IJMEMR Volume 3 issue 1, March 2015

International Journal of Modern Engineering & Management Research

Sr. Topic/Author Page View Full PDF
1. A Review on Enhancement of Security in IPv6
Author(s): Ayushi Arzare, Dr. Mukta Bhatele, Prof B.L. Rai, Prof. Raghvendra Singh Tomar | JNCT, Bhopal
05-11 View PDF
2. A Forensic Profiling for Cyber Investigation
Author(s): Ravindra Kumar Gupta, Sanjay Gupta | VITS, Jabalpur
12-15 View PDF
3. A Survey on Low Level Feature Identification of Satellite Images and Knowledge Discovery from Identified Features using Image Mining
Author(s): Ankita Jain, Prof. Sourabh Jain, Prof. B. L. Rai, Dr. Mukta Bhatele
16-21 View PDF
4. A review on Privateness-Retaining Public Auditing for Secure Cloud Storage
Author(s): Deepika Gour, Dr. Mukta Bhatele, Prof. B. L. Rai, Prof. Ankur Pandey
22-31 View PDF
5. An Extensive Survey Expounding Security Issues & Requirement in Secure Cloud Computing Environment
Author(s): Manish Mishra, Dr. Mukta Bhatele | JNCT, Bhopal
32-37 View PDF
6. A Survey on Various Image Denoising & Filtering Techniques
Author(s): Varsha Thakur, Dr. Mukta Bhatele | JNCT, Bhopal
38-45 View PDF
7. Smart Ration Shop for Public Distributed System
Author(s): Priya Rathore, Ranu Kurmi, Sunil Parmar, Swati Jain | AIST, Sagar
46-49 View PDF
8. A Novel Methodology for Web Browser
Author(s): Ashish Sahu, Satyam Soni, Raksha Chaurasiya, Abhishek Keserwani | AIST, Sagar
50-52 View PDF
9. Online Cinema Ticket Booking System
Author(s): Rahul Rajouria, Vishal Yadav, Ruchika Mishra, Swati Jain | AIST, Sagar
53-57 View PDF
10. Advanced Health Care System
Author(s): Ritu Jain, Anupam Choudhary, Aakash Sharma, Maneela Jain | AIST, Sagar
58-62 View PDF
11. An Approach to Maximize Load Balancing in Perspective of Cloud Database Environment Studies and Consequences
Author(s): Kalpana Mahant, Prof. Sujeet Kumar Tiwari | LNCT, Jabalpur
63-68 View PDF
12. Optimisation for Sequential Pattern Mining in Progressive Database
Author(s): Priti Gawande, Nitesh M. Tarbani | PRMITR, Badnera, Amravati
69-74 View PDF
13. GSM Based Bulk Email Sender with Multiple Attachments: Through Non GPRS Mobile via SMS
Author(s): Syed Hafeez Choudhary, Prof. Raghvendra Singh Tomar, Prof. B. L. Rai, Dr. Mukta Bhatele
75-78 View PDF
14. Homomorphic Encryption and Re-Encryption Applied to Voting Data Security
Author(s): Md. Sohel Ansari, Prof. Raghvendra Singh Tomar, Prof. B. L. Rai, Dr. Mukta Bhatele
79-82 View PDF
15. An Approach for Firewall Optimization in Cross-Domain by Cooperative and Secrecy-Preserving Manner
Author(s): Neha Asati, Sujeet Tiwari, Raghvendra Kumar Agrawal | LNCT, Jabalpur
83-87 View PDF
16. Preserving Cloud Storage Data Security using Identity based Encryption with Elliptic Curves
Author(s): Deepika Gour, Prof B.L. Rai, Prof. Shweta Gupta, Dr. Mukta Bhatele
88-95 View PDF
 

UGC Approved Journal
UGC Approved Journal



Publication Charges Rs. 2500/- Paper

Payment Options


OR


Barcode

Google Scholar
Globe