1. |
Efficient Page Ranking Using ROCK Clustering Algorithm
Neelam Gupta
|
 |
2. |
Cloud computing security: A phased approach
Dushyant Singh, Vipin Jain, Subham Kumar Gupta
|
 |
3. |
Security breaches in Social Networking
Lovi Gupta
|
 |
4. |
A Protected Routing Approach in WSN’s
Shankar Singh, Balram Singh, Narendra Kumar Agrawal
|
 |
5. |
Mobile Agent Paradigm: A Tactic for Distributed Environment
Balram Singh, Shankar Singh, Narendra Kumar Agrawal
|
 |
6. |
Secure Routing & Intrusion Detection in Ad Hoc Networks
Sudan Jha
|
 |
7. |
Biochar as a Solution to Manage the Rice Crop Residue
Anu Gupta
|
 |
8. |
Studies on Adsorption Characteristics of Lithomargic clay (Shedi soil) Blended with Bentonite as a Landfill Liner
Srinivasa.H.N
|
 |