Menu

Category: Volume2_Issue1

Design Information Security System Using Elgamal With Ann Encryption

Harshada Sawant , Revati Salvekar Aishwarya Pandey, Dipti Patil Read Documents

IP Spoofing and Stepping Stone Attacks in Wireless Networks: Detection, Localization and Prevention

Ashwini Kokate , Sneha Bhalerao , Sapana Dikonda , Kajol Ingawale , R. T. Umbare Read Documents

EAACK-An AttackDetection and Prevention SystemforMANETs

PoonamP.Joshi ,PoojaK.Nande , AshwiniS.Pawar , Pooja S.Shinde , RupaliT.Umbare Read Documents

Online Patient Health Monitoring System using WSN and Zigbee

Dipeeka M. Chavhan , Prof. N.A. Dawande Read Documents

History Visualization using Information Technology as a Tool

KiranChaudhari , VarshaThorat , Nikhil Mandlik , HarshadKedia Read Documents

A Remotely Access and Anti-Theft System (R2AS)

Manoj Awate , MayurChabukswar , Mahesh Mokate , Sanjay Lohar Read Documents

IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS

Nehal Markandeya , Sandip Khillare , Rekha Bagate , Sayali Badave Vaishali Barkade Read Documents

IMPROVISING TRAJECTORY MINING FOR MAP PATTERN USING GPS/GIS

Ms. Rupali H. Asai1 , Prof. Shiwani Sthapak Read Documents

Automatic License Plate Recognition (ALPR)

Priya D. Devkate , Dhanashri R. Deosarkar , Ashwini B. Mhetre , S.S. Pattanaik Read Documents