• Per Page:
  • Sort By:

Search results for ' ' (0.006 seconds ) Total Hits : 244

21

Non - traditional security challenges to Maldives, 1988-2008

Researcher:Mallik, Girish Chandra
Guide:Mahapatra, Chintamani
University:Jawaharlal Nehru University, New Delhi
Language:English
22

Human security in conflict situation: a study of personal security in Kokrajhar district of Assam

Researcher:Brahma, Chintu
Guide:Bhattacharjee, Suparna
University:North-Eastern Hill University, Shillong
Language:English
23

Law of patenting of biotechnological invention and its effect on food security public health and environment

Researcher:Vijaykumar, H
University:University of Delhi
Language:English
24

The politics of energy security: a study of China`s strategy

Researcher:Nandakumar, J
University:University of Delhi
Language:English
25

A study of food security in rural Orissa

Researcher:Bedamatta, Rajshree
Guide:Swaminathan, Madhura
University:University of Calcutta
Language:English
Shodhganga
26

Protection of investors and shareholders: a critical study of role of SEBI

Researcher:Sunilkumar
Guide:Badruddin
University:Maharshi Dayanand University
Language:English
Shodhganga
27

USA Patriot Act: a study of balancing national security and civil liberties

Researcher:Bharas, Chandrabhanu
Guide:Raj, Christopher S
University:Jawaharlal Nehru University
Language:English
28

Jodhpur hastshilp udyog mein shram kalyan evam samajik suraksha ka adhyayan

Researcher:Choudhary, Sumitra
Guide:Modi, S N
University:Jain Narain Vyas University
Language:Hindi
29

Dynamics of European security after the cold war: a case study of the expansion of the North Atlantic Treaty Organisation, 1990-2004

Researcher:Jegannaathan, J
Guide:Bava, Ummusalma
University:Jawaharlal Nehru University
Language:English
30

Secure operation of power system under critical loadig condition s

Researcher:Bhanot, Vimal
Guide:Bhanot, Vimal
Sharma, J D
University:University of Roorkee
Language:English
31

Regional security regime in contemporary West Asia: an enquiry into the conditions and constraints

Researcher:Kumar, Priya Ranjan
Guide:Mohapatra, Aswini K
University:Jawaharlal Nehru University, New Delhi
Language:English
32

An application of security threats on electronic business (A descriptive study of Internet users doing Electronic Business)

Researcher:Yadav, Bijender Singh
Guide:Goyal, Pradeep
University:Shri Jagdishprasad Jhabarmal Tibarewala University
Language:English
Shodhganga
33

Chinas security relations with Myanmar, 1988-2011

Researcher:Singh, Puyam Rakesh
Guide:Kondapalli, Srikanth
University:Jawaharlal Nehru University, New Delhi
Language:English
34

On processing and analyzing fingerprint images with template security

Researcher:Das, Debashis
Guide:Mukhopadhyay, Sushrut
Biswas, G, P
University:Indian School of Mines, Dhanbad
Language:Arabic
35

Social security for persons with disabilities in India: a study of Sikkim

Researcher:Sharma, Jharna
Guide:Paswan, Nawal, K
University:Sikkim-Manipal University, Gangtok
Language:English
36

Changing security perception of Nepal

Researcher:Bhattarai, Rajan
Guide:Lama, Mahendra P
University:Jawaharlal Nehru University, New Delhi
Language:English
37

Amalgam miniature to risk computation for information security

Researcher:Kasula, Venkata Durga Kiran
Guide:Reddy, L S S
University:Acharya Nagarjuna University, Guntur
Language:English
38

Secure framework to protect data against unauthorized access

Researcher:Guntupalli, Neelima
Guide:Babu, I. Ramesh
University:Acharya Nagarjuna University, Guntur
Language:English
39

Security measures in IoT applications

Researcher:Baig, Gouse
Guide:Babu, Uppu Ravi
University:Acharya Nagarjuna University, Guntur
Language:English
40

Enforcing high data security leveraging client-side multiple level data security model for public cloud

Researcher:Jaykumar, Dave Ashwinkumar
Guide:Vyas, Dhaval S.
Lathigara, Amit
University:C.U. Shah University
Language:English