unable to load
Computer Phone

Welcome to JJEM: A Multi-Disciplinary Journal of JNNCE, Shimoga.

JJEM Eleventh Issue - Volume 6 Number 1 -2022

JJEM: Volume 6 Issue 1



#
Details
Page No
Download
1. Design and Structural Modification of Industrial Plateau Honing Machine

R Kumar,  Nandeesha H L

1-9
2. 5G Communication Technology – Do They Interfere with Flight Communication Signals

Shiva Prasad N G,  Harish V,  Ashok G V

10-14
3. Design Thinking Approach to Manage Home Inventory

Pankaj S. Ardak

15-18
4. Tribological Behaviour of Aluminium/WC Metal Matrix Composite Using ANN

Deepak S,  Balasubramanya H S,  Nandeesha H L,  Veeresh Kumar G B,  Divakara Shetty A S

19-24
5. Green Accounting for a Sustainable Economy: A Case Study of Marico Ltd

Srivaideshwari S,  Sai Sushmitha V

25-30
6. Literature Survey on Big-Data Analytics and Tools

Aruna Kumar P,  Pavan Kumar M P,  Suchethana H C

31-44
7. Experimental Study on Influence of Nature of Fluids on Darcy’s Friction Coefficient

Kanchana H J

45-48
8. An approach to achieve message integrity using SHA-256 and Elliptic Curve Cryptography with Salting

Ganavi M,  Prabhudeva S

49-56
9. Securing D2D Communication using Lightweight Cryptography

Ajith Kumar V,  K Satyanarayan Reddy

57-66
10. Review report on Security Challenges in D2D Communication

Ajith Kumar V,  K Satyanarayan Reddy

67-75
11. Survey on Robust Block-Chain Assisted Internet of Medical Things (IoMT) Infrastructure for Healthcare Sector

Chandini A.G,  P.I Basarkod

76-86
12. Securing the Information Contents in Images based on Cellular Automata and Genetic Operations – A Parallel Approach

Jalesh Kumar, Chakrapani D S

87-92
13. LightWeight Public Key Cryptography Based on Cyclic Group of 6x Mod 11 and its Application to Image Encryption

Deeksha,  Manisha Shalini Mascarenhas,  Raghavendra A

93-100
14. A Comprehensive study on RSA Prime Factorization Algorithms

Murthy D H R

101-104
15. Cryptographic Key Management Using Elliptic Curve X448 for Multiuser Environment

Mohan Naik R,  Sowmya T K

105-111
16. Application of Superpixels Segmentation in Digital Image Forgery Detection

Shwetha B

112-116
17. Light Weight Cryptographic Algorithms- A Comparison for IoT Sensor Data

Latha P,  Andhe Pallavi

117-120
18. Context Sensitive Privacy Algorithm Method for Users in Cloud

H. Manoj T. Gadiyar,  Thyagaraju G S,  R H Goudar

121-125