IJMEMR Volume 2 issue 1, March 2014
            International Journal of Modern Engineering & Management Research 
 
    
        
        | 
            Sr. | 
        
            Topic/Author | 
            
                Page | 
        
            View Full PDF | 
         
        
        | 
            1. | 
      
      
                        
                        An Intelligent control based Self tuned Fuzzy Logic with Indirect Vector controlled of Induction Motor Drive 
                         
                        Author (s) : Preeti Shankhwar, Prashant Singh  | TIT, Bhopal |  
            
                05-13 | 
        
               | 
         
                    
        
        | 
            2. | 
      
      
                        
                        Secured Transaction Mechanism over Cloud Computing SaaS layer
                         
                        Author (s) : Neha Jain, Ashok Verma | GGITS, Jabalpur |  
            
                14-22 | 
        
               | 
         
                            
        
        | 
            3. | 
      
      
                        
                        Electrochemical Trace Analysis of Valuable Metals in Chalcopyrite ORE 
                         
                        Author (s) : Ms. Bindu Bhatt, HCET, Jabalpur |  
            
                23-27 | 
        
               | 
         
                    
        
        | 
            4. | 
      
      
                        
                        Analysis and Control of Harmonics Using Shunt Active Power Filter
                         
                        Author (s) : Saba Siraj, JEC, Jabalpur |  
            
                28-34 | 
        
               | 
         
                            
        
        | 
            5. | 
      
      
                        
Android Based Universal Vehicle Diagnostics and Tracking System
                         
                        Author(s): Pol Sharad Ganapati, Bobe Anup Dattatraya, Gholap Siddharth Popatrao, R. A. Kadu  |  
            
                35-41 | 
        
               | 
         
                            
        
        | 
            6. | 
      
      
                        
                        A New Architecture of RISC cum CISC Processor Architecture
                         
                        Author(s) : Vivek Dubey, Ravi Mohan | SRIT, Jabalpur |  
            
                42-49 | 
        
               | 
         
                            
        
        | 
            7. | 
      
      
                        
                        Impact of Wormhole Attacks On DV-Hop Positioning in Wireless Sensor Networks
                         
                        Author(s) : Aparna Pandey, Sanjay Gupta | VITS, Jabalpur |  
            
                50-55 | 
        
               | 
         
                            
        
        | 
            8. | 
      
      
                        
                        New Approach for Affine Combination of A New Architecture of RISC cum CISC Processor
                         
                        Author (s) : Shaily Agrawal, Shadma Pragi | Takshshila, Jabalpur |  
            
                56-60 | 
        
               | 
         
        
        | 
            9. | 
      
      
                        
                        Steganography with Cryptography for Highly Secure Data Hiding 
                         
                        Author(s): Vartika Pandya, 
                        Meenal Jain, Ravi Mohan| SRIT, Jabalpur |  
            
                61-64 | 
        
               | 
         
        
        | 
            10. | 
      
      
                        
                        An approach of Vedic Multiplication Technique for Optimising Logic Delay in MAC Unit
                         
                        Author(s): Nidhi Rajput, Rakesh Patel | Takshshila, Jabalpur |  
            
                65-69 | 
        
               | 
         
                            
        
        | 
            11. | 
      
      
                        
                        Intrusion Detection System Using Double Filteringand Session Layer Approaches
                         
                        Author (s): Hemendra Singh Yadav, Niresh Sharma | RKDF, Bhopal |  
            
                70-77 | 
        
               | 
         
                            
        
        | 
            12. | 
      
      
                        
                        A Review  Study of  Wireless Sensor Network and Lifetime of Sensor Network
                         
                        Author(s) : Javed Akhtar Khan | TIET, Jabalpur |  
            
                78-83 | 
        
               | 
         
                            
         
 
 
			 | 
                        
                              | 
                          
                            
                                
                                    
                                        
                      
                    Impact Factor 
                                        2015 : 3.445
                                        2018 : 4.199
                                        
                                     
       Publication Charges Rs. 2500/- Paper
                      
                    
                         
                     
                                         
                            
                           
                           
	
                          
                          
                          
                          
                          
        Publications
                          
                          
      
       
              
           
           
                                        
                               
                                        
                               
                                
                                
                               
                               
                                
                                
                                       | 
                                 
                                
                                    | 
                   
                                           | 
                                 
                                 
                         |