CONTENTS

 

 

Cloud-Based Wireless Body Area Network for Healthcare Monitoring System

 

Authors: Aashima Arya, Shikha Pathania and Chetna Kaushal

 

A Survey on Model Based Test Case Generation using UML Diagrams

 

Authors: Afreen Ali and Shailja Pandey

 

Load Balancing in Cloud Computing Environment using Hybrid Approach (ESCEL and PSO) Algorithms

 

Authors: Anoop Yadav

 

Computer Sceince and Information Technology E-Note With Public key Kerberos: An E-voating Protocol

 

Authors: Alka Swami and Servesh Tanwar

 

Evaluation of different Parameters to Detect the Code Similarity

 

Authors: Amandeep Kaur and Harpreet Kaur

 

Network Security issues of mobile AD-HOC networks using Elliptic Curve Criptography

 

Authors: Bhavana Sharma and Vandana madaan

 

Cloud Computing for E-learning

 

Authors: Manjeet Singh Jamwal and Chitranjan Jamwal

 

Substitution based Encryption Decryption Technique by using DES and RSA

 

Authors: Davinderpreet Kaur and Brahmaleen Kaur

 

A New Algorithm for Generating Pseudo Random Number Sequence

 

Authors: Vikas Pareek, Harshita Gupta, Jhilmil Gupta, Shreya Chatterjee and Astha Jain

 

Metamorphic Testing as a Testing Technique and an Automated Debugging Tool

 

Authors: Jasmine Kaur and Harpreet Kaur

 

Buffer Overflow Exploit Prevention

 

Authors: Kushal Ahuja and Vinod Kumar

 

A Survey of Topology Control of Multihop Wireless Networks for Energy Efficiency and Routing in AD HOC Networks

 

Authors: L.S. Vijaya Kumar, Jagadeesha R and Ananda Babu J

 

Developing a Training Model using Orca (Assistive Technology) to Teach IT for Visually Impaired Students

 

Authors: Meghana Jalgaonkar and Jayant Mahajan

 

Design and Identification of Tuberculosis using Fuzzy Based Decision Support System

 

Authors: Navneet Walia, Sharad Kumar Tiwari and Rahul Malhotra

 

A Review on Deadlock Detection in Distributed Database

 

Authors: Parul Tomar and Mohit Bhardwaj

 

Trusted Lightweight Authentication Protocol used in Wireless Sensor Network

 

Authors: Pranjali Koli, D.G. Khairnar and Manish Sharma

 

An Advance algorithm for Solutions of Sudoku Puzzles

 

Authors: Puja Majumdar

 

A Summarization of Various Intrusion Detection Techniques

 

Authors: Randeep Brar and Neeraj Sharma

 

Checkpointing and Trust based Recovery in MANET: A Survey

 

Authors: Ravneet Kaur and Neeraj Sharma

 

Web Based Claim Processing System

 

Authors: Md. Waseem Akram and Abdur Rahman

 

A Fuzzy based Approach for Function Point Analysis

 

Authors: Yusra, Farha Ashfaque and Mohd Sadiq

 

Data Encryption using Invisible Image Watermarking

 

Authors: Alpana Kakkar and Apoorva Gupta

 

Alpana Kakkar1 and Apoorva Gupta2 1

 

Authors: Parardha Kumar

 

E-Training Portals

 

Authors: Kumari Seema Rani

 

Software Risk Assessment & Estimation Model using Fuzzy Functional Points

 

Authors: Yusra and Saoud Sarwar