Volume
4, Number 8 spl. (2014)
Contents
Design and Development of “Suraksha”-A Women Safety Device
pp. 787-792
Authors: Nishant Bhardwaj and Nitish Aggarwal
Controls and Intelligence Behind “NISTARA”: A Disaster Management Machine (DMM)
pp. 793-796
Authors: Nishant Bhardwaj and Nitish Aggarwal
A Rebroadcast Technique for Reducing Routing Overhead in Mobile Ad Hoc Network
pp. 797-804
Authors: Rajeeve Dharmaraj and Mohan Sadasivam
Size Reduction of Bluetooth Antenna: CSRR based Patch Concept
pp. 805-810
Authors: Shiney Thankachan, Sanjai Mohan, Anandu Anil, Alisha S and Arya R Nair
A Fully Homomorphic Encryption Implementation on Cloud Computing
pp. 811-816
Authors: Shashank Bajpai and Padmija Srivastava
Guilty Agent Detection Model
pp. 817-822
Authors: Shrey Mahajan, Parth Joshi and Roheen Chaturvedi
Comparative Analysis of E-learning and Distance Learning Techniques
pp. 823-828
Authors: Siddharth Sehra, Sunakshi Maghu and Avdesh Bhardawaj
Trust Based Detection and Elimination of Malicious Nodes
pp. 829-834
Authors: S Kaushik, Steve Jose Febin, R Alakar Srinivasan and N Maalolan
Inside of Cyber Crimes and Information Security: Threats and Solutions
pp. 835-840
Authors: Sunakshi Maghu, Siddharth Sehra and Avdesh Bhardawaj
Performance Analysis of Optimization Techniques for SQL Multi Query Expressions Over Text Databases in RDBMS
pp. 841-852
Authors: Swati Jain and Paras Nath Barwal
A Critical Review Mobile Radiations Effects: Problems & Remediation
pp. 853-858
Authors: Vaibhav Ghildiyal, Sarthak Dabas and Avdesh Bhardawaj
Wireless Sensor Networks: Security Issues, Challenges and Solutions
pp. 859-868
Authors: Vikash Kumar, Anshu Jain and P N Barwal