Latest News

** For Peer Reviewed, UGC App, UGC CARE, Scopus and WoS (M) 8708927219 (W) 9034872290

Categories

QR Code

Visitor Counter

Large Visitor Map



S.No Particular Pdf Page No.
1
  • A NEW CLASS OF MINIMAL AND MAXIMAL SETS VIA BÄœ – CLOSED SET



Dr. R. Subasree

Abstract:
In this paper a new class of sets namely, bĝ–minimal and bĝ–maximal closed sets in topological spaces are introduced and characterized so as to determine their behaviour relative to subspaces.


1-11
2
  • A NEW TECHNIQUE FOR SOLVING ASSIGNMENT PROBLEM USING RANKING EXPONENTIAL VALUE OF PENTAGON FUZZY NUMBERS



Prof. A. N. Mohamad, Gebrehiwot,Olana Abu

Abstract:
In the field of research several techniques are focused for solving Assignment Problems in Fuzzification way.


12- 21
3
  • ANALYSIS OF TELEVISION AND INTERNET SERVICES AT RURAL PLACES IN PUNE DISTRICT



Dr. Vaishali Sangvikar

Abstract:
This study is based on questionnaires presented to people from rural places from Pune district.


22- 37
4
  • MODIFIED NEW ALGEBRAIC STRUCTRES ON IMAGINABLE FUZZY SOFT RING HOMOMORPHISM AND ISOMORPHISM



Prof. A. N. Mohamad, Zebider Ayenew, Selamawit Hunie

Abstract:
Most of the scholars did their research in fuzzy soft sets.


38-52
5
  • ANALYSIS OF BANKING SERVICES THROUGH INFORMATION TECHNOLOGY AND ITS IMPACT ON RURAL PLACES IN PUNE DISTRICT



Dr. Vaishali Sangvikar

Abstract:
This study is based on questionnaires presented to people from rural areas in Pune district.


53-63
6
  • A REVIEW TO DETECT DIABETIC RETINOPATHY THROUGH ENHANCE CLASSIFICATION ACCURACY OF DEEP LEARNING



Gurbinder Singh, Dr. R.C Gangwar, Mr. Mohit Marawaha

Abstract:
Data mining and image mining provides mechanism to extract useful information out of the big data provided for extraction.


64-73
7
  • A Study on the Usage of Block Chain Tracing for Security Architecture for Cloud Computin



Nikita Thakur Dr. C.RAM Singla

Abstract:
Cloud computing has revolutionized data storage and access, offering flexibility, scalability, and cost-effectiveness. However, its inherent reliance on centralized servers raises security concerns. Data breaches and unauthorized access remain significant threats. Blockchain technology, with its core principles of decentralization, immutability, and transparency, presents a compelling solution for bolstering cloud security through blockchain tracing. Traditional cloud security architectures rely on centralized authentication and authorization mechanisms. This creates a single point of failure, making the system vulnerable if compromised. Blockchain, on the other hand, distributes data across a network of computers, eliminating the need for a central authority. Each block in the chain holds a cryptographic hash of the previous block, creating an immutable record that cannot be tampered with. This immutability ensures data integrity within the cloud environment.


74-85
Collaboration Partners
  • Indian Journals

  • Swedish Scientific
    Publications

  • The Universal
    Digital Library

  • Green Earth Research
    And Publishing House

  • Rashtriya Research Institute
    Of New Medical Sciences

Indexing By