Authors:
Ajay Gaud, Pankaj Singh and Shailender Divedi
A Study of Some Identity Based Proxy Signature Schemes
Authors:
Vandani Verma
Fault Tolerance in Distributed Mobile Computing-A Review
Authors:
Anupama Padha and Meenakshi Sharma
Comparative Analysis of Energy Efficient Secure MAC Protocols for Wireless Sensor Network
Authors:
Balmukund Mishra, Yashwant Singh and Vandana Mohindru
Maze Generation Using Disjoint-Sets with Stack
Authors:
Bhawana Singh,Swasti Saxena, Anil Pandey and Pooja Khulbe
Noise Removal from Brain Image using Region Filling Technique
Authors:
Daizy Deb and Sudipta Roy
Privacy Preserving Utility Mining Using Sanitization Approach
Authors:
Deepika Shrivastava and Rahul Shukla
Challenges Faced by Organizations Using E-Commerce in Their Business Practices in Botswana
Authors:
Fidelis Abbas Lusenge
VHDL Design of W-CDMA DS-SS System using Gold Code
Authors:
Gaurav P. Channe and C.N. Bhoyar
Gaurav Srivastava
Authors:
Gaurav Srivastava
Integrated Web applications with SOAP
Authors:
Girish M. Tere, R. R. Mudholkar and B. T. Jadhav
Biometrics Technologies for Interactive Access of Data: A Case of Patient Identification in Emergency Scenarios in Botswana
Authors:
Gofaone Kgosietsile Kebualemang
0G to 5G Mobile Technology: A Survey
Authors:
Haard Mehta, Darpit Patel, Bhaumik Joshi and Hardik Modi
Human Face Emotion Recognition
Authors:
Himani Sabharwal and Akash Tayal
Command Injection Threats in Mobile Applications
Authors:
Jyothy Joseph
Framework for Identifying M-government Applications for Agriculture Sector
Authors:
Kapil Kaushik and Shubhamoy Dey
5G Technology: Ultimate Solution for Advanced Mobile Communication
Authors:
Haard Mehta and Hardik Modi
Bioinformatics Tools
Authors:
M.B. Priyadarshi
Optical Fibers-Principles and Applications
Authors:
M. Harinath Reddy
Instruction Set Extensions for Cryptographic Applications: Survey and Issues
Authors:
Mahendra Pratap Singh and Manoj Kumar Jain
Opportunistic Routing in Wireless Sensor Networks: A Comparative Analysis
Authors:
Mayank Sharma, Yashwant Singh and Nagesh Kumar
An Appraisal of Different Image Fusion Techniques Used for Energy Salvation of Wireless Visual Sensor Networks
Authors:
Mehrummeet Singh
Analysis of Cloud Computing and Security Challenges
Authors:
Mohsin Raza