Research Article: JGRCS |
USE OF INFLUENCE DIAGRAMS FOR DECISION SUPPORT IN DRILLING AUTOMATION |
Taras Mychailovych Matviykiv, Vasyl Mykolaiovych Teslyuk |
|
|
|
Research Article: JGRCS |
AN EFFICIENT RANKED KEYWORD SEARCH FOR EFFECTIVE UTILIZATION OF OUTSOURCED CLOUD DATA |
S.Saravanan, Arivarasan. I |
|
|
|
Research Article: JGRCS |
2D CROSS CORRELATION MULTI-MODAL IMAGE RECOGNITION |
C Yuganya, A V Khirthana, and Udayakumara pandian |
|
|
|
Research Article: JGRCS |
DECISION MAKING FOR GRID RESOURCES DURING UNCERTAIN COMMUNICATION DEMANDS |
M.R.Sundaram, K.Prakash |
|
|
|
Research Article: JGRCS |
A NOVEL CONTENT BASED IMAGE RETRIEVAL MODEL BASED ON THE MOST RELEVANT FEATURES USING PARTICLE SWARM OPTIMIZATION |
P.K.Bhargavi, S.Bhuvana, Dr.R.Radhakrishnan |
|
|
|
Research Article: JGRCS |
AN EFFICIENT INFORMATION RETRIEVAL FROM DOMAIN EXPERT USING ACTIVE LEARNING WITH GENERALIZED QUERIES |
S .Brintha Rajakumari, S. Christy |
|
|
|
Research Article: JGRCS |
AN IMPROVED LOCAL TETRA PATTERN FOR CONTENT BASED IMAGE RETRIEVAL |
Thangadurai K, Bhuvana S, Dr Radhakrishnan R |
|
|
|
Research Article: JGRCS |
RELATIONSHIP BETWEEN E-COMMERCE & KNOWLEDGE ECONOMY AND THEIR ROLE IN RISK ASSESSMENT PROCESS |
Anushree Pandey, Vandana, Saurabh Mishra, Shashikant Rai |
|
|
|
Research Article: JGRCS |
BRING YOUR OWN DEVICE (BYOD): SECURITY RISKS AND MITIGATING STRATEGIES |
Prashant Kumar Gajar, Arnab Ghosh and Shashikant Rai |
|
|
|
Research Article: JGRCS |
CRYPTOGRAPHY USING MUSIC NOTES |
M. Yamuna, Krishna Pandey , Nikhil Choudhary |
|
|
|
Research Article: JGRCS |
FAST AND SECURE HANDOVER IN IEEE 802.16e NETWORKS |
M. Deva Priya, K. Jaya Bharathi , M.L.Valarmathi |
|
|
|
Research Article: JGRCS |
MAPPING OF DATA SECURITY COUNCIL OF INDIA SECURITY FRAMEWORK WITH ISO/IEC 27002:2005 AND COBIT 4.1 |
Watika Gupta, Sanchita Dwivedi and Dr. Vijay Kumar Chaurasiya |
|
|
|
Review Article: JGRCS |
A BRIEF STUDY OF VARIOUS WAVELET FAMILIES AND COMPRESSION TECHNIQUES |
Meenakshi Chaudhary, Anupma Dhamija |
|
|
|
Review Article: JGRCS |
PERFORMANCE OPTIMIZATION UNDER A VIRTUALIZED ENVIRONMENT |
Argha Roy |
|
|
|
Review Article: JGRCS |
PASSWORD KNIGHT SHIELDS PASSWORD STEALING AND RE-USE ATTACK |
D Caine, V Radhey Shyam and G Michael |
|
|
|
Review Article: JGRCS |
EVALUATION OF CLASSIFICATION ALGORITHMS FOR DISEASE DIAGNOSIS |
Tamije Selvy P, Palanisamy V, Elakkiya S |
|
|
|
Review Article: JGRCS |
A REVIEW ON DIFFERENT APPROACHES FOR LOAD BALANCING IN COMPUTATIONAL GRID |
Mr.Gaurav Sharma, Jagjit Kaur Bhatia |
|
|
|
Review Article: JGRCS |
SECURED AND DEPENDABLE STORAGE IN CLOUD COMPUTING USING HOMOMORPHIC |
Kiruthiga Prabakaran, Dr.C.Nalini |
|
|
|
Review Article: JGRCS |
INDEPENDENT CHANGEABLE INFORMATION HIDING IN ENCRYPTED IMAGES |
Lavanya.S, Anuradha.C |
|
|
|
Review Article: JGRCS |
COGNITIVE WAY OF CLASSIFYING DOCUMENTS: A PRACTITIONER APPROACH |
Muheet Ahmed Butt, Majid Zaman |
|
|
|
Review Article: JGRCS |
STUDY OF MODIFICATION IN THE EFFICIENCY OF SOLAR CELL |
Mukul Kant Sharma, Deepak Tanwar and Prof. Vikram Singh |
|
|
|
Review Article: JGRCS |
REVIEW: DESIGN OF DIRECT FORM TRANSPOSED FIR INTERPOLATOR |
Pallavi Chande, Gurpreet Walia |
|
|
|
Review Article: JGRCS |
WIRELESS HOME AND INDUSTRIAL AUTOMATION SECURITY SYSTEM USING GSM |
R.Anandan, Mr.B.Karthik., Dr.T.V.U.Kiran Kumar |
|
|
|
Review Article: JGRCS |
REVIEW ON MOBILE AD HOC NETWORK |
Reena Rani, Reena Thakral |
|
|
|
Review Article: JGRCS |
A STUDY ON IMPROVING CHALLENGES OF NETWORK WITH CLOUDLETS FOR MOBILE CLOUD COMPUTING |
Rutika M. Modh, Dr.Jayesh.M.Patel |
|
|
|
Review Article: JGRCS |
SOME VARIANTS OF K-MEANS CLUSTERING WITH EMPHASIS ON IMAGE SEGMENTATION |
Sheetal Aggarwal, Ashok |
|
|
|
Review Article: JGRCS |
ENHANCEMENT OF INTERSECTING ALGORITHM USING PREFIX TREE FOR
TRANSACTIONS IN IDENTIFICATIONS OF CLOSED FREQUENT ITEM SETS
IN DATA MINING |
Veenita Gupta, Neeraj Kumar, Praveen Kumar |
|
|
|
Review Article: JGRCS |
SMART RATION CARD |
Vikram Singh, VellankiAamani , Booreddy Mounika |
|
|
|
Review Article: JGRCS |
CONSISTENCY MANAGEMENT STRATEGIES IN DATA REPLICATION USING ANT COLONY OPTIMIZATION METHOD OVER MOBILE PEER TO PEER NETWORK |
S.J.K. Jagadeesh Kumar and R.Saraswathi |
|
|
|
Review Article: JGRCS |
A SURVEY OF INTRUSION DETECTION FOR AD-HOC NETWORK |
Jacob Abraham, V.Arun Prasath,G.Michael |
|
|
|
Review Article: JGRCS |
IMPLEMENTING ICT PRACTICES OF EFFECTIVE TOURISM MANAGEMENT: A CASE STUDY |
Muheet Ahmed Butt, Majid Zaman |
|
|
|
Review Article: JGRCS |
IMAGE SEGEMNTATION USING CLUATERING TECHNIQUE ANS SWARM INTELLIANGE |
P.Tamije Selvy, Dr. V. Palanisamy, M. Sri Radhai |
|
|
|
Review Article: JGRCS |
A Cloud-based Intrusion Detection Forensic Analysis on Smart Phones |
I. Raja, P.Sreevenkataramana |
|
|
|
Review Article: JGRCS |
EFFICIENT IDENTIFICATION OF HIDDEN VIDEOFILES EXPLOITATION COMPRESSION AND SECRET RECOGNITION TECHNIQUES |
Santhosh Kumar S, Kishore A and Mr. Chandrasekaran |
|
|
|