ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (JCET) >>

Vol.9, No.6

Publisher: IAEME Publication

Publishing Date: 2018-12-29

  1. COST SENSITIVE SOFTWARE DEFECT PREDICTION TECHNIQUE USING GENETIC ALGORITHM

    Authors: G N V RAMANA RAO VVSSS BALARAM; DR.B.VISHNUVARDHAN

  2. STRATEGY DEVELOPMENT BASED SECURITY APPLICATION TO BOOST THE SOFTWARE SECURITY DEFINED NETWORK USING MODERN PROFICIENT HILL CIPHER ALGORITHM

    Authors: S.K. MURUGANANDHAM S. NALLUSAMY DULAL KRISHNA MANDAL; PARTHA SARATHI CHAKRABORTY

  3. COURSE EVALUATION OF AN INSTITUTION USING EDM

    Authors: S. JOTHI LAKSHMI; M. THANGARAJ

  4. BANANA-SEG, A FULLY CONVOLUTIONAL DEEP NEURAL NETWORK FOR BANANA TREE CROWN MAPPING IN AERIAL IMAGERY ACQUIRED FROM AN UNMANNED AERIAL VEHICLE (UAV)

    Authors: RAMESH KESTUR; MEENAVATHI M.B

  5. SAT BASED ALGORITHMIC APPROACH FOR SUDOKU PUZZLE

    Authors: DEEPIKA RAI N.S. CHAUDHARI; MAYA INGLE

  6. A GENETIC ALGORITHM BASED APPROACH TO SOLVE VLSI FLOORPLANNING PROBLEM

    Authors: LEENA JAIN; AMARBIR SINGH

  7. A SURVEY ON SECURITY ATTACKS AND CHALLENGES IN BITCOIN

    Authors: VIJI PRIYA .G KRISHNA PRIYA .G VIVEK .M; ASHWINI .R

  8. DATA SECURITY ON CLOUD COMPUTING

    Authors: AZHAR USHMANI

  9. SCIENTIFIC WORKFLOW SCHEDULING IN CLOUD COMPUTING ENVIRONMENT: A SURVEY

    Authors: A. THUSHARA

  10. OPINION MINING FROM CUSTOMER REVIEWS FOR EFFECTIVE EVENT MANAGEMENT

    Authors: MITA K. DALAL

  11. MAINTAINABILITY EVALUATION MODEL FOR OBJECT ORIENTED SOFTWARE

    Authors: NIDHI GOYAL; REENA SRIVASTAVA

  12. FUZZY ASSOCIATION RULE MINING FOR STUDENT PERFORMANCE EVALUATION

    Authors: SWETA V. PARMAR; LOKESHKUMAR SHARMA

  13. AN AVANT-GARDE APPROACH OF BLOCKCHAIN IN BIG DATA ANALYTICS

    Authors: Manisha Valera Parth Patel Shruti Chettiar