Previous Issue
S.No
|
TABLE OF CONTENT (GJESR,2(7):July-2015) |
Page No.
|
PDF
|
1
|
ACCESSING STORAGE IN CLOUD USING ACCESS POLICY. Swati Gore*1 & Shyamrao Gumaste2 |
1-6
|
|
2
|
TO PROVIDE IMAGE DATA SECURITY USING ENCRYPTION-THEN-COMPRESSION TECHNIQUE. Ganesh Lamkhade*1 and Ajay Kumar Gupta2 |
7-14
|
|
3
|
A CASE STUDY ON POSSIBILITIES OF DEPLOYMENT OF RELAY STRATEGY IN COGNITIVE RADIO NETWORK USING COOPERATIVE COMMUNICATIONS. Dr Seetaiah K*1 and Gandhi B 2 |
15-22
|
|
4
|
DISTRIBUTED REAL TIME SYSTEM BY USING DEUCON ALGORITHM AN OVERVIEW. Prof.P.B.Lohiya*1 and Prof.D.K.Dakhole2 |
23-29
|
|
5
|
A SECURED SYMMETRIC ENCRYPTION ALGORITHM TO PROTECT STORED INFORMATION. Dipali K. Dakhole*1, Deepenti H. Deshmukh2 and Pallavi M. Sune3 |
30-35
|
|
6
|
FUZZY BASED TEXT DOCUMENTS CLUSTERING USING SIDE INFORMATION IN DATA MINING. Mr. Yuvraj R.Gurav*1 and Assoc. Prof. P. B.Kumbharkar 2 |
36-42
|
|
7
|
VISUAL OBJECT RECOGNITION USING IMAGE MINING APPROACH. Rashmi Rajurkar*1 and Vidya dahake2 |
43-49
|
|
8
|
ALLOWING GENUINE USERS AND BLOCKING MALICIOUS USERS IN ANONYMIZING NETWORK: THE NYMBLE. Mr. Anand A. Maha*1 and Assoc. Prof. P. B.Kumbharkar 2 |
50-55
|
|
9
|
ADVANCED AND ROBUST MOBILE SEARCH ENGINE FOR PERSONALIZED. Mr. Yogesh B.Jadhao*1 and Assoc.Prof. Shyam S. Gupta 2 |
56-63
|
|
10
|
HADOOP: OPTIMAL UTILIZATION OF CACHE. Rupali V.Pashte*1 and Ritesh Thakur2 |
64-75
|
|
11
|
A NOVEL APPROACH FOR SCALABLE DATA SHARING IN CLOUD COMPUTING USING KAC. Nilesh Genaba Gunaware*1 and Bhupchandra Kumhar |
76-82
|
|
12
|
DATA DE DUPLICATION ON CLOUD STORAGE USING HYBRID CLOUD APPROACH. Sachin Baburao Hiranwale*1 and Bhupchandra Kumhar2 |
83-93
|
|
13
|
A NOVEL APPROACH FOR FACE RECOGNITION BY USING NEAR SET THEORY. Manisha V. Borkar*1 and Bhakti Kurhade2 |
94-103
|
|
14
|
DESIGN OF MICROSTRIP ARRAY ANTENNA WITH E-SHAPED DGS STRUCTURE. Miss Borhade Meghana Vijay*1 and Prof. Mrs.Dhede V. M.2 |
104-110
|
|
15
|
ANALYSIS OF WATER DISTRIBUTION SYSTEM FOR EVALUATION OF WATER LOSS CASE STUDY- AHMEDNAGAR CITY. Manoj Arun Raskar*1 and Prof. Sagar Gawande 2 |
111-118
|
|
16
|
SURVEY ON FEASIBILITY STUDY OF SOFTWARE DEVELOPMENT PROJECT. Sumaira Shaukat*1, Tahira Mahboob2, Tayyaba Kanwal3 and Ujala Shabbir4 |
119-129
|
|
17
|
SURVEY OF FIREWALLS IN SOFTWARE DEFINED NETWORKS. Tahira Mahboob*1, Maria Shah2 and Syeda Hadia Afzaal3 |
130-137
|
|
18
|
A SURVEY - MANAGEMENT OF DATA CENTERS IN SDN. Tahira Mahboob*1, GulfishanTahseen2 and Saima Gulzar3 |
138-142
|
|
19
|
A SURVEY ON TECHNIQUES OF DEFECT ANALYSIS FOR SOFTWARE PROJECT MANAGEMENT SYSTEM. Tahira Mahboob*1, Humaraia Abdual Ghafoor*2 Warda Imtiaz3and Mukhtiar Bano4 |
143-153
|
|
20
|
A SURVEY ON TALENT MANAGEMENT PRACTICES AND THEIR EFFECT ON ORGANIZATIONAL PERFORMANCE. Hina Shafique*1, Maria Iqbal2, Tahira Mahboob3 and Reeha Malik4 |
154-165
|
|
21
|
A SURVEY ON QUALITY SOFTWARE PROJECT MANAGEMENT SYSTEM FOR DEFECT ANALYSIS. Tahira Mahboob*1, Humaraia Abdual Ghafoor*2 and Warda Imtiaz3 |
166-174
|
|
22
|
A COMPARATIVE STUDY OF QUALITY MEASUREMENT IN AGILE AND WATERFALL MODEL. Mukhiar Bano*1, Tahira Mahboob2, Arshia Zaffar3 and Rida Mumtaz4 |
175-182
|
|
23
|
COMPARISON OF IMAGE QUALITY AND RADIATION DOSE BETWEEN ANGULAR AUTOMATIC TUBE CURRENT MODULATION AND FIXED TUBE CURRENT CT SCANNING OF THORAX: PHANTOM STUDY. A.H.A.Sabri*1, A.Ali 2 , N.M.Daud 3 , M.C.Ha 4 and F.M.Nasir 5 |
183-188
|
|
24
|
REVIEW ON: SEGMENTATION AND CLASSIFICATION OF SPUTUM CELL FOR LUNG CANCER DETECTION. Money Sethi*1 and Sukhdeep Kaur2 |
189-192
|
|
25
|
RADIOLOGICAL STUDY OF ENVIRONMENTAL RADIONUCLIDES FOR SELECTED AREAS FROM NILE BANKS IN NORTHERN SUDAN. Nafisa. B. Mohamed*1, Mahmod Ahmed Shafee2 and Awaid W. Musa3 |
193-199
|
|
26
|
VARIOUS METHODS FOR CLUSTERING UNCERTAIN DATA. Vandana Dubey*1 and Mrs A A Nikose2 |
200-203
|
|
27
|
APPLICATION OF ECG IN HUMAN COMPUTER INTERACTION SYSTEM Dr. Sushil Kumar |
204-210
|
|
28
|
CEREBRAL OXIMETRY: A REVIEW OF NIRS DEVICES Shweta Dua |
211-218
|
|
29
|
VM MIGRATION: A SURVEY Usha Keshavamurthy*1 and Dr. H S Guruprasad2 |
219-224
|
|
30
|
AN OPTIMUM LOAD BALANCING FOR DATA ON CLOUD USING MACHINE LEARNING Shailesh B Galande*1 and Sachin Patil2 |
225-228
|
|
31
|
RESEARCH ON- SIGNATURE VERIFICATION ON SMART PHONE USING DWT Kiran P. Nagbhidkar*1 and Prof. Vijay Bagdi2 |
229-236
|
|
32
|
ROBUST APPROACH FOR OBJECT TRACKING VIA COLLABORATIVE OBSERVATION MODEL Neha K. Holey*1 and Bhakti Kurhade2 |
237-243
|
|
33
|
I (INTELLIGENT) CLUSTERING: AN APPROACH FOR IMPROVED WEB SITE STRUCTURE USING K- MEANS Mr.Pramod B. Dhamdhere*1 and Prof.Pratap Singh2 |
244-250
|
|
34
|
INTEGRATION OF IOT, CLOUD AND BIG DATA Suchetha K N*1 and H S Guruprasad*2 |
251-258
|
|
35
|
GENERALIZED CLASSES OF NEARLY OPEN SETS Mohammad Ayed AL-Juhani |
259-267
|
|
36
|
ANALYSIS OF PITTING BEHAVIOR ON THE MICROSTRUCTURAL CHARACTERIZATION AND MECHANICAL PROPERTIES OF 880 GRADE FLAT BOTTOM RAIL STEEL Aakash Kumar*1 and Prabhutosh Kumar 2 withdrawn by author |
268-279
|