Table of Contents
Articles
| Fingerprint Based Attendance System Using Wireless Communication |
PDF
|
| M.P. Gajare, Vinit Malpeddi, Shubham Kusre, Payal Battuwar, Ganesh Khillari | 79-82 |
| Comparative Analysis of Pipelined SHA-1 Algorithm based on Different Methodologies |
PDF
|
| Ritu Kaur Makkad, Anil Kumar Sahu | 83-88 |
| An Implementation for Securing Data on Cloud through Encryption |
PDF
|
| Ashima Singh Rajput | 89-91 |
| Keyword Based Testing of Windows Application |
PDF
|
| Sharma Tarun, Suruchi Kaur, Ashirwad Kasalkar Dhanjal, J N Swathi | 92-96 |
| Emergency Alert System Using Location Based Identification for Android Text Message Services |
PDF
|
| V. Lavanya, D. Jayakumar, S. Sivachandrian | 97-99 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 956X