Archived Papers for Journal
International Journal of Computer Engineering and Technology (IJCET) >>
Vol.9, No.6
Publisher: IAEME Publication
Publishing Date: 2018-12-28
- COST SENSITIVE SOFTWARE DEFECT PREDICTION TECHNIQUE USING GENETIC ALGORITHMAuthors: G N V RAMANA RAO VVSSS BALARAM; DR.B.VISHNUVARDHAN
- STRATEGY DEVELOPMENT BASED SECURITY APPLICATION TO BOOST THE SOFTWARE SECURITY DEFINED NETWORK USING MODERN PROFICIENT HILL CIPHER ALGORITHMAuthors: S.K. MURUGANANDHAM S. NALLUSAMY DULAL KRISHNA MANDAL; PARTHA SARATHI CHAKRABORTY
- COURSE EVALUATION OF AN INSTITUTION USING EDMAuthors: S. JOTHI LAKSHMI; M. THANGARAJ
- BANANA-SEG, A FULLY CONVOLUTIONAL DEEP NEURAL NETWORK FOR BANANA TREE CROWN MAPPING IN AERIAL IMAGERY ACQUIRED FROM AN UNMANNED AERIAL VEHICLE (UAV)Authors: RAMESH KESTUR; MEENAVATHI M.B
- SAT BASED ALGORITHMIC APPROACH FOR SUDOKU PUZZLEAuthors: DEEPIKA RAI N.S. CHAUDHARI; MAYA INGLE
- A GENETIC ALGORITHM BASED APPROACH TO SOLVE VLSI FLOORPLANNING PROBLEMAuthors: LEENA JAIN; AMARBIR SINGH
- A SURVEY ON SECURITY ATTACKS AND CHALLENGES IN BITCOINAuthors: VIJI PRIYA .G KRISHNA PRIYA .G VIVEK .M; ASHWINI .R
- DATA SECURITY ON CLOUD COMPUTINGAuthors: AZHAR USHMANI
- DATA SECURITY ON CLOUD COMPUTINGAuthors: AZHAR USHMANI
- SCIENTIFIC WORKFLOW SCHEDULING IN CLOUD COMPUTING ENVIRONMENT: A SURVEYAuthors: A. THUSHARA
- OPINION MINING FROM CUSTOMER REVIEWS FOR EFFECTIVE EVENT MANAGEMENTAuthors: MITA K. DALAL
- MAINTAINABILITY EVALUATION MODEL FOR OBJECT ORIENTED SOFTWAREAuthors: NIDHI GOYAL; REENA SRIVASTAVA
- FUZZY ASSOCIATION RULE MINING FOR STUDENT PERFORMANCE EVALUATIONAuthors: Sweta V. Parmar; LokeshKumar Sharma
- AN AVANT-GARDE APPROACH OF BLOCKCHAIN IN BIG DATA ANALYTICSAuthors: Manisha Valera Parth Patel; Shruti Chettiar
- EDPFRS: ENHANCED DYNAMIC POPULAR FILE REPLICATION AND SCHEDULING FOR DATA GRID ENVIRONMENTAuthors: Bhuvaneswari R; Ravi T N EDPFRS
- AN EFFICIENT APPROACH FOR PROVIDING FULL CONNECTIVITY IN WIRELESS SENSOR NETWORKAuthors: Shobha Biradar; Mallikarjuna Shastry P.M
- SMART GARBAGE BIN SYSTEMAuthors: Revathi Lavanya Baggam
- COMPARAITIVE ANATYSIS OF FACIAL EXPRESSION RECOGNITION USING HMM AND SVMAuthors: Devang Pandya Vandana Patidar; Divya Kushwah
- GENETIC SYNDROME DETECTION USING RADON TRANSFORM AND BIT PLANESAuthors: Archana P. Ekbote; Varsha R. Ratnaparkhe
- MODERN IRRIGATION SYSTEMAuthors: Varshali Jaiswal Krati Mahalwar Shalivahan Singh; Shray Khandelwal
- SAT BASED ALGORITHMICAPPROACH FOR SUDOKU PUZZLEAuthors: Deepika Rai N.S. Chaudhari; Maya Ingle
- APPLYING VIGOR AND PARTICLE SKIN ON THREE DIMENSIONAL PERSON VISAGE TERMINOLOGYAuthors: Arun Kumar S
- HYBRID AUCTION-BASED MECHANISM FOR DYNAMIC VIRTUAL MACHINE PROVISIONING AND ALLOCATION IN CLOUDAuthors: Wasim Raja A
- IDENTIFICATION APPROACH FOR BIOMETRIC SYSTEMS USING THE ABM PROCEDURE WITH THE LOW FREQUENCY EYE TRACKERAuthors: Shanthi
- PRESERVING DATA AND MANAGING CONCURRENCY IN DISTRIBUTED DATABASEAuthors: Karthick S
- A STUDY ON NETWORK SECURITY PARADIGM IN 21ST ERAAuthors: A. Umamaheswari R. Loganathan
- EXEMPLIFYING DIGITAL IMAGE PROCESSING USING EXPERIMENTSAuthors: N. Viswanathan K. Manivel