ISSN: 2229-371X
Research Article: JGRCS |
ELASTICITY OF INTERNET TRAFFIC DISTRIBUTION IN COMPUTER NETWORK IN TWO MARKET ENVIRONMENT |
Diwakar Shukla, Sharad Gangele, Kapil Verma and Pankaja Singh |
Research Article: JGRCS |
SOFTWARE COMPONENT COMPLEXITY MEASUREMENT THROUGH PROPOSED INTEGRATION METRICS |
Ms. Latika, Dr. Vijay Singh Rathore |
Research Article: JGRCS |
A MARKOV CHAIN MODEL FOR ROUND ROBIN SCHEDULING IN OPERATING SYSTEM |
Deepak Sisodia, Dr. Sohan Garg |
Review Article: JGRCS |
PREVENTION AND REACTION BASED SECURE ROUTING IN MANETS |
Ajay Jangra, Shalini, Nitin Goel |
Research Article: JGRCS |
ATTACK DESCRIPTION LANGUAGE FOR COLLABORATED ALERTS-USING XML AND UML |
K.V.S.N. Rama Rao, Manas Ranjan Patra |
Research Article: JGRCS |
FEATURE DETECTION APPROACH FROM VIRUSES THROUGH MINING |
Raviraj Choudhary, Ravi Saharan |
Research Article: JGRCS |
PERFORMANCE INVESTIGATION OF ROUTING PROTOCOLS OF MOBILE AD-HOC NETWORKS USING CBR AND TCP TRAFFIC |
Samayveer Singh, A K Chauhan and Avinash Soam |
Research Article: JGRCS |
MORPHOLOGICAL METHOD, PCA AND LDA WITH NEURAL NETWORKSFACE RECOGNITION |
Sushma Jaiswal, Dr. Sarita Singh Bhadauria, Dr. Rakesh Singh Jadon |
Research Article: JGRCS |
FACE RECOGNITION USING DIFFERENT LEVEL OF ALGORITHMS |
Sushma Jaiswal, Dr. (Smt.) Sarita Singh Bhadauria, Dr. Rakesh Singh Jadon |
Research Article: JGRCS |
KEY BASED STEGANOGRAPHY IN A GRAY LEVEL IMAGE INVOLVING PERMUTATION AND XOR OPERATION |
V.U.K.Sastry, Ch.Samson |
Research Article: JGRCS |
KEY BASED STEGANOGRAPHY IN A GRAY LEVEL IMAGE INVOLVING PERMUTATION AND MODULAR ARITHMETIC ADDITION |
V.U.K.Sastry, Ch.Samson |
Research Article: JGRCS |
Q-ROUTING AND INTRUSION DETECTION |
D.B.Ojha, Sharad Kumar Verma, Bhupendra kumar, Vinod Shukla and Nitin Pandey |
Research Article: JGRCS |
MULTILAYER SECURITY BASED ROBUST WATERMARKING TECHNIQUE FOR MEDICAL IMAGES IN DWT-DCT DOMAIN |
Baisa L. Gunjal, Suresh N. Mali |
Research Article: JGRCS |
MULTI AGENT SYSTEM BASED SCHEME FOR REVISED NATIONAL TUBERCULOSIS CONTROL PROGRAM |
Shibakali Gupta , Sesa Singha Roy, Indrasish Bannerjee |
Case Report: JGRCS |
SEMANTIC WEB MINING FOR INTELLIGENT WEB PERSONALIZATION |
Anil Sharma, Suresh Kumar, Manjeet Singh |
Research Article: JGRCS |
A VALIDATION OF SIM-A WITH OVPSIM |
Gajendra Kumar Ranka, Dr. Manoj Kumar Jain |
Research Article: JGRCS |
EVALUATING THE PERFORMANCE OF ASSOCIATION RULE MINING ALGORITHMS |
K.Vanitha, R.Santhi |
Research Article: JGRCS |
SEARCHING IMPROVEMENT IN BLOGS USING DATA MINING TECHNIQUES |
Robin Singh Bhadoria |
Research Article: JGRCS |
MODEL TO IMPROVE CORRECTNESS AND QUALITY AND REDUCING TESTING TIME (MCQRTT) |
Sahil Batra, Dr. Rahul Rishi |
Research Article: JGRCS |
IMPROVING QUALITY USING TESTING STRATEGIES |
Sahil Batra, Dr. Rahul Rishi |
Review Article: JGRCS |
NOVEL GRAY SCALE CONVERSION TECHNIQUES BASED ON PIXEL DEPTH |
Debasish Biswas, Amitava Nag, Soumadip Ghosh, Arindrajit Pal, Sushanta Biswas, Snehasish Banerjee, Anjan Pal |
Review Article: JGRCS |
HIBERNATE TECHNOLOGY FOR AN EFFICIENT BUSINESS APPLICATION EXTENSION |
B.Vasavi, Y.V.Sreevani, G.Sindhu Priya |
Review Article: JGRCS |
A PROPORTIONAL ANALYSIS ON CRYPTOGRAPHY TECHNIQUES, FUNCTIONS AND RELATIVE PERFORMANCE ISSUES |
Dr. S. N. Panda, Gaurav Kumar |
Review Article: JGRCS |
ASSESSMENT OF SECURITY IN MOBILE AD-HOC NETWORKS (MANET) |
Deepak Chayal, Dr. Vijay Singh Rathore |
Review Article: JGRCS |
SURVEY ON HANDOFF TECHNIQUES |
A. Bhuvaneswari, Dr. E. George Dharma Prakash Raj |
Case Report: JGRCS |
BMP TO JPEG - THE CONVERSION PROCESS |
Anjali Anand , Dr. Himanshu Aggarwal |
Case Report: JGRCS |
3D FACE MODELING: COMPREHENSIVE DESCRIPTION |
Sushma Jaiswal, Dr. Sarita Singh Bhadauria, Dr.Rakesh Singh Jadon |
Research Article: JGRCS |
ANALYSIS OF DDoS ATTACKS IN DISTRIBUTED PEER TO PEER NETWORKS |
Vooka Pavan Kumar, Abhinava Sundaram.P, Munnaluri Bharath Kumar, N.Ch.S.N.Iyengar |