ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (JCET) >>

Vol.9, No.5

Publisher: IAEME Publication

Publishing Date: 2018-12-28

  1. ANALYSIS OF LEXICAL, SYNTACTIC AND SEMANTIC FEATURES FOR SEMANTIC TEXTUAL SIMILARITY

    Authors: VANGAPELLI SOWMYA MANTENA S.V.S BHADRI RAJU BULUSU VISHNU VARDHAN

  2. ANALYSIS AND COMPARATIVE STUDY OF 10 YEARS CRICKET SPORTS DATA OF INDIAN PREMIERE LEAGUE (IPL) USING R PROGRAMMING

    Authors: PARAG C. SHUKLA; HETAL R. THAKER

  3. STUDY OF TCP SYN FLOOD DOS ATTACK AND ITS DETECTION

    Authors: HITESH NINAMA

  4. AN IMPROVED METHOD TO REMOVE NOISE FROM DEGRADED DEVANAGARI SCRIPT SCAN DOCUMENT

    Authors: SUSHILKUMAR N. HOLAMBE; ULHAS B SHINDE

  5. AN EFFICIENT EDGE DETECTION APPROACH USING DWT

    Authors: A.H.M. JAFFAR IQBAL BARBHUIYA

  6. APPLICATION OF ELECTRONIC DATA INTERCHANGE (EDI) IN SHIPPING BUSINESS – AN EMPIRICAL STUDY

    Authors: Dr.J.RENGAMANI

  7. E-PORTAL FOR RESIDENCY

    Authors: CHIRAG R. BHADIYADRA NAIMISH K. GOLAKIYA DHAVAL R. LIMBANI; SAGAR P. MORADIYA

  8. STUDY AND ANALYSIS OF IMAGE ENCRYPTION ALGORITHM BASED ON ARNOLD TRANSFORMATION

    Authors: PUNEET KAUSHIK MOHIT JAIN

  9. A COMPARATIVE ANALYSIS OF IMAGE SEGMENTATION TECHNIQUES

    Authors: SREEDHAR T; SATHAPPAN S

  10. A QUADRUPLEX DATA ENCRYPTION SCHEME TO SECURE CLOUD DATA

    Authors: PAYEL GURIA

  11. ENERGY EFFICIENT ROUTING IN WSN USING D-N-C ALGORITHM

    Authors: R.P. MAHESH; S. CHIDAMBARANATHAN

  12. COGNITIVE AUTOMATION OPPORTUNITIES, CHALLENGES AND APPLICATIONS

    Authors: VIJAYARAMARAJU POOSAPATI VIJAYA KILLU MANDA VEDAVATHI KATNENI

  13. RESOURCE ALLOCATION PLANNER FOR DISASTER RECOVERY (RAP-DR) BASED ON PREEMINENT RESPONSIVE RESOURCE ALLOCATION USING PARAMETER SELECTION OF VIRTUAL MACHINES OR CLOUD DATA SERVER

    Authors: A. PUNITHA; NANCY JASMINE GOLDENA

  14. ENHANCE DECISION TREE ALGORITHM FOR UNBALANCED DATA: RAREDTREE

    Authors: PRATIK A BAROT; H.B. JETHVA

  15. SOFTWARE DEFECT PREDICTION: PAST PRESENT AND FUTURE

    Authors: G N V RAMANA RAO VVSSS BALARAM; B. VISHNUVARDHAN

  16. BREAST CANCER DETECTION USING AB-GWO

    Authors: R. RAMANI; S. VALARMATHY

  17. INVENTORY MODEL HAVING PRICE DEPENDENT DEMAND AND PERMISSIBLE DELAY IN PAYMENTS UNDER LEARNING EFFECT FOR DETERIORATING ITEMS

    Authors: JYOTI GEETANJALI SHARMA MAHESH KUMAR JAYASWAL

  18. DESIGN OF SECURE ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

    Authors: SURESH KANCHI LALBAHADUR KETHAVATH; R.P. SINGH

  19. A SURVEY PAPER ON DEEP BELIEF NETWORK FOR BIG DATA

    Authors: AZHAGAMMAL ALAGARSAMY; K. RUBA SOUNDAR

  20. DATA POOL: A STRUCTURE TO STORE VOLUMINOUS DATA

    Authors: DHANASHRI V. SAHASRABUDDHE; PALLAVI P. JAMSANDEKAR

  21. PERFORMANCE EVOLUTION OF MACHINE LEARNING ALGORITHMS FOR NETWORK INTRUSION DETECTION SYSTEM

    Authors: KUSHAL JANI PUNIT LALWANI DEEPAK UPADHYAY M.B. POTDAR

  22. MOBILE CACHE SHARING AND PREFETCHING FOR LATENCY REDUCTION USING SIGNALR

    Authors: P. AMUDHA BHOMINI; JAYASUDHA J.S

  23. ROLE-CENTRIC RBAC MODELS – A LITERATURE REVIEW

    Authors: SUGANTHY A; V PRASANNA VENKATESAN