung, M. Gaynor, and S. Moulton.(2013). Resuscitation monitoring with a wireless sensor network in Supplement
to Circulation. Journal of the American Heart Association.
[2]. F. Akyildiz et al.(2002). A Survey on Sensor Setworks.IEEE Commun. Mag.40 (8), 102–114.
[3]. D. Carman, P. Krus, and B. Matt.(2010). Constraints and approaches for distributed sensor network security. Communications
Magazine, 102-114.
[4]. A.K. Pathan, H. Lee, C. S. Hong. (2006). Security in Wireless Sensor Networks: Issues and Challenges. ICACT, 1043 – 1048.
[5]. K. Akkaya, and M. Younis. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks,3(3),325-349.
Paper Type | :: | Research Paper |
Title | :: | A Study of Named Entity Recognition Systems in Languages |
Country | :: | India |
Authors | :: | Puneet Sharma || Bramah Hazela || Deepak Arora || Richa Chaturvedi |
Page No. | :: | 52-56 |
The overall meaning of any elaborated text can be known by identifying some entities present in text; hence Named Entity Recognition plays a very crucial role. Detection of named entities is one of the most crucial task so in the process of message understanding. This paper focuses on the encoding schemes used by NER and the languages that NER systems have been applied to. This paper also introduces a methodology that can be used to perform sequence labelling using Conditional Random Fields.
Keyword: BIO · HMM · MEMM ·CRF · NER ·LBFGS · Recall
[1]. Mozharova V.A., Loukachevitch N.V. (2017) Combining Knowledge and CRF-Based Approach to Named Entity Recognition in
Russian. In: Ignatov D. et al. (eds) Analysis of Images, Social Networks and Texts. AIST 2016. Communications in Computer and
Information Science, vol 661. Springer, Cham
[2]. Dredze, M., Talukdar, P., & Crammer, K. (2009). Sequence learning from data with multiple labels. In ECML-PKDD 2009
workshop on learning from multi-label data.
[3]. Chirag Patel and Karthik Gali, (2008)Part-Of-Speech Tagging for Gujarati Using Conditional Random Fields, In Proceedings of the
IJCNLP-08 Workshop on NLP for Less Privileged Languages
[4]. Lev Ratinov and Dan Roth (2009), Design challenges and misconceptions in named entity recognition. In: Proc. of the Thirteenth
Conference on Computational Natural Language Learning. CoNLL '09, Stroudsburg, PA, USA
[5]. John Lafferty, Andrew McCallum, and Fernando C.N (2001), Conditional Random Fields: Probabilistic Model
Paper Type | :: | Research Paper |
Title | :: | Automatic Level Control of LPG Leakage |
Country | :: | India |
Authors | :: | Devika Chaudhary || Pallavi Asthana || Sumita Mishra |
Page No. | :: | 57-60 |
Liquified Petroleum Gas is major fuel for cooking in India.It is a mixture of two gases; Propane and Butane. Even a miniscule leakage in LPG gas cylinders in unventilated area over a significant amount of time can create hazardous conditions to anyone comes in contact.In this paper, a feedback system has been devised that will sense the level of LPG and when the level is beyond a permissible limit, it will switch -on the exhaust fan for proper ventilation. System also consist of transmitter and receiver system to send warning to the local office .This is an energy efficient system as controlling of exhaust fan will be based on the Sensor signal . When the level of above mentioned gas will be more than 530 ppm, it will be switched ON.
Keyword: LPG monitoring, MQ-06 Sensor, Automatic level Control..
[1]. Shruthi Unnikrishnan et. al.,‟LPG Monitoring and Leakage Detection System‟,IEEE WiSPNET 2017 conference,22-24 March,
Chennai, India,2017.
[2]. Zbigniew Krzysiak et al,‟ Analysis of tank safety with propane-butane on LPG distribution station‟, ,Polish Journal of Chemical
Technology , Vol -19, Iss.4,pp 99-102,2017
[3]. https://nj.gov/health/eoh/rtkweb/documents/fs/1118.pdf.
[4]. Tamil Selvi a/p Sitan et al,‟Liquefied Petroleum Gas (LPG) Leakage Detection and Monitoring System‟,Journal of Science and
Technology, Vol. 10 No. 3 ,2018, p. 46-53.
[5]. G. B. C. V. K. G. S. V. H., B. N. V. Abhishek, P. Bharath, "Automation of lpg cylinder booking and leakge monitoring system," International Journal of Combined Research and Development (IJCRD), pp. 693–695, 2016.
Paper Type | :: | Research Paper |
Title | :: | Image Processing Based Implementation of Unmanned aerial vehicle (UAV) for crop monitoring Using Drone Technology |
Country | :: | India |
Authors | :: | Richa Srivastava || Anil Kumar || OP singh |
Page No. | :: | 61-63 |
Increasing crop productivity is the most challenging issue in India so we usingDrone technology. Drone technology is the best device as compared to other devices. Drone is small in size and having the ability to fly without any pilot. Crops,soils and folded areas images are captured through drone camera.There are lots of advantages in different fields as like agriculture for better products in urban areas andsurveillance for highly security sensitive areas such as presidents house, nuclear plants,military areas, commercial areas and tracking for criminal activities in smuggling of illicit materials, vehicle tracking. To avoid human's health problems when they spray manually uses are help to spray pesticides. UAV drone technology isutilizing in domains and bodies that is aerial imaging armed forces, logistics, emergency services, and agriculture. In this paper we focused onthe Implementation of Unmanned aerial vehicle (UAV) for inspection, measuring in crop monitoring.
Keyword: Object tracking, Drone technology, Image processing, image analysis.
[1]. UM, Roo Mogili and B B V L Deepak(2018) "Review on the application of Drone Systems in Precision agriculture" Internation
conference on Robotics and Smart manufacturing (ROSMA2018), pp. 502-509.
[2]. Marinello, F., Pezzuolo, A., Chiumenti, A., & Sartori, L. (2016). "Technical analysis of unmanned aerial vehicles (drones) for
agricultural applications." Engineering for Rural Development, vol. 15.
[3]. Spoorthi, S., Shadaksharappa, B., Suraj, S., Manasa, V.K. (2017) "Freyr drone: Pesticide/fertilizers spraying drone-an agricultural
approach." IEEE 2nd International Conference on In Computing and Communications Technologies (ICCCT - 2017), pp. 252-255
[4]. Morey, N. S., Mehere, P. N., & Hedaoo, K. (2017). "Agriculture Drone for Fertilizers and Pesticides Spraying." International
Journal for engineering applications and Technology. Issue 5 Volume 3, ISSN: 2321-8134
[5]. Yallappa, D., Veerangouda, M., Maski, D., Palled, V., & Bheemanna, M. (2017, October) "Development and evaluation of dronemounted
sprayer for pesticide applications to crops." IEEE Global Humanitarian Technology Conference (GHTC) 2017 IEEE (pp.
1-7).
Paper Type | :: | Research Paper |
Title | :: | Real Time AI Intervention for Improving Disruptive Road Traffic Conditions |
Country | :: | India |
Authors | :: | Sanjay Devkishan Taneja |
Page No. | :: | 64-69 |
The Simulation of computer's smart and intelligent behavior has already been observed and experienced by almost all of us. With the advent of the challenging concepts of Artificial Intelligence (AI), machines have become so far successful of imitating intelligent behavior of human beings. The revolution that has come because of the introduction of AI systems has been widely accepted and has truly spread lots of excitement in our society. AI enabled road traffic management is the topic to focus upon which still has huge scope of ground level improvement. First and foremost, commuters must obey the rules without which any system to control traffic would go in vain but as our country has risen in stature towards a more higher position in the world both technologically and economically, the moment has come to carefully steer the traffic conditions using best possible AI techniques to surpass the threats and challenges that it is likely to face along the way from daily commuters............
Keyword: AI Based Systems, Intelligent Transportation System, Automatic Transfer Switch (ATS), Traffic Jam, Signal, Road CongestionControl System.
[1]. Government to use Artificial Intelligence for Traffic Management In Delhi available in :
https://www.analyticsindiamag.com/delhi-artificial- intelligence-traffic-management.
[2]. Mirchandani Pitu, Head Larry , RHODES : A Real-Time Traffic Signal Control System, Architecture, Algorithms and Analysis,
Issue 6, Volume-9 pp. 415-432, December 2001
[3]. Queen, Catriona M and Albers, Casper J (2008) Forecasting traffic flows in road networks: A graphical dynamic model
approach, August 2008.
[4]. Hong DaHee , Uno Nobuhiro , Kurauchi Fumitaka (2009) Heterogeneity in multi-anticipative car following behavior by
videoimage data. . International Journal of ITS Research, Volume 7, No.1,June 2009.
[5]. Gambardella Luca M. (2003) Ant colony Optimisation for Ad-Hoc Networks. The first MICS workshop on routing for Mobile
AdHoc Networks, Zurich, February 13, 2003.
Paper Type | :: | Research Paper |
Title | :: | Machine Learning and Enculturation: Perspective of International Human Rights in China |
Country | :: | India |
Authors | :: | Abhivardhan || Dr. Ritu Agarwal |
Page No. | :: | 70-74 |
The primacy of ML algorithms has proved it way suffice that it entails due considerations and ontologies on the formation and normativity of the semantic possibilities and dimensionality that they possess. The advent of algorithmic policing, has indicated a special outset, which is seen in the province of Xinjiang, China, concerning with corporate-based CX measures employed towards the due recognition and endurance of multiplicity of identities to exist. It is human privacy issue, where ML algorithms are employed towards generic utilities by governments and corporates in the West and other states, with their semantic freedoms. However, with no answerable solutions in the realm of international cyber law, and lack of active considerations of data protection laws, the enculturation of machine learning entails............
Keyword: International Human Rights Law, Enculturation, Machine Learning, Cultural Rapprochement, Algorithmic Policing.
[1]. Adobe. (2018, July). The Business Impact of Investing In Experience. Retrieved from Adobe:
https://www.adobe.com/content/dam/acom/au/landing/Adobe_Biz_Impact_CX_APAC_Spotlight.pdf
[2]. Carter, W. M. (2018, July 10). How to get culture right when embedding it into AI. Retrieved from Phys.org:
https://phys.org/news/2018-07-culture-embedding-ai.html
[3]. Cummings, M. L., Roff, H. M., Cukier, K., Parakilas, J., & Bryce, H. (2018). Artificial Intelligence and International Affairs:
Disruption Anticipated. Chatham House. Retrieved from
https://www.chathamhouse.org/sites/default/files/publications/research/2018-06-14-artificial-intelligence-international-affairscummings-
roff-cukier-parakilas-bryce.pdf
[4]. European Union. (2016, April 25). REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE
COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free
movement of such data, and repealing Directive 95/46/EC. Official Journal of the European Union.
[5]. Google Spain v AEPD and Mario Costeja González, C-131/12 (Court of Justice of the European Union May 13, 2014).
© 2019 All Rights Reserved | Design by iosrjen