

Table of Contents
Articles
Fingerprint Based Attendance System Using Wireless Communication |
PDF
![]() |
M.P. Gajare, Vinit Malpeddi, Shubham Kusre, Payal Battuwar, Ganesh Khillari | 79-82 |
Comparative Analysis of Pipelined SHA-1 Algorithm based on Different Methodologies |
PDF
![]() |
Ritu Kaur Makkad, Anil Kumar Sahu | 83-88 |
An Implementation for Securing Data on Cloud through Encryption |
PDF
![]() |
Ashima Singh Rajput | 89-91 |
Keyword Based Testing of Windows Application |
PDF
![]() |
Sharma Tarun, Suruchi Kaur, Ashirwad Kasalkar Dhanjal, J N Swathi | 92-96 |
Emergency Alert System Using Location Based Identification for Android Text Message Services |
PDF
![]() |
V. Lavanya, D. Jayakumar, S. Sivachandrian | 97-99 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 956X