Volume 5 Issue 3 2023

Serial: 1

A STUDY OF TRAINING IN INSURANCE AND THEIR IMPACT ON EMPLOYEES PRODUCTIVITY

Authors: Shefali Verma Thakral
Page No: 1-16
Shefali Verma Thakral. A STUDY OF TRAINING IN INSURANCE AND THEIR IMPACT ON EMPLOYEES PRODUCTIVITY. 1-16. http://journalcybersecurity.com/wp-content/uploads/1-Mar-2023.pdf
Serial: 2

Employee Attrition Prediction Using Random Forest Classifier

Authors: DR.A.K.Mariappan
Page No: 1-8
DR.A.K.Mariappan. Employee Attrition Prediction Using Random Forest Classifier. 1-8. http://journalcybersecurity.com/wp-content/uploads/2-Mar-2023.pdf
Serial: 3

Name-Based Human Gender Classification using Machine Learning

Authors: Barkha A. Wadhvani, Shreya Jagani, Kreesh Rajani, Hardik Magatarpara, Darshan Chauhan
Page No: 1-9
Barkha A. Wadhvani, Shreya Jagani, Kreesh Rajani, Hardik Magatarpara, Darshan Chauhan. Name-Based Human Gender Classification using Machine Learning. 1-9. http://journalcybersecurity.com/wp-content/uploads/3-Mar-2023.pdf
Serial: 4

Perceptions on Effectiveness of Training among the Employees –An Empirical Research

Authors: Dr.K.Dhevan
Page No: 1-12
Dr.K.Dhevan. Perceptions on Effectiveness of Training among the Employees –An Empirical Research. 1-12. http://journalcybersecurity.com/wp-content/uploads/4-Mar-2023.pdf
Serial: 5

Recognizing Face Micro Expressions Through Surveys

Authors: Twisha Patel
Page No: 12
Twisha Patel. Recognizing Face Micro Expressions Through Surveys. 12. http://journalcybersecurity.com/wp-content/uploads/5-Mar-2023.pdf
Serial: 6

Utilizing Ledger and Block chain Technologies to fight digital fraud and fake Reality

Authors: A Vennela, A Jyoshna, B Radhika, M Deepika, R Mounika
Page No: 1-5
A Vennela, A Jyoshna, B Radhika, M Deepika, R Mounika. Utilizing Ledger and Block chain Technologies to fight digital fraud and fake Reality. 1-5. http://journalcybersecurity.com/wp-content/uploads/5-Mar-2023.pdf
Serial: 7

Clash Detection for Commercial Building – Using Computing Method

Authors: Onkar Jagtap, Raman Pate, Satish Ghavane, Omkar Rachha, S.P. Lokhande, Dr.N.V. Khadake
Page No: 1-6
Onkar Jagtap, Raman Pate, Satish Ghavane, Omkar Rachha, S.P. Lokhande, Dr.N.V. Khadake. Clash Detection for Commercial Building – Using Computing Method. 1-6. http://journalcybersecurity.com/wp-content/uploads/7-Mar-2023.pdf
Serial: 8

Experimental study of bitumen properties by using polythene waste

Authors: Swapnil Anant Sadi, Ajay Digamber Rathod, Suyash Rajendra Ture, Rohit Sharad Thakare
Page No: 1-5
Swapnil Anant Sadi, Ajay Digamber Rathod, Suyash Rajendra Ture, Rohit Sharad Thakare. Experimental study of bitumen properties by using polythene waste. 1-5. http://journalcybersecurity.com/wp-content/uploads/8-Mar-2023.pdf
Serial: 9

A Review on Implementation of Affiliate trading platform using consumer response

Authors: Vrushali Shrawan Thombre, Vaibhav Ashok Dharnidhar, Pratiksha Nirvikar Adhau, Ankita Sanjay Dhunde, Sharadha Chourasia
Page No: 1-3
Vrushali Shrawan Thombre, Vaibhav Ashok Dharnidhar, Pratiksha Nirvikar Adhau, Ankita Sanjay Dhunde, Sharadha Chourasia. A Review on Implementation of Affiliate trading platform using consumer response. 1-3. http://journalcybersecurity.com/wp-content/uploads/9-Mar-2023.pdf
Serial: 10

Efficient privacy preserving scheme for cloud computing

Authors: Dr. Mani Arora
Page No: 1-6
Dr. Mani Arora. Efficient privacy preserving scheme for cloud computing. 1-6. http://journalcybersecurity.com/wp-content/uploads/10-Mar-2023.pdf
Serial: 11

Generalized Skew Reverse Derivations in Semi Prime Rings

Authors: S.Lalitha, Dr.S.Sreenivasulu, A.Mallikarjuna Reddy
Page No: 1-6
S.Lalitha, Dr.S.Sreenivasulu, A.Mallikarjuna Reddy. Generalized Skew Reverse Derivations in Semi Prime Rings. 1-6. http://journalcybersecurity.com/wp-content/uploads/11-Mar-2023.pdf
Serial: 12

IOT BASED WEATHER MONITORING SYSTEM USING ARDUINO

Authors: J SRI RAM PAVAN, P.V.SAI ABHISHEK, P.GANAPATHI SWAMY, P.SURYA, P.PAVAN KUMAR
Page No: 1-9
J SRI RAM PAVAN, P.V.SAI ABHISHEK, P.GANAPATHI SWAMY, P.SURYA, P.PAVAN KUMAR. IOT BASED WEATHER MONITORING SYSTEM USING ARDUINO. 1-9. http://journalcybersecurity.com/wp-content/uploads/12-Mar-2023.pdf
Scroll to Top