ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (JCET) >>

Vol.9, No.2

Publisher: IAEME Publication

Publishing Date: 2018-04-25

  1. ON PRIVACY PRESERVING DATA MINING AND FEATURE SELECTION STABILITY MEASURES: A COMPARATIVE ANALYSIS

    Authors: MOHANA CHELVAN P; PERUMAL K

  2. TIME OPTIMIZATION FOR AUTHENTIC AND ANONYMOUS GROUP SHARING IN CLOUD STORAGE

    Authors: MUTHIREDDY P MANJULA S H; VENUGOPAL K R

  3. COMPARATIVE STUDY OF SUPERVISED LEARNING FOR STUDENT PERFORMANCE EVALUATION

    Authors: SWETA V. PARMAR; LOKESH KUMAR SHARMA

  4. STUDY OF VARIOUS APPLICATIONS OF INTERNET OF THINGS (IOT)

    Authors: AKANKSHA BALI MOHITA RAINA; SIMRAN GUPTA

  5. A REVIEW OF RESOURCE ALLOCATION TECHNIQUES IN CLOUD COMPUTING

    Authors: RISHI ALURI SHRIYA MEHRA APOORVA SAWANT PANKTI AGRAWAL; MAYANK SOHANI

  6. UNSTRUCTURED DATA ANALYSIS AND PROCESSING USING BIG DATA TOOL - HIVE AND MACHINE LEARNING ALGORITHM - LINEAR REGRESSION

    Authors: NEHA MANGLA; PRIYA RATHOD

  7. A SURVEY OF RECENT TECHNIQUES IN AUTOMATIC TEXT SUMMARIZATION

    Authors: DHANYA P.M SREEKUMAR A JATHAVEDAN M

  8. A SECURE AND CERTIFIABLE ACCESS MECHANISM SYSTEM DESIGNED FOR BIG DATA STORAGE IN CLOUDS

    Authors: K. VIKRAM CH.APARNA HARSHITHA.B; ISHPREET KAUR

  9. HYBRID BASED IMAGE ENHANCEMENT METHOD USING WHITE BALANCE, VISIBILITY AMPLIFICATION AND HISTOGRAM EQUALIZATION

    Authors: GRISELDA NERINA DOROTHY MENDES; SARAVANAN KN

  10. SECURE CONFIGURATION SERVICE IN AN IOT-BASED AD-HOC MEDICAL DEVICES

    Authors: RAGHU NALLANI CHAKRAVARTULA; V. NAGA LAKSHMI

  11. NETWORK SENSORS HAVE PERMANENT POWER WITH BIO-CELL

    Authors: AMARASIMHA T; G.A. RAMACHANDRA

  12. AN APPROACH TO DISTINGUISH THE CONDITIONS OF FLASH CROWD VERSUS DDOS ATTACKS AND TO REMEDY A CYBER CRIME

    Authors: N. SRIHARI RAO K. CHANDRA SEKHARAIAH; A. ANANDA RAO

  13. A FRAME WORK TO IMPROVE PERFORMANCE OF DISTRIBUTED DATA MINING USING RANKING AND MULTI-AGENT SYSTEMS

    Authors: R. VIKRAM G. BHANU PRAKASH G. PRANEETH; ESHWAR REDDY

  14. PRIORITY BASED NON-PREEMPTIVE SHORTEST JOB FIRST RESOURCE ALLOCATION TECHNIQUE IN CLOUD COMPUTING

    Authors: RISHI ALURI SHRIYA MEHRA APOORVA SAWANT PANKTI AGRAWAL; MAYANK SOHANI

  15. A SURVEY OF ANDROID PLATFORM BASED MALWARE DETECTION TECHNIQUES

    Authors: RINCY RAPHAEL

  16. CNSM: COSINE AND N-GRAM SIMILARITY MEASURE TO EXTRACT REASONS FOR SENTIMENT VARIATION ON TWITTER

    Authors: SAVITHA MATHAPATI ANIL D TANUJA R S H MANJULA; VENUGOPAL K R

  17. MODEL FUZZY K-NEAREST NEIGHBOR WITH LOCAL MEAN FOR PATTERN RECOGNITION

    Authors: HAFIZH AL-KAUTSAR AIDILOF MUHAMMAD ZARLIS SYAHRIL EFENDI