Archived Papers for Journal
International Journal of Computer Engineering and Technology (IJCET) >>
Vol.7, No.3
Publisher: IAEME Publication
Publishing Date: 2016-06-28
- SURVEY ON MOBILE AD HOC NETWORKAuthors: INDU SARMAL; AMARDEEP SINGH; SHARANJIT SINGH
- A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNAuthors: ROSHAN SINGH SACHAN; RAGHAV YADAV; AJEET KUMAR RAI
- DATA HANDLING FOR SPSSAuthors: NANASAHEB MAHADEV HALGARE; BAGWAN A.B.; BIRADAR D.V.
- IMPLEMENTATION OF SASF CRAWLER BASED ON MINING SERVICESAuthors: RAKESH SHASTRI SHUBHAM AGE; TUSHAR INDORKAR; SHITAL KOKATE; MANISHA SHITOLE
- POSITIONING OF THE NEW MEANS OF COMMUNICATION AND INFORMATION: EMPIRICAL STUDY ON THE SOCIAL NETWORKS IN MOROCCOAuthors: HAMID NAHLA
- ARTIFICIAL NEURAL NETWORK MODELING AND OPTIMIZATION IN HONING PROCESSAuthors: BENU SINGH; SUNITA BANSAL; PUNEET MISHRA
- DEVELOPMENT OF CONTROL SOFTWARE FOR STAIR DETECTION IN A MOBILE ROBOT USING ARTIFICIAL INTELLIGENCE AND IMAGE PROCESSINGAuthors: MUKUL ANAND PATHAK; KSHITIJ KAMLAKAR; SHWETANT MOHAPATRA; UMA NAGARAJ
- OPTIMIZING THE GREENHOUSE MICRO-CLIMATE MANAGEMENT BY THE INTRODUCTION OF ARTIFICIAL INTELLIGENCE USING FUZZY LOGICAuthors: DIDI FAOUZI; NACEREDDINE BIBI TRIKI; ALI CHERMITTI
- IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKAuthors: CHAUDHARI KOMALBEN KANJIBHAI
- CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ALGORITHM TO BLOCK THE ATTACKERSAuthors: MANPREET; ANIL KUMAR SHARMA
- STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED MULTIHOP ROUTING PROTOCOLS FOR EFFECTIVE ROUTING IN MANETAuthors: Neha Bhatia; Anil Kumar Sharma
- TYPOLOGICAL STUDY ON THE BEHAVIOR OF THE MOROCCANS IN THE SOCIAL NETWORKSAuthors: HAMID NAHLA
- GENERATIVE SCHEDULING OF EFFECTIVE MULTITASKING WORKLOADS FOR BIG-DATA ANALYTICS IN ELASTIC CLOUDAuthors: SALU GEORGE
- A REVIEW OF MEMORY UTILISATION AND MANAGEMENT RELATED ISSUES IN WIRELESS SENSOR NETWORK REPROGRAMMING PROCEDURESAuthors: ERONU E. M.; IBRAHIM E.T.; JOHN H.M.
- A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOLAuthors: NAVEED FARHANA; MURTHY H. S. N
- FACE DETECTION USING PRINCIPAL COMPONENT ANALYSISAuthors: PARTEEK KUMAR; PRAVEEN SEHGAL
- A DENIAL OF SERVICE STRATEGY TO ORCHESTRATE STEALTHY ATTACK PATTERNS IN CLOUD COMPUTINGAuthors: GOUTHAM V.; TEJASWINI M.
- APPLICATION OF DIGITAL CLOUD LIBRARIES FOR ETHIOPIAN PUBLIC HIGHER LEARNING INSTITUTIONS (EPHLIS)Authors: GETANEH BERIE TAREKEGN; YIRGA YAYEH MUNAYE
- COMPARATIVE STUDY OF WORKING ON A HOST MACHINE, CLOUD MACHINE AND VIRTUAL MACHINEAuthors: SUGANDHI MIDHA
- SMAC TECHNOLOGIES CHANGING THE WAY WE TRAVELAuthors: Kusum Yadav; Kimaya Ambekar