ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Engineering and Technology (IJCET) >>

Vol.9, No.4

Publisher: IAEME Publication

Publishing Date: 2018-12-27

  1. SETUP AND EXPERIMENT WITH GEO-REDUNDANT TESTING FRAMEWORK (TF2GRACE)

    Authors: RIAZ AHMAD; TAMANNA SIDDIQUI

  2. ROUGH SET THEORY APPLICATIONS ON MEASURING TEXT MINING TASKS

    Authors: M. SUDHA; A. KUMARAVEL

  3. SUPRA PAIRWISE CONNECTED AND PAIRWISE SEMI-CONNECTED SPACES

    Authors: R. GOWRI; A.K.R. RAJAYAL

  4. CONTENT BASED AUDIO CLASSIFICATION USING ARTIFICIAL NEURAL NETWORK TECHNIQUES

    Authors: K.KARTHIKEYAN; Dr.R.MALA

  5. SLEEP EEG DATASET ANALYSIS USING ASSORTED TOOLS AND TECHNIQUES- MATLAB, POLYMAN, GNU OCTAVE

    Authors: APRAJITA SAMBYAL BIKRAM PAL KAUR; HARLIV KAUR

  6. DETECTION OF FISH FROM UNDERWATER IMAGES AND VIDEO: A COMPARATIVE STUDY

    Authors: VEERPAL KAUR; NEELOFAR SOHI

  7. A BIPARTITE GRAPH MODEL FOR COMPARING CLUSTERING OF SOFTWARE SYSTEM FOR FEATURE LOCATION

    Authors: A.S.BABY RANI; A.R.NADIRA BANU KAMAL

  8. CONVERSION OF TEXT IMAGE DOCUMENT IN SOUTHERN INDIAN LANGUAGES INTO BRAILLE FOR VISUALLY CHALLENGED PEOPLE

    Authors: G.GAYATHRI DEVI; G.SATHYANARAYANAN

  9. WRITER-INDEPENDENT OFF-LINE SIGNATURE VERIFICATION

    Authors: KAMLESH KUMARI; SANJEEV RANA

  10. NEWS SUMMARY GENERATION FRAMEWORK BASED ON ONTOLOGY AND NATURAL LANGUAGE PROCESSING TECHNIQUES

    Authors: SHINE K GEORGE; JAGATHY RAJ V P

  11. A PSO-SVM FEATURE SELECTION METHOD FOR IMPROVING THE PREDICTION ACCURACY OF HEART DISEASE

    Authors: A. SHAIK ABDUL KHADIR; K. MOHAMED AMANULLAH

  12. CONTENT BASED ARTIFICIAL NEURAL NETWORK TECHNIQUES FOR HUMAN MIND READING LOGICAL SYSTEM

    Authors: K. KARTHIKEYAN; R. MALA

  13. AN AUTOMATIC COMPUTER-AIDED WOMEN BREAST CANCER DIAGNOSIS SYSTEM FROM 2-D DIGITAL MAMMOGRAPHIC IMAGES

    Authors: A. KALAIVANI D. BHAVITHA; R. VIJAYA LAKSHMI

  14. COMPARATIVE ANALYSIS TO CONQUER SEMANTIC INTERPRETABILITY IN SEMANTIC WEB MINING

    Authors: MAMTA SHARMA; VIJAY RANA

  15. AUTOMATIC IDENTIFICATION OF NEWS TWEETS ON TWITTER

    Authors: ANITA KUMARI SINGH; SHASHI MOGALLA

  16. AN EFFICIENT APPROACH OF SOFTWARE COST ESTIMATION USING SOFT COMPUTING TECHNIQUES

    Authors: PUJA SINHA; PRAKASH KUMAR

  17. EVALUATION OF NTH BIT REPLACEMENT IN AUDIO STEGANOGRAPHY

    Authors: SUSHMA BAHUGUNA

  18. V-BIBE: A NEW IDENTITY BASED ENCRYPTION SCHEME

    Authors: CH.RAMESH K VENUGOPALRAO; D.VASUMATHI

  19. HANDWRITTEN ENGLISH WORD RECOGNITION USING HMM, BAUM-WELCH AND GENETIC ALGORITHM

    Authors: ATMA PRAKASH SINGH RAVINDRA NATH SANTOSH KUMAR

  20. HUMAN FACE DETECTION AND TRACKING

    Authors: VRUSHANG G. PATEL; ANIL SUTHAR

  21. DIABETIC RISK PREDICTION FOR WOMEN USING BOOTSTRAP AGGREGATION ON BACK-PROPAGATION NEURAL NETWORKS

    Authors: ALAN JACOB ANANTHAKRISHNAN D.S. JISHNU PRAKASH K; KARISHMA ELSA JOHNS

  22. PERFORMANCE ANALYSIS FOR SELECT, PROJECT AND JOIN OPERATIONS OF ORACLE, MY-SQL AND MICROSOFT ACCESS DBMSS

    Authors: DEEPTI KHANNA V B AGGARWAL; MEENU DAVE

  23. SURVEY ON SOFTWARE RELIABILITY PREDICTION USING SOFT COMPUTING

    Authors: NEETA RASTOGI SHISHIR RASTOGI; MANUJ DARBARI

  24. CURE IMPLEMENTATION

    Authors: ANCHAL CHAUHAN; SEEMA MAITREY

  25. ADDRESSING BIG DATA SECURITY ISSUES AND CHALLENGES

    Authors: NIRMAL KUMAR GUPTA

  26. ANALYSIS OF TEMPLATES MATCHING FOR HUMAN BODY PARTS RECOGNITION

    Authors: S. GOMATHI; D. MURUGAN

  27. ANALYTICAL STUDY ON BLOCK CHAIN TECHNOLOGY WITH REFERENCE TO CRYPTO CURRENCY AND AN OVERVIEW ON INDIA’S OWN CRYPTO CURRENCY

    Authors: ANNU MISHRA

  28. COMPARATIVE ANALYSIS OF IMAGE DENOISING TECHNIQUES FOR ENHANCING REAL-TIME IMAGES

    Authors: K. CHITHRA; D. MURUGAN

  29. WEB USAGE MINING FOR OPINION TARGET RECOGNITION WITH THE AID OF FUZZY CLUSTERING BASED RANDOM FOREST CLASSIFICATION

    Authors: SHALU BHATIA; ANIL KUMAR SHARMA

  30. COMPARISON OF USAGE OF CROWDSOURCING IN TRADITIONAL AND AGILE SOFTWARE DEVELOPMENT METHODOLOGIES ON THE BASIS OF EFFECTIVENESS

    Authors: HIMANSHU PANDEY SANTOSH KUMAR V.K SINGH WASEEM AHMAD

  31. A REVIEW OF DISTRIBUTED CLASSIFICATION AND IDENTIFICATION ALGORITHMS ON BIG DATA

    Authors: S. Karthick

  32. A CLOUD BASED MODEL FOR DEDUPLICATION OF LARGE DATA

    Authors: S. Shanthi

  33. STUDY OF BANKING SECURITY USING CLOUD COMPUTING

    Authors: Santhoshkumar S P

  34. ANALYZING STUDENT PERFORMANCE USING ROBUST CLUSTERING TECHNIQUE

    Authors: Manjubashini N

  35. A SURVEY ON HYBRID CRYPTOGRAPHY TECHNIQUES

    Authors: S Syed Shajahaan

  36. AUTHENTICATION FOR CLOUD SERVICE SELECTION USING MMB CLOUD-TREE

    Authors: Ananthi P Raja B Shahul Hameed J

  37. HIGH COVERAGE RANGE AND ENERGY EFFICIENCY USING MACRO BSS AND DISTRIBUTED MICRO BSS IN HCN

    Authors: S Bharathi

  38. TO SECURE M-PLAYERS IN ASSOCIATION RULE MINING TECHNIQUES IN DISTRIBUTED DATABASES

    Authors: Wasim Raja A

  39. REVISITING THE CONCEPTS AND TECHNIQUES OF DATA MINING

    Authors: S. Andrews R. Loganathan

  40. AN EXPLORATORY STUDY ON MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE

    Authors: R. Mothi S.Y. Dharini