Archived Papers for Journal
International Journal of Computer Engineering and Technology (IJCET) >>
Vol.9, No.2
Publisher: IAEME Publication
Publishing Date: 2018-04-19
- ON PRIVACY PRESERVING DATA MINING AND FEATURE SELECTION STABILITY MEASURES: A COMPARATIVE ANALYSISAuthors: MOHANA CHELVAN P; PERUMAL K
- TIME OPTIMIZATION FOR AUTHENTIC AND ANONYMOUS GROUP SHARING IN CLOUD STORAGEAuthors: MUTHIREDDY P MANJULA S H; VENUGOPAL K R
- COMPARATIVE STUDY OF SUPERVISED LEARNING FOR STUDENT PERFORMANCE EVALUATIONAuthors: SWETA V. PARMAR; LOKESH KUMAR SHARMA
- STUDY OF VARIOUS APPLICATIONS OF INTERNET OF THINGS (IOT)Authors: AKANKSHA BALI MOHITA RAINA; SIMRAN GUPTA
- A REVIEW OF RESOURCE ALLOCATION TECHNIQUES IN CLOUD COMPUTINGAuthors: RISHI ALURI SHRIYA MEHRA APOORVA SAWANT PANKTI AGRAWAL; MAYANK SOHANI
- UNSTRUCTURED DATA ANALYSIS AND PROCESSING USING BIG DATA TOOL - HIVE AND MACHINE LEARNING ALGORITHM - LINEAR REGRESSIONAuthors: Neha Mangla; Priya Rathod
- A SURVEY OF RECENT TECHNIQUES IN AUTOMATIC TEXT SUMMARIZATIONAuthors: Dhanya P.M Sreekumar A; Jathavedan M
- A SECURE AND CERTIFIABLE ACCESS MECHANISM SYSTEM DESIGNED FOR BIG DATA STORAGE IN CLOUDSAuthors: K. Vikram Ch.Aparna Harshitha.B; Ishpreet Kaur
- HYBRID BASED IMAGE ENHANCEMENT METHOD USING WHITE BALANCE, VISIBILITY AMPLIFICATION AND HISTOGRAM EQUALIZATIONAuthors: Griselda Nerina Dorothy Mendes; Saravanan KN
- SECURE CONFIGURATION SERVICE IN AN IOT-BASED AD-HOC MEDICAL DEVICESAuthors: Raghu Nallani Chakravartula; V. Naga Lakshmi
- NETWORK SENSORS HAVE PERMANENT POWER WITH BIO-CELLAuthors: Amarasimha T; G.A. Ramachandra
- AN APPROACH TO DISTINGUISH THE CONDITIONS OF FLASH CROWD VERSUS DDOS ATTACKS AND TO REMEDY A CYBER CRIMEAuthors: N. Srihari Rao K. Chandra Sekharaiah; A. Ananda Rao
- A FRAME WORK TO IMPROVE PERFORMANCE OF DISTRIBUTED DATA MINING USING RANKING AND MULTI-AGENT SYSTEMSAuthors: R. Vikram G. Bhanu Prakash G. Praneeth; Eshwar Reddy
- PRIORITY BASED NON-PREEMPTIVE SHORTEST JOB FIRST RESOURCE ALLOCATION TECHNIQUE IN CLOUD COMPUTINGAuthors: Rishi Aluri Shriya Mehra Apoorva Sawant Pankti Agrawal Mayank Sohani
- A SURVEY OF ANDROID PLATFORM BASED MALWARE DETECTION TECHNIQUESAuthors: Rincy Raphael
- CNSM: COSINE AND N-GRAM SIMILARITY MEASURE TO EXTRACT REASONS FOR SENTIMENT VARIATION ON TWITTERAuthors: Savitha Mathapati Anil D Tanuja R S H Manjula; Venugopal K R
- MODEL FUZZY K-NEAREST NEIGHBOR WITH LOCAL MEAN FOR PATTERN RECOGNITIONAuthors: HAFIZH AL-KAUTSAR AIDILOF MUHAMMAD ZARLIS SYAHRIL EFENDI