IJMEMR Volume 3 issue 1, March 2015
International Journal of Modern Engineering & Management Research
Sr. |
Topic/Author |
Page |
View Full PDF |
1. |
A Review on Enhancement of Security in IPv6
Author(s): Mukta Bhatele, Ayushi Arzare, B.L. Rai, Raghvendra Singh Tomar | JNCT, Bhopal |
05-11 |
|
2. |
A Forensic Profiling for Cyber Investigation
Author(s): Ravindra Kumar Gupta, Sanjay Gupta | VITS, Jabalpur |
12-15 |
|
3. |
A Survey on Low Level Feature Identification of Satellite Images and Knowledge Discovery from Identified Features using Image Mining
Author(s): Mukta Bhatele, Ankita Jain, Sourabh Jain, B. L. Rai |
16-21 |
|
4. |
A review on Privateness-Retaining Public Auditing for Secure Cloud Storage
Author(s): Mukta Bhatele, Deepika Gour, B. L. Rai, Ankur Pandey Rolex Replica |
22-31 |
|
5. |
An Extensive Survey Expounding Security Issues & Requirement in Secure Cloud Computing Environment
Author(s): Mukta Bhatele, Manish Mishra | JNCT, Bhopal |
32-37 |
|
6. |
A Survey on Various Image Denoising & Filtering Techniques
Author(s):Mukta Bhatele, Varsha Thakur | JNCT, Bhopal |
38-45 |
|
7. |
Smart Ration Shop for Public Distributed System
Author(s): Priya Rathore, Ranu Kurmi, Sunil Parmar, Swati Jain | AIST, Sagar |
46-49 |
|
8. |
A Novel Methodology for Web Browser
Author(s): Ashish Sahu, Satyam Soni, Raksha Chaurasiya, Abhishek Keserwani | AIST, Sagar |
50-52 |
|
9. |
Online Cinema Ticket Booking System
Author(s): Rahul Rajouria, Vishal Yadav, Ruchika Mishra, Swati Jain | AIST, Sagar replica panerai watches www.watchonsale.co |
53-57 |
|
10. |
Advanced Health Care System
Author(s): Ritu Jain, Anupam Choudhary, Aakash Sharma, Maneela Jain | AIST, Sagar |
58-62 |
|
11. |
An Approach to Maximize Load Balancing in Perspective of Cloud Database Environment Studies and Consequences
Author(s): Kalpana Mahant, Prof. Sujeet Kumar Tiwari | LNCT, Jabalpur |
63-68 |
|
12. |
Optimisation for Sequential Pattern Mining in Progressive Database
Author(s): Priti Gawande, Nitesh M. Tarbani | PRMITR, Badnera, Amravati |
69-74 |
|
13. |
GSM Based Bulk Email Sender with Multiple Attachments: Through Non GPRS Mobile via SMS
Author(s): Mukta Bhatele, Syed Hafeez Choudhary, Raghvendra Singh Tomar, B. L. Rai, |
75-78 |
|
14. |
Homomorphic Encryption and Re-Encryption Applied to Voting Data Security
Author(s): Mukta Bhatele, Md. Sohel Ansari, Raghvendra Singh Tomar, B. L. Rai |
79-82 |
|
15. |
An Approach for Firewall Optimization in Cross-Domain by Cooperative and Secrecy-Preserving Manner
Author(s): Neha Asati, Sujeet Tiwari, Raghvendra Kumar Agrawal | LNCT, Jabalpur |
83-87 |
|
16. |
Preserving Cloud Storage Data Security using Identity based Encryption with Elliptic Curves
Author(s): Mukta Bhatele, Deepika Gour, B.L. Rai, Prof. Shweta Gupta |
88-95 |
|
|
|
Impact Factor
2015 : 3.445
2018 : 4.199
Publication Charges Rs. 2500/- Paper
|
|
|