IJMEMR Volume 3 issue 1, March 2015

International Journal of Modern Engineering & Management Research

Sr. Topic/Author Page View Full PDF
1. A Review on Enhancement of Security in IPv6
Author(s): Mukta Bhatele, Ayushi Arzare, B.L. Rai, Raghvendra Singh Tomar | JNCT, Bhopal
05-11 View PDF
2. A Forensic Profiling for Cyber Investigation
Author(s): Ravindra Kumar Gupta, Sanjay Gupta | VITS, Jabalpur
12-15 View PDF
3. A Survey on Low Level Feature Identification of Satellite Images and Knowledge Discovery from Identified Features using Image Mining
Author(s): Mukta Bhatele, Ankita Jain, Sourabh Jain, B. L. Rai
16-21 View PDF
4. A review on Privateness-Retaining Public Auditing for Secure Cloud Storage
Author(s): Mukta Bhatele, Deepika Gour, B. L. Rai, Ankur Pandey Rolex Replica
22-31 View PDF
5. An Extensive Survey Expounding Security Issues & Requirement in Secure Cloud Computing Environment
Author(s): Mukta Bhatele, Manish Mishra | JNCT, Bhopal
32-37 View PDF
6. A Survey on Various Image Denoising & Filtering Techniques
Author(s):Mukta Bhatele, Varsha Thakur | JNCT, Bhopal
38-45 View PDF
7. Smart Ration Shop for Public Distributed System
Author(s): Priya Rathore, Ranu Kurmi, Sunil Parmar, Swati Jain | AIST, Sagar
46-49 View PDF
8. A Novel Methodology for Web Browser
Author(s): Ashish Sahu, Satyam Soni, Raksha Chaurasiya, Abhishek Keserwani | AIST, Sagar
50-52 View PDF
9. Online Cinema Ticket Booking System
Author(s): Rahul Rajouria, Vishal Yadav, Ruchika Mishra, Swati Jain | AIST, Sagar replica panerai watches www.watchonsale.co
53-57 View PDF
10. Advanced Health Care System
Author(s): Ritu Jain, Anupam Choudhary, Aakash Sharma, Maneela Jain | AIST, Sagar
58-62 View PDF
11. An Approach to Maximize Load Balancing in Perspective of Cloud Database Environment Studies and Consequences
Author(s): Kalpana Mahant, Prof. Sujeet Kumar Tiwari | LNCT, Jabalpur
63-68 View PDF
12. Optimisation for Sequential Pattern Mining in Progressive Database
Author(s): Priti Gawande, Nitesh M. Tarbani | PRMITR, Badnera, Amravati
69-74 View PDF
13. GSM Based Bulk Email Sender with Multiple Attachments: Through Non GPRS Mobile via SMS
Author(s): Mukta Bhatele, Syed Hafeez Choudhary, Raghvendra Singh Tomar, B. L. Rai,
75-78 View PDF
14. Homomorphic Encryption and Re-Encryption Applied to Voting Data Security
Author(s): Mukta Bhatele, Md. Sohel Ansari, Raghvendra Singh Tomar, B. L. Rai
79-82 View PDF
15. An Approach for Firewall Optimization in Cross-Domain by Cooperative and Secrecy-Preserving Manner
Author(s): Neha Asati, Sujeet Tiwari, Raghvendra Kumar Agrawal | LNCT, Jabalpur
83-87 View PDF
16. Preserving Cloud Storage Data Security using Identity based Encryption with Elliptic Curves
Author(s): Mukta Bhatele, Deepika Gour, B.L. Rai, Prof. Shweta Gupta
88-95 View PDF

Impact Factor
2015 : 3.445
2018 : 4.199

Cosmos Impact Factor
Cosmos Impact Factor

Publication Charges Rs. 2500/- Paper


Google Scholar