March 2016 Volume 2 Issue 1 |
|||
Table of Contents |
|||
1. Original Research |
|||
1 . | The Next Level of Information Security: Impact of Quantum Cryptography | 1-3 | |
|
Abhishek Agnihotri
|
||
2. |
The Importance of Professional Communication For Technocrats from Rural Background | 4-6 | |
Deepti Agarwal
|
|||
3. |
Leveraging Semantic Web Technologies for Enterprises dealing with Big Data | 7-11 | |
|
Muqeem Ahmed
|
||
4 . | Determination of The Actual Form of Each Vibrational Mode of H2S Molecule Using Projection Operator Method | 12-14 | |
|
Soumya Chatterjee
|
||
5 |
Design and Analysis of Multi-Threshold CMOS 14T Full Adder using 180nm | 15-20 | |
|
Arvind Nigam Raghvendra Singh
|
||
6. |
Light Fidelty (Li-Fi) - A New Era of Communication | 21-23 | |
|
Jameel Ahamed
|
||
7. |
Partial Characterization of Cold Active Alkhophilic Protease from Kashmir | 24-26 | |
|
Junaid Furhan Sarika Sharma
|
||
8. | Biosorption of Methyl Red: Parametric Optimization Using Response Surface Methodology | 27-32 | |
|
D. Ranjan
|
||
9. | Automatic Tool Path Generation for Parametric Surfaces in Terms of Bezier Patches | 33-36 | |
|
Monika Srivastava, Manish Mishra
|
||
10. | Bioinformatics advances Genetic Engineering Applications in Gene Therapy: A Review | 37-43 | |
|
Mamta sagar, Gaurav Singh, Brijendra Singh, Neetesh Pandey
|
||
11 . | Leveraging Semantic Web Technologies for Enterprises dealing with Big Data | 44-48 | |
|
Muqeem Ahmed
|
||
12. |
An Apical Approach towards Key Distribution System Based on Quantum Mechanism in Cryptology | 49-50 | |
Neeraj Dwivedi
|
|||
13. |
Isolation and Screening of Actinomycetes from Soil Sample of Dal Lake (Kashmir) Against Selected Pathogens | 51-54 | |
|
Neha Salaria, Sarika Sharma, Sandeep Sharma
|
||
14 . | Modification in 16:1 Muliplexer by Reversible Logic | 55-58 | |
|
Jyoti Sharma, Neha Sharma, Raghvendra Singh
|
||
15 |
Concurrent Engineering: Concepts and its Implementation | 59-65 | |
|
Khalid Hussain Ansari, Ravendra Singh
|
||
16. |
Penetration Testing of Open Stack Cloud Vulnerablity Assessment & Penetration Testing of Cloud Datacenters | 66-69 | |
|
Sumit Shukla, Ruchi Khetan
|
||
17. |
Evaluating and Recognizing Mechanism of Android Malware through Dismantling and Visualization | 70-72 | |
|
Sanjay Sharma, Anubhav Bewerwal, Arvind Lal
|
||
18. | A study of solvent effect on electronic transition of 4,6-dihydroxy-5-methylpyrimidine using density functional theory | 73-76 | |
|
Sarvendra Kumar, Richa Sharma, Surbhi, M.K Bansal
|
||
19. | Distributed, Concurrent, and Independent Access To Encrypted Cloud Databases | 77-80 | |
|
Stuti Dixit
|
||
20. | Electrical and Humidity Sensing Properties of Porous Zn Doped Wo3 Ceramic Nanomaterials | 81-84 | |
|
Vandna Shakya*, N.K.Pandey and Suneet Misra
|
||
21. |
Evaluating and Recognizing Mechanism of Android Malware through Dismantling and Visualization | 85-93 | |
|
Veer Singh, Vikash Paroothi
|
||
22. | The Effect Of Dissolved Oxygen On Corrosion Behaviour Of Mild Steel | 94-102 | |
|
Ankit, Ashish Gupta, Mohd. Faiz Ansari, Zaid Bin Zafar and Er. Ankur Katiyar
|
||
23. | The effects of different types of heat-treatment on the wear of Shovel | 103-112 | |
|
Abhishek Shukla, Abhishek Vermaand Er. Ankur Katiyar
|
||
24. | Gas Phase Adsorption of Toluene on Powdered Activated Carbon | 113-123 | |
|
Nirbhay Singh Parmar
|