|
|
Issue 15:
(January - June, 2016 Vol.8 No.1)
Download Complete Issue
Table of Contents
|
S. No.
|
Title
|
Submit Review
|
1.
|
Adaptive Context-Aware Access Control Model for Ubiquitous Learning Environment,
Jagadamba G and B Sathish Babu
|
|
2.
|
Crime and Criminal Tracking Networks & Systems Using Agile Methodology,
Saru Dhir and Swati Sarraf
|
|
3.
|
An Approach for Server Consolidation in a Priority Based Cloud Architecture ,
Suneel K S and H S Guruprasad
|
|
4.
|
Quick Survey of Benefits from Control Plane and Data Plane Separation in Software-Defined Networking,
Pulkit Tanwar, Rajender Gohil and Mudit Tanwar
|
|
5.
|
e-Government in Saudi Arabia - An Empirical Study,
Mohammad Yamin and Rawan Mattar
|
|
6.
|
E-learning and Women in Saudi Arabia: An Empirical Study ,
Mohammad Yamin and Shahad Adel Aljehani
|
|
7.
|
Misuse Detection System Using Intelligent Agents for Online Transactions,
Anuradha Sharma, Shama Parveen and Puneet Misra
|
|
8.
|
Password Protected Locking System Using Arduino,
Sriharsha B S, Zabiullah, Vishnu S B and Sanju V
|
|
9.
|
Secured Data Migration from Enterprise to Cloud Storage – Analytical Survey ,
Neetu Kishore and Seema Sharma
|
|
10.
|
A First Hand Survey of Frequency Domain Denoising Algorithms and Techniques,
Tariq Ahmad Lone, Showkat Hassan Malik and S. M. K. Quadri
|
|
11.
|
DST’s Mission Mode on Program Natural Resources Data Management System (NRDMS) & its Developments at CSIR-NISTADS, New Delhi - A Few Examples,
Gagandeep Singh Narula, Subhan Khan and Yogesh
|
|
|