Archived Papers for Journal
JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (JCET) >>
Vol.9, No.5
Publisher: IAEME Publication
Publishing Date: 2018-12-28
- ANALYSIS OF LEXICAL, SYNTACTIC AND SEMANTIC FEATURES FOR SEMANTIC TEXTUAL SIMILARITYAuthors: VANGAPELLI SOWMYA MANTENA S.V.S BHADRI RAJU BULUSU VISHNU VARDHAN
- ANALYSIS AND COMPARATIVE STUDY OF 10 YEARS CRICKET SPORTS DATA OF INDIAN PREMIERE LEAGUE (IPL) USING R PROGRAMMINGAuthors: PARAG C. SHUKLA; HETAL R. THAKER
- STUDY OF TCP SYN FLOOD DOS ATTACK AND ITS DETECTIONAuthors: HITESH NINAMA
- AN IMPROVED METHOD TO REMOVE NOISE FROM DEGRADED DEVANAGARI SCRIPT SCAN DOCUMENTAuthors: SUSHILKUMAR N. HOLAMBE; ULHAS B SHINDE
- AN EFFICIENT EDGE DETECTION APPROACH USING DWTAuthors: A.H.M. JAFFAR IQBAL BARBHUIYA
- APPLICATION OF ELECTRONIC DATA INTERCHANGE (EDI) IN SHIPPING BUSINESS β AN EMPIRICAL STUDYAuthors: Dr.J.RENGAMANI
- E-PORTAL FOR RESIDENCYAuthors: CHIRAG R. BHADIYADRA NAIMISH K. GOLAKIYA DHAVAL R. LIMBANI; SAGAR P. MORADIYA
- STUDY AND ANALYSIS OF IMAGE ENCRYPTION ALGORITHM BASED ON ARNOLD TRANSFORMATIONAuthors: PUNEET KAUSHIK MOHIT JAIN
- A COMPARATIVE ANALYSIS OF IMAGE SEGMENTATION TECHNIQUESAuthors: SREEDHAR T; SATHAPPAN S
- A QUADRUPLEX DATA ENCRYPTION SCHEME TO SECURE CLOUD DATAAuthors: PAYEL GURIA
- ENERGY EFFICIENT ROUTING IN WSN USING D-N-C ALGORITHMAuthors: R.P. MAHESH; S. CHIDAMBARANATHAN
- COGNITIVE AUTOMATION OPPORTUNITIES, CHALLENGES AND APPLICATIONSAuthors: VIJAYARAMARAJU POOSAPATI VIJAYA KILLU MANDA VEDAVATHI KATNENI
- RESOURCE ALLOCATION PLANNER FOR DISASTER RECOVERY (RAP-DR) BASED ON PREEMINENT RESPONSIVE RESOURCE ALLOCATION USING PARAMETER SELECTION OF VIRTUAL MACHINES OR CLOUD DATA SERVERAuthors: A. PUNITHA; NANCY JASMINE GOLDENA
- ENHANCE DECISION TREE ALGORITHM FOR UNBALANCED DATA: RAREDTREEAuthors: PRATIK A BAROT; H.B. JETHVA
- SOFTWARE DEFECT PREDICTION: PAST PRESENT AND FUTUREAuthors: G N V RAMANA RAO VVSSS BALARAM; B. VISHNUVARDHAN
- BREAST CANCER DETECTION USING AB-GWOAuthors: R. RAMANI; S. VALARMATHY
- INVENTORY MODEL HAVING PRICE DEPENDENT DEMAND AND PERMISSIBLE DELAY IN PAYMENTS UNDER LEARNING EFFECT FOR DETERIORATING ITEMSAuthors: JYOTI GEETANJALI SHARMA MAHESH KUMAR JAYASWAL
- DESIGN OF SECURE ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSAuthors: SURESH KANCHI LALBAHADUR KETHAVATH; R.P. SINGH
- A SURVEY PAPER ON DEEP BELIEF NETWORK FOR BIG DATAAuthors: AZHAGAMMAL ALAGARSAMY; K. RUBA SOUNDAR
- DATA POOL: A STRUCTURE TO STORE VOLUMINOUS DATAAuthors: DHANASHRI V. SAHASRABUDDHE; PALLAVI P. JAMSANDEKAR
- PERFORMANCE EVOLUTION OF MACHINE LEARNING ALGORITHMS FOR NETWORK INTRUSION DETECTION SYSTEMAuthors: KUSHAL JANI PUNIT LALWANI DEEPAK UPADHYAY M.B. POTDAR
- MOBILE CACHE SHARING AND PREFETCHING FOR LATENCY REDUCTION USING SIGNALRAuthors: P. AMUDHA BHOMINI; JAYASUDHA J.S
- ROLE-CENTRIC RBAC MODELS β A LITERATURE REVIEWAuthors: SUGANTHY A; V PRASANNA VENKATESAN