ISSN: 2229-371X
| Research Article: JGRCS |
| ELASTICITY OF INTERNET TRAFFIC DISTRIBUTION IN COMPUTER NETWORK IN TWO MARKET ENVIRONMENT |
| Diwakar Shukla, Sharad Gangele, Kapil Verma and Pankaja Singh |
| Research Article: JGRCS |
| SOFTWARE COMPONENT COMPLEXITY MEASUREMENT THROUGH PROPOSED INTEGRATION METRICS |
| Ms. Latika, Dr. Vijay Singh Rathore |
| Research Article: JGRCS |
| A MARKOV CHAIN MODEL FOR ROUND ROBIN SCHEDULING IN OPERATING SYSTEM |
| Deepak Sisodia, Dr. Sohan Garg |
| Review Article: JGRCS |
| PREVENTION AND REACTION BASED SECURE ROUTING IN MANETS |
| Ajay Jangra, Shalini, Nitin Goel |
| Research Article: JGRCS |
| ATTACK DESCRIPTION LANGUAGE FOR COLLABORATED ALERTS-USING XML AND UML |
| K.V.S.N. Rama Rao, Manas Ranjan Patra |
| Research Article: JGRCS |
| FEATURE DETECTION APPROACH FROM VIRUSES THROUGH MINING |
| Raviraj Choudhary, Ravi Saharan |
| Research Article: JGRCS |
| PERFORMANCE INVESTIGATION OF ROUTING PROTOCOLS OF MOBILE AD-HOC NETWORKS USING CBR AND TCP TRAFFIC |
| Samayveer Singh, A K Chauhan and Avinash Soam |
| Research Article: JGRCS |
| MORPHOLOGICAL METHOD, PCA AND LDA WITH NEURAL NETWORKSFACE RECOGNITION |
| Sushma Jaiswal, Dr. Sarita Singh Bhadauria, Dr. Rakesh Singh Jadon |
| Research Article: JGRCS |
| FACE RECOGNITION USING DIFFERENT LEVEL OF ALGORITHMS |
| Sushma Jaiswal, Dr. (Smt.) Sarita Singh Bhadauria, Dr. Rakesh Singh Jadon |
| Research Article: JGRCS |
| KEY BASED STEGANOGRAPHY IN A GRAY LEVEL IMAGE INVOLVING PERMUTATION AND XOR OPERATION |
| V.U.K.Sastry, Ch.Samson |
| Research Article: JGRCS |
| KEY BASED STEGANOGRAPHY IN A GRAY LEVEL IMAGE INVOLVING PERMUTATION AND MODULAR ARITHMETIC ADDITION |
| V.U.K.Sastry, Ch.Samson |
| Research Article: JGRCS |
| Q-ROUTING AND INTRUSION DETECTION |
| D.B.Ojha, Sharad Kumar Verma, Bhupendra kumar, Vinod Shukla and Nitin Pandey |
| Research Article: JGRCS |
| MULTILAYER SECURITY BASED ROBUST WATERMARKING TECHNIQUE FOR MEDICAL IMAGES IN DWT-DCT DOMAIN |
| Baisa L. Gunjal, Suresh N. Mali |
| Research Article: JGRCS |
| MULTI AGENT SYSTEM BASED SCHEME FOR REVISED NATIONAL TUBERCULOSIS CONTROL PROGRAM |
| Shibakali Gupta , Sesa Singha Roy, Indrasish Bannerjee |
| Case Report: JGRCS |
| SEMANTIC WEB MINING FOR INTELLIGENT WEB PERSONALIZATION |
| Anil Sharma, Suresh Kumar, Manjeet Singh |
| Research Article: JGRCS |
| A VALIDATION OF SIM-A WITH OVPSIM |
| Gajendra Kumar Ranka, Dr. Manoj Kumar Jain |
| Research Article: JGRCS |
| EVALUATING THE PERFORMANCE OF ASSOCIATION RULE MINING ALGORITHMS |
| K.Vanitha, R.Santhi |
| Research Article: JGRCS |
| SEARCHING IMPROVEMENT IN BLOGS USING DATA MINING TECHNIQUES |
| Robin Singh Bhadoria |
| Research Article: JGRCS |
| MODEL TO IMPROVE CORRECTNESS AND QUALITY AND REDUCING TESTING TIME (MCQRTT) |
| Sahil Batra, Dr. Rahul Rishi |
| Research Article: JGRCS |
| IMPROVING QUALITY USING TESTING STRATEGIES |
| Sahil Batra, Dr. Rahul Rishi |
| Review Article: JGRCS |
| NOVEL GRAY SCALE CONVERSION TECHNIQUES BASED ON PIXEL DEPTH |
| Debasish Biswas, Amitava Nag, Soumadip Ghosh, Arindrajit Pal, Sushanta Biswas, Snehasish Banerjee, Anjan Pal |
| Review Article: JGRCS |
| HIBERNATE TECHNOLOGY FOR AN EFFICIENT BUSINESS APPLICATION EXTENSION |
| B.Vasavi, Y.V.Sreevani, G.Sindhu Priya |
| Review Article: JGRCS |
| A PROPORTIONAL ANALYSIS ON CRYPTOGRAPHY TECHNIQUES, FUNCTIONS AND RELATIVE PERFORMANCE ISSUES |
| Dr. S. N. Panda, Gaurav Kumar |
| Review Article: JGRCS |
| ASSESSMENT OF SECURITY IN MOBILE AD-HOC NETWORKS (MANET) |
| Deepak Chayal, Dr. Vijay Singh Rathore |
| Review Article: JGRCS |
| SURVEY ON HANDOFF TECHNIQUES |
| A. Bhuvaneswari, Dr. E. George Dharma Prakash Raj |
| Case Report: JGRCS |
| BMP TO JPEG - THE CONVERSION PROCESS |
| Anjali Anand , Dr. Himanshu Aggarwal |
| Case Report: JGRCS |
| 3D FACE MODELING: COMPREHENSIVE DESCRIPTION |
| Sushma Jaiswal, Dr. Sarita Singh Bhadauria, Dr.Rakesh Singh Jadon |
| Research Article: JGRCS |
| ANALYSIS OF DDoS ATTACKS IN DISTRIBUTED PEER TO PEER NETWORKS |
| Vooka Pavan Kumar, Abhinava Sundaram.P, Munnaluri Bharath Kumar, N.Ch.S.N.Iyengar |