HOME   ||   EDITORIAL BOARD   ||   INDEXING   ||   PROCESSING CHARGES   ||   PEER REVIEW PROCESS   ||   CONTACT US  
Anybody can submit their paper by mailing at ijera.editor@gmail.com. IJERA is UGC Approved Journal.
ISO

CALL FOR PAPER

PAPER SUBMISSION

WHY CHOOSE IJERA

AUTHOR INSTRUCTIONS

STATISTICS

UNIVERSITY AFFILIATES

CHECK PAPER STATUS

FAQ

CURRENT ISSUE

IJERA ARCHIVE

CALL FOR CONFERENCE

UPCOMING CONFERENCE

SPECIAL ISSUE ARCHIVE

MODEL PAPER

COPY RIGHT FORM

COPYRIGHT INFRINGEMENT

JOURNAL ETHICS

qrcode

    Volume 1 2 3 4 5 6 7 8 9 10

S.No. Title Page Downloads
1. Cloud Based Collaboration Tool
Rohini C. Ekghare, Prof. Manish Hadap
01-05 pdf
2. Database Forensic Analysis Using Log Files
Mr. Jitendra R Chavan, Prof. Harmeet Kaur Khanuja
06-09 pdf
3. Implementation of split based encryption technique for securing file transfer over a network
Mrs. Parul Rathor
10-13 pdf
4. Giving Privacy to the Sensitive Labels Present on Social Network
Mr.A.K.Baitule, Prof. Manisha Kamble
14-18 pdf
5. Advanced Security Mechnism In Wireless SensorNetwork-Review
Ms. Bharati A. Karare, Prof. Vaidehi Baporikar
19-22 pdf
6. Security Enhancement in Cloud Computing Using Triple DES Encryption Algorithm
Tony Durgadas Jagyasi, Jagdish Pimple
23-25 pdf
7. Detection of Network Attacks Using Signature Based Approach
Nikhil Mangrulkar, Arvind. R. Bhagat Patil
26-28 pdf
9. Advanced Digital Image Forgery Detection by Using SIFT
Priyanka G. Gomase, Nisha R. Wankhade
34-38 pdf
10. Robust Watermarking of Digital Media
Sonam S. Chankapure*, Prof. Nisha R. Wankhade
39-42 pdf
11. Improving the Quality of Services in Wireless Sensor Network by Improving the Security
Mr. Ajay Ramesh Karare, Prof.S.V.Sonekar, Miss. Kumari Akanksha
43-47 pdf
12. Development of parallel processing application for cluster computing using Artificial Neural Network approach
Minal Dhoke, Prof. Rajesh Dharmik
48-50 pdf
13. Simulationusing Matlab Rules in Neuro-fuzzy Controller Based Washing Machine
Ms. NehaVirkhare, Prof. R.W. Jasutkar
51-55 pdf
14. Design and Development of Multifunctional Robot for Military Purpose Applications
Bhawana D. Parate , Jagruti J. Shah
56-60 pdf
15. IP Traceback Approaches for Detecting Origin of DDoS Cyber Attackers
Mrs. Swati G. Kale, Mr. Vijendrasinh P. Thakur, Mrs. Nisha Wankhade, Ms.V.Nagpurkar
61-66 pdf
16. Secured Digital Watermarking of Colour Images
Piyush.V.Gattani , DR.C.S.Warnekar
67-69 pdf
17. Review of Intrusion Detection Systems (IDS) and Agents Based IDS
Abhilasha D. Kulkarni, Prof. R. B. Joshi
70-76 pdf

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Go Top