International Journal of Information & Computation Technology (IJICT)



Volume 4, Number 8 spl.  (2014)





Design and Development of “Suraksha”-A Women Safety Device
pp. 787-792
Authors: Nishant Bhardwaj and Nitish Aggarwal

Controls and Intelligence Behind “NISTARA”: A Disaster Management Machine (DMM)
pp. 793-796
Authors: Nishant Bhardwaj and Nitish Aggarwal

A Rebroadcast Technique for Reducing Routing Overhead in Mobile Ad Hoc Network
pp. 797-804
Authors: Rajeeve Dharmaraj and Mohan Sadasivam

Size Reduction of Bluetooth Antenna: CSRR based Patch Concept
pp. 805-810
Authors: Shiney Thankachan, Sanjai Mohan, Anandu Anil, Alisha S and Arya R Nair

A Fully Homomorphic Encryption Implementation on Cloud Computing
pp. 811-816
Authors: Shashank Bajpai and Padmija Srivastava

Guilty Agent Detection Model 
pp. 817-822
Authors: Shrey Mahajan, Parth Joshi and Roheen Chaturvedi

Comparative Analysis of E-learning and Distance Learning Techniques
pp. 823-828
Authors: Siddharth Sehra, Sunakshi Maghu and Avdesh Bhardawaj

Trust Based Detection and Elimination of Malicious Nodes 
pp. 829-834
Authors: S Kaushik, Steve Jose Febin, R Alakar Srinivasan and N Maalolan

Inside of Cyber Crimes and Information Security: Threats and Solutions
pp. 835-840
Authors: Sunakshi Maghu, Siddharth Sehra and Avdesh Bhardawaj

Performance Analysis of Optimization Techniques for SQL Multi Query Expressions Over Text Databases in RDBMS
pp. 841-852
Authors: Swati Jain and Paras Nath Barwal

A Critical Review Mobile Radiations Effects: Problems & Remediation 
pp. 853-858
Authors: Vaibhav Ghildiyal, Sarthak Dabas and Avdesh Bhardawaj

Wireless Sensor Networks: Security Issues, Challenges and Solutions 
pp. 859-868
Authors: Vikash Kumar, Anshu Jain and P N Barwal





© All rights are reserved with Research India Publications                             Home  Journals  Contact