Ref. No. |
Author(S) |
Title |
v8-i3 / 01 |
1Priyanka Guru , 2Amit Bahekar |
Effect of change of material on Piston used for automotive application |
v8-i3 / 02 |
1Priyanka Guru , 2Amit Bahekar |
Design and analysis on piston used in IC engine- A Review |
v8-i3 / 03 |
Shweta Nijhawan |
Enhancement Of Security Against Denial Of Service Attacks In Wireless Mesh Network |
v8-i3 / 04 |
1Babita Devi, 2Amit Mahal |
Investigation Of Ecommerce Website Using Qr Code For Security |
v8-i3 / 05 |
Prateek Singh1, Dr. Archana Nema2 |
Optimization of Supply Chain System by Implementing Milk Run Logistics Method -A Review |
v8-i3 / 06 |
Rahul Raghuvanshi1, Dr. V.N. Bartaria2 |
DESIGN OF A LIGHTWEIGHT CHASSIS FOR E-RIKSHAW- A REVIEW |
v8-i3 / 07 |
Apurva Mehta |
REVIEW ON SECURITY OF MULTIMEDIA DATA OVER DISTRIBUTED NETWORK OVER IDS |
v8-i3 / 08 |
1Meena Kumari, 2Mrs. Deepika |
Implementation On Unstructured Data Using Picture Key Cryptographic Mechanism |
v8-i3 / 09 |
1Meena Kumari, 2Mr. Abhishek Bhatnagar |
Enhancement Of Security Of Unstructured Data Using Picture Key Cryptographic Mechanism: The Implementation |
v8-i3 / 10 |
Mrs Anita |
Women Entrepreneurship in India |
v8-i3 / 11 |
Paruraj*, Mitika Sehgal ** |
Implementation Of 3d Biometric In Recognition System |
v8-i3 / 12 |
Pooja1, Shilpa2 |
A REVIEW ON INTRUSION DETECTION SYSTEM IN MOBILE COMPUTING |
v8-i3 / 13 |
Shruti Jindal1 , Sapna Aggarwal2
|
A Result Paper-Network Vulnerability Detection
|
v8-i3 / 14 |
Suman |
A comparative study on study habits and personality adjustment of science students of private and government school in hisar district in Haryana
|
v8-i3 / 15 |
Dr. Anil Kumar Taneja |
Study of Phases of Teaching: Pre-active, Inter-active and Post-active |
v8-i3 / 16 |
Dr. Anil Kumar Taneja |
Study and suggestions for improvement of quality of life marginalized and socially disadvantaged segments |
v8-i3 / 17 |
tkx`fr |
çsepan dh dgkfu;ksa esa nfyr L=h thou foe'kZ ,d v/;;u |
v8-i3 / 18 |
|
|
v8-i3 / 19 |
|
|
v8-i3 / 20 |
|
|