Archived Papers for Journal
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) >>
Vol.6, No.5
Publisher: Navneet Singh Sikarwar
Publishing Date: 2017-11-25
- A SURVEY ON A NOVEL SPARK ON HADOOP YARN FRAMEWORK BASED IN-MEMORY PARALLEL PROCESSING FOR EFFECTIVE PERFORMANCEAuthors: V.Sreedevi J.Swami Naik
- Improving the Performance of Resource Allocation in Multitenancy MapReduce Using YARNAuthors: Sunanda CP Santhosh Kumar B
- Analyzing Electricity Consumption Behavior Of Households Using Big Data AnalyticsAuthors: B. Mohan Krishna K. Bala Chowdappa
- Towards a Cloud Computing ContinuumAuthors: Dr K Venkata Subba Reddy
- Soft computing and classification approach to Anomaly Based intrusion detection system: A SurveyAuthors: Preeti S. Joshi
- Novel clustering algorithm for moderating the risk of customer churnAuthors: K. Naga Dushyanth Reddy Dr.N. Kasivishwanath
- Optimized Task Scheduling Algorithm for cloud computing environmentAuthors: Poonam Rani Pooja Nagpal
- Pixel Analysis Technique for Image DenoisingAuthors: Er.Sonvir kaur bath Er.harjeet Singh Dr.Gurpreet singh
- Efficient Directed Acyclic Graph Scheduling In Order To Balance Load At CloudAuthors: Sandeep Kaur Pooja Nagpal
- To Propose an Improvement in Relay Based Routing to Reduce Fault in WBANAuthors: Neha Rakesh Kumar Sukhjot Kaur
- IMPLEMENT MULTICASTING TECHNIQUE TO DECREASE DELAY IN VANETAuthors: Shaffy Singh RakeshKumar Harinder Kaur
- CODE CLONE DETECTION: A REVIEW AND COMPARATIVE ANALYSISAuthors: Ekta Manhas Samriti Rana
- Performance Evaluation of LECH and HEED Clustering Protocols in Wireless Sensor NetworksAuthors: Narmada Sunil Kumar Sudesh Kumar
- Empirical Analysis of Open Source projects using Feature Selection and Filtering TechniquesAuthors: Prabujeet Kaur Dharmendra Lal Gupta
- A Prototype Implementation for Public Key Infrastructure Based on Transport Layer SecurityAuthors: Dr P Sumalatha Dr C Krishna Priya
- Energy-Aware Robust Key Management Technique for Dynamic Wireless Sensor NetworksAuthors: Dr. C. Krishna PriyaDr .P. Sumalatha
- CYBER CRIME: PHISHING ATTACKS AND VARIOUS ANTI-PHISHING TECHNIQUESAuthors: PRATEEK CHOUDHURY
- A special Tree based index structure for efficient data searching in cloud dataAuthors: P. Dileep Kumar Reddy
- A Comprehensive Study of Image Steganography TechniquesAuthors: Dr. Israa T. Ali Shaymaa Jawad
- Improvement in AODV for Congestion Avoidance using Bio-Inspired TechniquesAuthors: Shalini Thakur Mr. Bharat Batra
- Generalized Hankel-Clifford transformation for a class of tempered ultradistributionsAuthors: V. R. Lakshmi Gorty
- A Survey on DSDV Routing Protocol in Ad hoc NetworkAuthors: Jayashree Agarkhed
- Optimized Link State Routing - A ReviewAuthors: Jayashree Agarkhed
- QoS Aware Routing Protocol in Wireless Adhoc NetworkAuthors: Jayashree Agarkhed
- A Review on Security Techniques in MANETAuthors: Jayashree Agarkhed
- Modified Model of Predicting Traffic using KNN and Euclidean DistanceAuthors: Navreet Kaur Meenakshi Sharma
- Performance Evaluation Of Maximum Power Generation Of A Rooftop Solar Photovoltaic SystemAuthors: Sheeraz Kirmani Mohammad Kalimullah
- Design and Improve AODV Protocol for Congestion Avoidance in MANET Using Neural NetworkAuthors: Priya Mankotia Er.Amandeep Kaur
- A Survey on Dynamic Source Routing Protocol in Wireless Ad hoc NetworkAuthors: Jayashree Agarkhed
- Multicasting Routing Protocols in Wireless Ad hoc Network – A Comprehensive SurveyAuthors: Jayashree Agarkhed
- Android Application For Blood DonationAuthors: Yash Chopda Nirmal Jain ShreyasNair Ved Gindodia
- Sentiment Analysis of Social Media DataAuthors: K.Sandhya Rani Dr. D. Kavitha
- Innovate and Differentiate Your (BI) Analytics Product with Intelligent Narratives and Deeper Context of your dataAuthors: Indrasen Poola
- CLUSTERING ALGORITHM, IMPROVEMENT AND PERFORMANCE EVALUATION FOR DISASTER MANAGEMENTAuthors: Hamadi lirathni Wided Abidi Tahar Ezzedine
- Image segmentation using fuzzy Lomax-Gumbel DistributionAuthors: Dillip Ranjan Nayak Dr.Basanta Kumar Swain
- RMM: A Solution for Sharing data between Remote Mobile SystemsAuthors: Sarita Maurya
- An Efficient Virtual Machine Migration Algorithm Based on Artificial intelligenceAuthors: Navdeep Kaur Pooja Nagpal
- A SURVEY ON CANCER CLASSIFICATION USING DATA MINING TECHNIQUESAuthors: A.Daisy R.Porkodi
- Code Clone Detection Using COCOMO-1Authors: Ekta Manhas Samriti Rana
- VOLTAGE STABILITY IMPROVEMENT WITH INTEGRATION OF DG INTO THE DISTRIBUTION SYSTEMAuthors: Rudresha S J Dr. Shekhappa G. Ankaliki
- PV- Curve Analysis of 3 Bus Power System using MatlabAuthors: Manish Parihar M.K. Bhaskar Deepak Bohra Digvijay Sarvate
- A point of view about dry linear contact between glass fiber reinforced thermoplastic polymers materials on steelAuthors: Dorin Rus Virgil Florescu
- Comparison of Model Validation Techniques for Land Cover Dynamics in Jodhpur CityAuthors: S. L. Borana S.K.Yadav
- Geospatial Database Generation and Analysis for Disaster Management: A Case Study of Jodhpur CityAuthors: S. K. Yadav S.L.Borana
- Mapping of Urban Settlement along the Major Roads of the Jodhpur City Using Geospatial TechnologiesAuthors: S. L. Borana S.K.Yadav
- Prevention of Black Hole Attack in MANET: A ReviewAuthors: Arpit Bakshi Rakesh Kumar
- STUDY ON BEHAVIOUR OF NANO CONCRETEAuthors: Mani.M Dr. G. Nandini Devi
- Design of Reconfigurable Notch Band Antenna for UWB Application using P-I-N DiodesAuthors: PRAVEEN KUMAR CHAKRAVARTI GARIMA SAINI