International Journal of General Science and Engineering Research(IJGSER)

ISSN 2455-510X


Current Issue Submission Last Date: 30-SEP-2024

Call for Papers
SEP 2024
Submission Last Date 30-SEP-2024
Initial Manuscript Submission
Final Manuscript Submission

News & Updates

VOLUME 1 ISSUE 1 Published on 30 DEC 2015


VOLUME 2 ISSUE 1 Published on 30 MAR 2016


VOLUME 2 ISSUE 2 Published on 30 JUN 2016


VOLUME 2 ISSUE 3 Published on 30 SEP 2016


VOLUME 2 ISSUE 4 Published on 30 DEC 2016


VOLUME 3 ISSUE 1 Published on 30 MAR 2017


VOLUME 3 ISSUE 2 Published on 30 JUN 2017


VOLUME 3 ISSUE 3 Published on 30 SEP 2017


VOLUME 3 ISSUE 4 Published on 30 DEC 2017


VOLUME 4 ISSUE 1 Published on 30 MAR 2018


VOLUME 4 ISSUE 2 Published on 30 JUN 2018


VOLUME 4 ISSUE 3 Published on 30 SEP 2018


VOLUME 4 ISSUE 4 Published on 30 DEC 2018


VOLUME 5 ISSUE 1 Published on 30 MAR 2019


VOLUME 5 ISSUE 2 Published on 30 JUN 2019


VOLUME 5 ISSUE 3 Published on 30 SEP 2019


VOLUME 5 ISSUE 4 Published on 30 DEC 2019


VOLUME 6 ISSUE 1 Published on 30 MAR 2020


VOLUME 6 ISSUE 2 Published on 30 JUN 2020


VOLUME 6 ISSUE 3 Published on 30 SEP 2020


VOLUME 6 ISSUE 4 Published on 30 DEC 2020


VOLUME 7 ISSUE 1 Published on 30 MAR 2021


VOLUME 7 ISSUE 2 Published on 30 JUN 2021


VOLUME 7 ISSUE 3 Published on 30 SEP 2021


VOLUME 8 ISSUE 1 Submission Last Date: 30 SEP 2024





JUN 2018 - VOLUME 4 ISSUE 2


1. Relevant Information Retrieval using SBIR Algorithm
Pages : 1-4
Premsagar Khurde, Vineet Patil, Prasad Bhatmurgi, Mangesh Tanpure, Prof. Aprhna Mote
Abstract | PDF
2. Survey on Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm
Pages : 5-7
Arsila Nannikar, Prof S. M. Shinde
Abstract | PDF
3. Survey on Cash Withdrawal from ATM machine using Mobile Banking
Pages : 8-10
Pallavi Thite, Prof V. D. Jadhav
Abstract | PDF
4. Survey on Attacker and Different Security Scheme in Delay Tolerant Wireless Ad hoc Network
Pages : 11-13
Ankita Kulkarni, Prof. S. M. Shinde
Abstract | PDF
5. Implementation of Code Level Approach to Heterogeneous Iris Recognition
Pages : 14-17
Sagar Sale, Prof.V.D.Jadhav
Abstract | PDF
6. Strong Security Mechanism through Two Factor Authentication Text and Graphical Password
Pages : 18-21
Dr. Swapnaja Ubale, Rekha Babar, Pooja Bhise, Shubham Nehere, Tanuja Pawar
Abstract | PDF
7. Securing Cloud, SDN and Large Data Network Environments from Emerging DDos Attacks
Pages : 22-25
Vedant Shimpi, Ganesh Patil, Omkar Shinde, Prof.Pushpmala S. Nawghare
Abstract | PDF
8. Loop Wheel Bicycle
Pages : 26-29
Shirsat T.V., Dashaputre M.G., Kolekar S.J., Gayakwad A.A, Prof. Shahane T.S
Abstract | PDF
9. Reduction of Harmfull Gases from Exhaust by Using Perforated Tube
Pages : 30-32
Antule Talha, Bhumkar Suraj, Gaikwad, Akshy, Kadam Amol
Abstract | PDF
10. Power Quality Improvement by Using Hybrid Filter
Pages : 33-35
Dalavi Mahesh, Suralkar Akshay, Mane sudhir, Shirole Anil, Prof. Jadhav.P.S.
Abstract | PDF
11. An Intrusion Detection and Protection System for Securing Data with the Help of Data Mining and Forensic Techniques
Pages : 36-39
Balu Misal, Prof.S.M. Shinde
Abstract | PDF
12. Implementation of Secure File storage in Cloud Computing using Hybrid Cryptography
Pages : 40-42
Arsila Nannikar, Prof S. M. Shinde
Abstract | PDF

Copyright © 2024 - All Rights Reserved


Designed & Developed by : Bsoftsys Solutions