HOME   ||   EDITORIAL BOARD   ||   INDEXING   ||   PROCESSING CHARGES   ||   PEER REVIEW PROCESS   ||   CONTACT US  
Anybody can submit their paper by mailing at ijera.editor@gmail.com. IJERA is UGC Approved Journal.
ISO

CALL FOR PAPER

PAPER SUBMISSION

WHY CHOOSE IJERA

AUTHOR INSTRUCTIONS

STATISTICS

UNIVERSITY AFFILIATES

CHECK PAPER STATUS

FAQ

CURRENT ISSUE

IJERA ARCHIVE

CALL FOR CONFERENCE

UPCOMING CONFERENCE

SPECIAL ISSUE ARCHIVE

MODEL PAPER

COPY RIGHT FORM

COPYRIGHT INFRINGEMENT

JOURNAL ETHICS

qrcode

  Volume 1 23 4 5 6 7 8

S.No. Title Page Downloads
1. Secure Multiparty Computation and Privacy Preserving Data Sharing with Anonymous ID Assignment
Shiny. I.S , S. Gayathri
01-05 pdf
2. Optimal Parameter Tuning Based Multi-Scale Image Enhancement
S.Sonia,A.J. Adlin Deepika
06-11 pdf
3. Segmentation and Tracking Framework for Video Object by Using Threshold Decision and Diffusion
Uma Rani A , M.G Justin Raj
12-15 pdf
4. Comparable Entity Mining From Comparative Question Archive
Veena.G.R.Kumar, Jameemah Simon
16-20 pdf
5. A Self-Learning Approach to Edge-Adaptive Demosaicking Algorithm for CFA Images
Shiny.A,Nagarajan.G
21-28 pdf
6. Empowered Service Delegation With Attribute Encryption For Distributed Cloud Computing
S.Vidhya, R.Raja Ramya, N.kanagavalli
29-32 pdf
7. Multiscale Feature Extraction For Content Based Image Retrieval Using Gabor Local Tetra Pattern
R. Navani, Ms. Jiji S. Raj
33-38 pdf
8. Reliable Storage Services and Avoidance of Integrity Problems in Cloud Computing
T.Subetha, M.Rajasekar
39-42 pdf
9. Efficient And Advance Routing Logic For Network On Chip
Mr. N. Subhananthan, Mrs. C. G. Joy Merline M.E.
43-48 pdf
10. An Efficient General Access Structure Based Multiple Secret Visual Cryptography
S.A.Ayswaria, Mrs.A.M.Asbel Shiny
49-53 pdf
11. Fuzzy Clustering With Spatial Information For Image Segmentation Using Kernel Metric
G.J.Abisha Shiji, Ms. Berakhah .F. Stanley
54-58 pdf
12. An Efficient Technique for Hyperspectral Endmember Extraction based on SE2PP
M.Cynthia, Mrs. Ablin.R
59-63 pdf
13. Private Data Transferring among 'N' Nodes in a group by Using Anonymous ID Assignment
M.Anisha Vergin, T.Anto Theepak
64-68 pdf
14. Fingerprint Matching For Privacy Protection
Dora Angel. M, Andrew Rayan.T
69-71 pdf
15. Dynamic Virtual Resource Management In Cloud Computing Environment
D.Golden Jemi, C.S Soumiya
72-78 pdf

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Go Top