CONTENTS

 

 

Machine-to-Machine Communication - Connecting Devices Together

 

Authors: Ajay Gaud, Pankaj Singh and Shailender Divedi

 

A Study of Some Identity Based Proxy Signature Schemes

 

Authors: Vandani Verma

 

Fault Tolerance in Distributed Mobile Computing-A Review

 

Authors: Anupama Padha and Meenakshi Sharma

 

Comparative Analysis of Energy Efficient Secure MAC Protocols for Wireless Sensor Network

 

Authors: Balmukund Mishra, Yashwant Singh and Vandana Mohindru

 

Maze Generation Using Disjoint-Sets with Stack

 

Authors: Bhawana Singh,Swasti Saxena, Anil Pandey and Pooja Khulbe

 

Noise Removal from Brain Image using Region Filling Technique

 

Authors: Daizy Deb and Sudipta Roy

 

Privacy Preserving Utility Mining Using Sanitization Approach

 

Authors: Deepika Shrivastava and Rahul Shukla

 

Challenges Faced by Organizations Using E-Commerce in Their Business Practices in Botswana

 

Authors: Fidelis Abbas Lusenge

 

VHDL Design of W-CDMA DS-SS System using Gold Code

 

Authors: Gaurav P. Channe and C.N. Bhoyar

 

Gaurav Srivastava

 

Authors: Gaurav Srivastava

 

Integrated Web applications with SOAP

 

Authors: Girish M. Tere, R. R. Mudholkar and B. T. Jadhav

 

Biometrics Technologies for Interactive Access of Data: A Case of Patient Identification in Emergency Scenarios in Botswana

 

Authors: Gofaone Kgosietsile Kebualemang

 

0G to 5G Mobile Technology: A Survey

 

Authors: Haard Mehta, Darpit Patel, Bhaumik Joshi and Hardik Modi

 

Human Face Emotion Recognition

 

Authors: Himani Sabharwal and Akash Tayal

 

Command Injection Threats in Mobile Applications

 

Authors: Jyothy Joseph

 

Framework for Identifying M-government Applications for Agriculture Sector

 

Authors: Kapil Kaushik and Shubhamoy Dey

 

5G Technology: Ultimate Solution for Advanced Mobile Communication

 

Authors: Haard Mehta and Hardik Modi

 

Bioinformatics Tools

 

Authors: M.B. Priyadarshi

 

Optical Fibers-Principles and Applications

 

Authors: M. Harinath Reddy

 

Instruction Set Extensions for Cryptographic Applications: Survey and Issues

 

Authors: Mahendra Pratap Singh and Manoj Kumar Jain

 

Opportunistic Routing in Wireless Sensor Networks: A Comparative Analysis

 

Authors: Mayank Sharma, Yashwant Singh and Nagesh Kumar

 

An Appraisal of Different Image Fusion Techniques Used for Energy Salvation of Wireless Visual Sensor Networks

 

Authors: Mehrummeet Singh

 

Analysis of Cloud Computing and Security Challenges

 

Authors: Mohsin Raza