ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Engineering and Technology (IJCET) >>

Vol.7, No.3

Publisher: IAEME Publication

Publishing Date: 2016-06-28

  1. SURVEY ON MOBILE AD HOC NETWORK

    Authors: INDU SARMAL; AMARDEEP SINGH; SHARANJIT SINGH

  2. A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN

    Authors: ROSHAN SINGH SACHAN; RAGHAV YADAV; AJEET KUMAR RAI

  3. DATA HANDLING FOR SPSS

    Authors: NANASAHEB MAHADEV HALGARE; BAGWAN A.B.; BIRADAR D.V.

  4. IMPLEMENTATION OF SASF CRAWLER BASED ON MINING SERVICES

    Authors: RAKESH SHASTRI SHUBHAM AGE; TUSHAR INDORKAR; SHITAL KOKATE; MANISHA SHITOLE

  5. POSITIONING OF THE NEW MEANS OF COMMUNICATION AND INFORMATION: EMPIRICAL STUDY ON THE SOCIAL NETWORKS IN MOROCCO

    Authors: HAMID NAHLA

  6. ARTIFICIAL NEURAL NETWORK MODELING AND OPTIMIZATION IN HONING PROCESS

    Authors: BENU SINGH; SUNITA BANSAL; PUNEET MISHRA

  7. DEVELOPMENT OF CONTROL SOFTWARE FOR STAIR DETECTION IN A MOBILE ROBOT USING ARTIFICIAL INTELLIGENCE AND IMAGE PROCESSING

    Authors: MUKUL ANAND PATHAK; KSHITIJ KAMLAKAR; SHWETANT MOHAPATRA; UMA NAGARAJ

  8. OPTIMIZING THE GREENHOUSE MICRO-CLIMATE MANAGEMENT BY THE INTRODUCTION OF ARTIFICIAL INTELLIGENCE USING FUZZY LOGIC

    Authors: DIDI FAOUZI; NACEREDDINE BIBI TRIKI; ALI CHERMITTI

  9. IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK

    Authors: CHAUDHARI KOMALBEN KANJIBHAI

  10. CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ALGORITHM TO BLOCK THE ATTACKERS

    Authors: MANPREET; ANIL KUMAR SHARMA

  11. STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED MULTIHOP ROUTING PROTOCOLS FOR EFFECTIVE ROUTING IN MANET

    Authors: Neha Bhatia; Anil Kumar Sharma

  12. TYPOLOGICAL STUDY ON THE BEHAVIOR OF THE MOROCCANS IN THE SOCIAL NETWORKS

    Authors: HAMID NAHLA

  13. GENERATIVE SCHEDULING OF EFFECTIVE MULTITASKING WORKLOADS FOR BIG-DATA ANALYTICS IN ELASTIC CLOUD

    Authors: SALU GEORGE

  14. A REVIEW OF MEMORY UTILISATION AND MANAGEMENT RELATED ISSUES IN WIRELESS SENSOR NETWORK REPROGRAMMING PROCEDURES

    Authors: ERONU E. M.; IBRAHIM E.T.; JOHN H.M.

  15. A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOL

    Authors: NAVEED FARHANA; MURTHY H. S. N

  16. FACE DETECTION USING PRINCIPAL COMPONENT ANALYSIS

    Authors: PARTEEK KUMAR; PRAVEEN SEHGAL

  17. A DENIAL OF SERVICE STRATEGY TO ORCHESTRATE STEALTHY ATTACK PATTERNS IN CLOUD COMPUTING

    Authors: GOUTHAM V.; TEJASWINI M.

  18. APPLICATION OF DIGITAL CLOUD LIBRARIES FOR ETHIOPIAN PUBLIC HIGHER LEARNING INSTITUTIONS (EPHLIS)

    Authors: GETANEH BERIE TAREKEGN; YIRGA YAYEH MUNAYE

  19. COMPARATIVE STUDY OF WORKING ON A HOST MACHINE, CLOUD MACHINE AND VIRTUAL MACHINE

    Authors: SUGANDHI MIDHA

  20. SMAC TECHNOLOGIES CHANGING THE WAY WE TRAVEL

    Authors: Kusum Yadav; Kimaya Ambekar