Latest Articles - Volume 7 No. 2

  • A New Mobile Based System to Detect Counterfeit Money

    Introduction Counterfeit money is currency that is produced without the legal sanction of the state or government to resemble some official form of currency closely enough that it may be confused for genuine currency. Producing or using counterfeit money is a form of fraud. Some of the ill-effects that counterfeit

    Manohar Koli1, S. Balaji2, Ravi kumar H. Roogi3, Deepak .Marigoudar4, Priya Nayak5

  • Multi Layer Security System for Cloud Computing

    INTRODUCTION Cloud computing is well-known for its pay-as-you-go utility computing and provides applications with access to large-scale cluster resources initiated by Google, IBM, Microsoft, Amazon and National Science Foundation (NSF) etc[1]. It supplies an easy-deployment, low-energy and wide distributed computing environment. Cloud architectures are designs of software systems for enabling

    Syed Minhaj Ali, Zuber Farooqui*

  • Graphene and its Dopants used as A Transistor in VLSI Circuits

    INTRODUCTION In recent years, the increase in power consumption associated with the spread of mobile information terminals and the progress in IT devices has become a concern. Societal demand for reduction of the power consumed by electronic information devices is increasing. Although attempts at reducing the power consumed by large-scale integrated circuits (LSIs) have

    Sana Khan, Soumya Gupta, Digvijay Singh