Sr No. |
Paper Title (Author) |
Page No. |
1. |
A Study of Applications of Wireless Sensor Networks Kawal Jeet, Yadvirender Rana and Rajinder Singh Minhas
|
1-9 |
2. |
Advanced Petri Nets: A Review Er.Kawalpreet Singh, Er.Rajandeep Singh
|
10-15 |
3. |
Real Time Monitoring System for Surface Reconstruction Using Delaunay Algorithm Bharti Sood, Kamaldeep Kaur
|
16-21 |
4. |
A Survey on Routing Protocols and Vulnerabilities in Mobile Ad-hoc Network (MANETS) Gagandeep Singh
|
22-27 |
5. |
Methods to Prevent Harvesters by Removing Email Addresses From Spammers Lists Rajiv Mahajan, Gagandeep Singh
|
28-33 |
6. |
Fuzzy Logic Based Tool For Loan Risk Prediction Sangeet Kumar, Nitin Bhatia and Namarta kapoor
|
34-37 |
7. |
An Influence Diagram Based Approach for Estimating Schedule Overrun In Software Industry Kawal Jeet, Yadvirender Rana and Rajinder Singh Minhas
|
38-46 |
8. |
Susceptibility Analysis of Security Mechanisms Adopted by Indian Banking Sector Tejinder Pal Singh Brar, Dr. Sawtantar Singh Khurmi, Dr. Dhiraj Sharma
|
47-53 |
9. |
Intelligent Cyber Defense System (ICDS): Hybrid approach to detect and defense against Cyber Crime Neeru Mago
|
54-60 |
10. |
Honeypot Security protocol in Multicast networking expending modern tools with optimal solutions Dinesh Kumar, Dr. Parvinder Singh
|