Sr No. Paper Title (Author) Page No.
1.

A Study of Applications of Wireless Sensor Networks
Kawal Jeet, Yadvirender Rana and Rajinder Singh Minhas

1-9
2.

Advanced Petri Nets: A Review
Er.Kawalpreet Singh, Er.Rajandeep Singh

10-15
3.

Real Time Monitoring System for Surface Reconstruction Using Delaunay Algorithm 
Bharti Sood, Kamaldeep Kaur

16-21
4.

A Survey on Routing Protocols and Vulnerabilities in Mobile Ad-hoc Network (MANETS)
Gagandeep Singh

22-27
5.

Methods to Prevent Harvesters by Removing Email Addresses From Spammers Lists 
Rajiv Mahajan, Gagandeep Singh

28-33
6.

Fuzzy Logic Based Tool For Loan Risk Prediction 
Sangeet Kumar, Nitin Bhatia and Namarta kapoor

34-37
7.

An Influence Diagram Based Approach for Estimating Schedule Overrun In Software Industry
Kawal Jeet, Yadvirender Rana and Rajinder Singh Minhas

38-46
8.

Susceptibility Analysis of Security Mechanisms Adopted by Indian Banking Sector
Tejinder Pal Singh Brar, Dr. Sawtantar Singh Khurmi, Dr. Dhiraj Sharma

47-53
9.

Intelligent Cyber Defense System (ICDS): Hybrid approach to detect and defense against Cyber Crime
Neeru Mago

54-60
10.

Honeypot Security protocol in Multicast networking expending modern tools with optimal solutions
Dinesh Kumar, Dr. Parvinder Singh

Apply Online
Enquire Now
Feedback