S. No |
PaperArtiles |
Page No |
1. |
Intrusion Detection using Data Mining Techniques: A Study through Different Approach Jagjeet, Vinay Kumar, Vinod Kumar |
1-6 |
2. |
Some Principles and Applications of Operation Research: A Historical Approach Jagjeet, Vinay Kumar, Vinod Kumar |
7-19 |
3. |
On Complementary Super Edge Magic Labeling of Some Graphs Seema Mehra, Neelam Kumari |
20-24 |
4. |
Data Mining Testing Using Mutation Aastha, Raj Kumar |
25-30 |
5. |
Molecular mechanics study of drug-nucleic acid interactions: AbbeymycinRajeshwer Shukla, Sugriva Nath Tiwari |
31-35 |
6. |
Natural Resources Management in India: A Legal Study Dr. Jaswant Saini |
36-44 |
7. |
Developments in Linear Programming Ravinder Kumar, Ombir Dahiya, Parvesh Kumar |
45-49 |
8. |
GIS Application for Construction Temporary Facilities Manish Kumar |
50-56 |
9 |
Data Mining Techniques Based on Fuzzy Set Theory Ravinder Kumar, Ombir Dahiya, Parvesh Kumar |
57-62 |
10 |
COPROCESSOR DESIGN FOR MATRIX MULTIPLICATION Dinesh Kumar, Girish Chander Lall
|
|