Issue 7 of Volume 136

Finding Strongly Connected Components in a Social Network Graph

Authors: Swati Dhingra, Poorvi S. Dodwad, Meghna Madan

Laplace Transformation based Cryptographic Technique in Network Security

Authors: Swati Dhingra, Archana A. Savalgi, Swati Jain

Optimized Privacy-Preserving Access Control System for Relational Incremental Data

Authors: Jyothi Ghanta, B. Tarakeswara Rao, B. Sathyanarayana Reddy

Cloud-based Generation and Transfer of Solar Power in a Global Scale

Authors: R. Srinivasan, S.S. Iyengar, J.F. Miller

Parallel Quick Sort using Thread Pool Pattern

Authors: Somshubra Majumdar, Ishaan Jain, Aruna Gawade

Security in Telemedicine using DWT-CDCS

Authors: Kulkarni Pratibha C., Bhatia S.K.