ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Engineering and Technology (IJCET) >>

Vol.9, No.2

Publisher: IAEME Publication

Publishing Date: 2018-04-19

  1. ON PRIVACY PRESERVING DATA MINING AND FEATURE SELECTION STABILITY MEASURES: A COMPARATIVE ANALYSIS

    Authors: MOHANA CHELVAN P; PERUMAL K

  2. TIME OPTIMIZATION FOR AUTHENTIC AND ANONYMOUS GROUP SHARING IN CLOUD STORAGE

    Authors: MUTHIREDDY P MANJULA S H; VENUGOPAL K R

  3. COMPARATIVE STUDY OF SUPERVISED LEARNING FOR STUDENT PERFORMANCE EVALUATION

    Authors: SWETA V. PARMAR; LOKESH KUMAR SHARMA

  4. STUDY OF VARIOUS APPLICATIONS OF INTERNET OF THINGS (IOT)

    Authors: AKANKSHA BALI MOHITA RAINA; SIMRAN GUPTA

  5. A REVIEW OF RESOURCE ALLOCATION TECHNIQUES IN CLOUD COMPUTING

    Authors: RISHI ALURI SHRIYA MEHRA APOORVA SAWANT PANKTI AGRAWAL; MAYANK SOHANI

  6. UNSTRUCTURED DATA ANALYSIS AND PROCESSING USING BIG DATA TOOL - HIVE AND MACHINE LEARNING ALGORITHM - LINEAR REGRESSION

    Authors: Neha Mangla; Priya Rathod

  7. A SURVEY OF RECENT TECHNIQUES IN AUTOMATIC TEXT SUMMARIZATION

    Authors: Dhanya P.M Sreekumar A; Jathavedan M

  8. A SECURE AND CERTIFIABLE ACCESS MECHANISM SYSTEM DESIGNED FOR BIG DATA STORAGE IN CLOUDS

    Authors: K. Vikram Ch.Aparna Harshitha.B; Ishpreet Kaur

  9. HYBRID BASED IMAGE ENHANCEMENT METHOD USING WHITE BALANCE, VISIBILITY AMPLIFICATION AND HISTOGRAM EQUALIZATION

    Authors: Griselda Nerina Dorothy Mendes; Saravanan KN

  10. SECURE CONFIGURATION SERVICE IN AN IOT-BASED AD-HOC MEDICAL DEVICES

    Authors: Raghu Nallani Chakravartula; V. Naga Lakshmi

  11. NETWORK SENSORS HAVE PERMANENT POWER WITH BIO-CELL

    Authors: Amarasimha T; G.A. Ramachandra

  12. AN APPROACH TO DISTINGUISH THE CONDITIONS OF FLASH CROWD VERSUS DDOS ATTACKS AND TO REMEDY A CYBER CRIME

    Authors: N. Srihari Rao K. Chandra Sekharaiah; A. Ananda Rao

  13. A FRAME WORK TO IMPROVE PERFORMANCE OF DISTRIBUTED DATA MINING USING RANKING AND MULTI-AGENT SYSTEMS

    Authors: R. Vikram G. Bhanu Prakash G. Praneeth; Eshwar Reddy

  14. PRIORITY BASED NON-PREEMPTIVE SHORTEST JOB FIRST RESOURCE ALLOCATION TECHNIQUE IN CLOUD COMPUTING

    Authors: Rishi Aluri Shriya Mehra Apoorva Sawant Pankti Agrawal Mayank Sohani

  15. A SURVEY OF ANDROID PLATFORM BASED MALWARE DETECTION TECHNIQUES

    Authors: Rincy Raphael

  16. CNSM: COSINE AND N-GRAM SIMILARITY MEASURE TO EXTRACT REASONS FOR SENTIMENT VARIATION ON TWITTER

    Authors: Savitha Mathapati Anil D Tanuja R S H Manjula; Venugopal K R

  17. MODEL FUZZY K-NEAREST NEIGHBOR WITH LOCAL MEAN FOR PATTERN RECOGNITION

    Authors: HAFIZH AL-KAUTSAR AIDILOF MUHAMMAD ZARLIS SYAHRIL EFENDI