Download Link
|
Topic
|
Authors
|
http://www.researchmanuscripts.com/isociety2012/1.pdf
|
Security Issues and their Solution in Cloud Computing
|
Prince Jain
|
http://www.researchmanuscripts.com/isociety2012/2.pdf
|
Cloud Computing - Scenarios and the concerned issues
|
Sumati, Jatinder Pal Singh
|
http://www.researchmanuscripts.com/isociety2012/3.pdf
|
Data Security in the Realm of Cloud Computing
|
Surabhi Jain Er. Navneet Randhawa Deepali Kansal
|
http://www.researchmanuscripts.com/isociety2012/4.pdf
|
Customer perception towards Internet banking w.r.f to private and foreign banks in India
|
Er. Vishal Mohan Goyal & Mrs. Gania Goyal
|
http://www.researchmanuscripts.com/isociety2012/5.pdf
|
SCENARIO OF E-BANKING IN TODAY’S LIFE-A survey
|
Jagdeep Singh
|
http://www.researchmanuscripts.com/isociety2012/6.pdf
|
Vulnerabilities in e-banking: A study of various security aspects in e-banking
|
Tejinder Pal Singh Brar, Dr. Dhiraj Sharma,Dr. Sawtantar Singh Khurmi
|
http://www.researchmanuscripts.com/isociety2012/7.pdf
|
FUTURE OF E-COMMERCE IN INDIA
|
Nisha Chanana, Sangeeta Goele, Prof. Naresh Kumar
|
http://www.researchmanuscripts.com/isociety2012/8.pdf
|
Improving E-Learning with Neural Networks
|
Parminder Kaur, Kiranjit Kaur, Gurdeepak Singh
|
http://www.researchmanuscripts.com/isociety2012/9.pdf
|
E-Learning Tools: Use of ICT (Information and Communication Technology) in Teaching English
|
purva chhabra
|
http://www.researchmanuscripts.com/isociety2012/10.pdf
|
E- Education
|
Er.Princy Narula, Priya Narula, Er. Sapandeep Kaur
|
http://www.researchmanuscripts.com/isociety2012/11.pdf
|
e-Education: Learning with Technology
|
Vimal Kumar, Nirmaljeet Kaur
|
http://www.researchmanuscripts.com/isociety2012/12.pdf
|
IMMERSIVE TECHNOLOGY USES,CHALLENGES AND OPPORTUNITIES
|
Mandeep Handa, Er. Gagandeep Aul, Shelja Bajaj
|
http://www.researchmanuscripts.com/isociety2012/13.pdf
|
Intelligent Traffic Lights Based on RFID
|
Harpal Singh, Krishan Kumar, Harbans Kaur
|
http://www.researchmanuscripts.com/isociety2012/14.pdf
|
Sequential Pattern mining: Genetic Algorithm
|
Anita Rani, Rajni, Manju Bala
|
http://www.researchmanuscripts.com/isociety2012/15.pdf
|
Data mining trend in past, current and future
|
Sangeeta Goele, Nisha Chanana, Dr. Anil Mittal
|
http://www.researchmanuscripts.com/isociety2012/16.pdf
|
Red light Violation Detection Using RFID
|
Harpal Singh, Satinder Jeet singh, Ravinder Pal Singh
|
http://www.researchmanuscripts.com/isociety2012/17.pdf
|
Research Aspects of Expert System
|
Yogesh Kumar, Yogyata Jain
|
http://www.researchmanuscripts.com/isociety2012/18.pdf
|
Simulation of impulsive noise environment for orthogonal frequency division multiplexing wireless system
|
Amit Grover, Amit Kumar Kohli
|
http://www.researchmanuscripts.com/isociety2012/19.pdf
|
Emerging trends of mobile applications
|
Ajay Kumar, Kuldeep Kaur
|
http://www.researchmanuscripts.com/isociety2012/20.pdf
|
Security of Wireless Application Protocol
|
Parminder Kaur
|
http://www.researchmanuscripts.com/isociety2012/21.pdf
|
A Review: Wireless Sensor Networks Application and Technology
|
Himakshi a *and Charan Kamaljit Singhb
|
http://www.researchmanuscripts.com/isociety2012/22.pdf
|
WIRELESS APPLICATION
|
Er. Parveen Kaur, Er. Natasha Singla and Ramandeep Kaur
|
http://www.researchmanuscripts.com/isociety2012/23.pdf
|
Improving Security Policies in Mobile Agent Based Systems
|
Jaspreet Kaur, Prof. Jasbir Singh Saini
|
http://www.researchmanuscripts.com/isociety2012/24.pdf
|
Honeypot
|
Narinder Kaur
|
http://www.researchmanuscripts.com/isociety2012/25.pdf
|
Intrusion Detection System Using Genetic Algorithm-A Review
|
Sharmila Devi, Ritu Nagpal
|
http://www.researchmanuscripts.com/isociety2012/26.pdf
|
Internet Security
|
Er. Suruchi, Er. Shifali Mann, Er. Gurpreet Singh
|
http://www.researchmanuscripts.com/isociety2012/27.pdf
|
CYBER MONITERING
|
Tejashwani Pabbi, Disha Ghai, Poonam Pabbi
|
http://www.researchmanuscripts.com/isociety2012/28.pdf
|
A comparative Survey of Optical Switch Fabrication Techniques
|
Sunny Arora, Navjinder Singh
|
http://www.researchmanuscripts.com/isociety2012/29.pdf
|
Analysis the Memory over head of Cache coherence protocols to minimize the problem of coherence in multiprocessor system
|
Mamta Rani and Er. Kavita Khatkar
|
http://www.researchmanuscripts.com/isociety2012/30.pdf
|
Implementation of TDpsola TO add Emotion in a punjabi speech
|
Mamta Sharma, Payal Sharma
|
http://www.researchmanuscripts.com/isociety2012/31.pdf
|
Performance Analysis of Software Transaction Memory Techniques
|
Varun Jasuja, Amit Sandhu, Kiran
|
http://www.researchmanuscripts.com/isociety2012/32.pdf
|
IMAGE COMPRESSION USING DISCRETE COSINE TRANSFORM & DISCRETE WAVELET TRANSFORM
|
Er. Ramandeep Kaur Grewal, Navneet randhawa
|
http://www.researchmanuscripts.com/isociety2012/33.pdf
|
Image contrast enhancement using histogram equalization
|
Manvi, Rajdeep Singh Chauhan, Manpreet Singh
|
http://www.researchmanuscripts.com/isociety2012/34.pdf
|
IT GOVERNANCE: DRIVEN BY CHALLENGES OF CORPORATE GOVERNANCE
|
Aparna Sharma
|
http://www.researchmanuscripts.com/isociety2012/35.pdf
|
E-Governance in E-Administration
|
Mohit Batta, Ashwani Sethi, Rajdeep Kaur
|
http://www.researchmanuscripts.com/isociety2012/36.pdf
|
A True Green Cloud Data Centers
|
Monika Malhothra, Shuchi Sharma
|
http://www.researchmanuscripts.com/isociety2012/37.pdf
|
A New Image Steganography Based on 2k Correction Method and Canny Edge Detection
|
Simrat Pal Kaur, Sarbjeet Singh
|
http://www.researchmanuscripts.com/isociety2012/38.pdf
|
FOREIGN AID IN ECONOMIC DEVELOPMENT
|
Guljinder Kaur Randhawa
|
http://www.researchmanuscripts.com/isociety2012/39.pdf
|
A NOVEL METHOD OF DENOISING NATURAL IMAGES USING CURVELETS COMBINING WITH CYCLE SPINNING
|
Suman Thapar , #Amit Kamra
|
http://www.researchmanuscripts.com/isociety2012/40.pdf
|
Feature extraction using Morphological Operations on finger print images
|
Shevaani Garg, Suman Thapar
|
http://www.researchmanuscripts.com/isociety2012/41.pdf
|
Compute Travelling Salesman Problem Using Ant Colony Optimization
|
Megha Aggarwal, Dr. Saroj
|
http://www.researchmanuscripts.com/isociety2012/42.pdf
|
STUDY AND IMPLEMENTATION OF VARIOUS MORPHOLOGY BASED IMAGE CONTRAST ENHANCEMENT TECHNIQUES
|
Suman Thapar, Shevani Garg
|
http://www.researchmanuscripts.com/isociety2012/43.pdf
|
COMPARATIVE STUDY OF ECONOMIC load dispatch (ELD) USING MODIFIED HOPFIELD NEURAL NETWORK
|
Er. Mukesh Garg Er. Manjeet Singh, Er. Vineet Girdher
|
http://www.researchmanuscripts.com/isociety2012/44.pdf
|
Cloud Computing
|
Deepak Kumar Garg, Anand kumar Mittal, Onkar Chand
|
http://www.researchmanuscripts.com/isociety2012/45.pdf
|
The Network Hackers: Security Providers of Network in Emerging and Continuous way
|
Er. Jiaur Rahman Ahmed, Er. Deepak Kumar Garg, Er.Aminur Rahman
|
http://www.researchmanuscripts.com/isociety2012/46.pdf
|
Image encryption Techniques: A Review
|
Payal Sharma, Manju Godara, Ramanpreet Singh
|
http://www.researchmanuscripts.com/isociety2012/47.pdf
|
E-Governance- Impact on corruption
|
Sapanjeet Kaur, Kamalkant
|
http://www.researchmanuscripts.com/isociety2012/48.pdf
|
OVERVIEW OF INTELLIGENT SYSTEMS
|
Er. Bhalinder Kaur, Er. Shivinder Kaur
|
http://www.researchmanuscripts.com/isociety2012/49.pdf
|
Hash Based Data Text Fusion in Speech Signal Using Speech Signal Algorithm
|
Madhu, Ms. Anu Aggarwal, Ms. Anjali Sachdeva
|
http://www.researchmanuscripts.com/isociety2012/50.pdf
|
Effective E-Administration for good Governance
|
Inderpreet Kaur, Mrs. Kiranjit Kaur, Mrs. Parminder Kaur
|
http://www.researchmanuscripts.com/isociety2012/51.pdf
|
I-Village: The Future of Rural India
|
Gunpreet Kaur
|
http://www.researchmanuscripts.com/isociety2012/52.pdf
|
An Intelligent E-nose system for discrimination of alcoholic odorants
|
Ravi Kumar
|
http://www.researchmanuscripts.com/isociety2012/53.pdf
|
Review: Layers architecture of cloud computing
|
Vikas Goyal
|
http://www.researchmanuscripts.com/isociety2012/54.pdf
|
SQL Generation and execution from natural language processing
|
Saravjeet Kaur, Rashmeet Singh Bali
|
http://www.researchmanuscripts.com/isociety2012/55.pdf
|
STRATEGIC ANALYSIS OF SEARCH ENGINE GIANT: A CASE STUDY OF GOOGLE INC.
|
Ajay Bhatia, Gagan Deep, Amit Sachdeva
|
http://www.researchmanuscripts.com/isociety2012/56.pdf
|
ANALYZING THE ROLE OF JOB INVOLVEMENT ON ORGANISATIONAL EFFECTIVENESS: AN EMPIRICAL STUDY AMONG THE EMPLOYEES OF PUNJAB NATIONAL BANK
|
Ajay Bhatia, Gagan Deep, Swati Sachdeva
|
http://www.researchmanuscripts.com/isociety2012/57.pdf
|
Advance Technique in Wireless Communication
|
Gurwinder Singh, Beant Singh
|
http://www.researchmanuscripts.com/isociety2012/58.pdf
|
Detection of Moving Objects in Colour basedand Graphs axis Change method
|
Gagandeep Kaur
|
http://www.researchmanuscripts.com/isociety2012/59.pdf
|
Decoding Compressed Image TIFF files of Candidates Response Sheets in Objective Type Entrance Tests
|
Rajdeep Kaur, Parneet Kaur, Navneet Singh
|
http://www.researchmanuscripts.com/isociety2012/60.pdf
|
Digitizing Era of Library
|
Neeta Samagh,Rachna Dewa
|
GKU/ISociety12/061
|
E-governance in India
|
Khushboo Batra, Jasmeet Kaur Kapoor
|
GKU/ISociety12/062
|
E-Administration
|
Lect. Sukhjinder Kaur, Veerpal kaur
|
GKU/ISociety12/063
|
Implementation benefits to BI using data mining Techniques
|
Harvinder singh
|
GKU/ISociety12/064
|
E-Business & CRM
|
Resham Kaur, Sukhpreet Kaur
|
GKU/ISociety12/065
|
E-BANKING - CHALLENGES & POLICY IMPLICATIONS
|
Dr.Sarita Bahl
|
GKU/ISociety12/066
|
Pixel-Oriented Technique: A Technique To Visualize Multidimensional Data
|
Jaspreet Kaur, Dr. Dharmender Kumar
|
GKU/ISociety12/067
|
Future & applications of Open Source Software
|
Er. Pardeep Mittal, Er.Tarandeep Singh
|
GKU/ISociety12/068
|
E- Education : A Need of Learning
|
Vishal Bhateja, Poonam Rani
|
|
|
|
|