Volume 4 Issue 11 (Part-vI) (November 2017) | Publication Date:25th November 2017
1 |
SMART WAY TO COMMUNICATE THE PASSENGERS IN THE TRAIN USING THE HYBRID TECHNOLOGY |
2 |
AN EFFICIENT METHOD TO TRANSFER FILES IN PEER- TO-PEER NETWORKS OVER VIDEO ON DEMAND SERVICES |
3 |
IOT BASED SMART AGRICULTURE MONITORING AND COMTROL SYSTEM |
4 |
A SURVEY -EVENT DETECTION USING MACHINE LEARNING APPROACH IN CYBER-PHYSICALSYSTEMS |
5 |
A REVIEW ON DATA PREPROCESSING FOR EFFICIENT PREDICTION IN CUSTOMER RELATIONSHIP MANAGEMENT |
6 |
A ROUTING PROTOCOL FOR ENHANCED EFFICIENCY IN TEEN |
7 |
TEXT MINING AND EXPLORATION USING SVM |
8 |
ADVANCED MACHINE LEARNING TECHNIQUES TO HANDLE BRAIN IMAGE SEGMENTATION AND TUMOR CLASSIFICATION OVER BIO-MEDICAL IMAGES |
9 |
A NOVAL SYSTEM FOR EARLY DETECTION OFTHYROID WITH GRAPH CLUSTER ANT COLONYOPTIMIZATION |
10 |
An Iot Based Approach For Energy Flexible Control Of Production Systems |
11 |
A SURVEY OF CYBER SECURITY OPERATIONS BASED ON MACHINE LEARNING & DEEP LEARNING |
12 |
AN ENVIRONMENT FRIENDLY SYSTEM FOR POWER SAVING AN ELECTRICAL UNITS BY USE OF IMAGE PROCESSING |
13 |
A STATE OF THE ART OF DATABASES TO IMPROVE THE STORAGE EFFICIENCY ON CLOUD COMPUTING |
14 |
DATA IMPLEMENTATION ON FRIENDLY ENVIRONMENT WITH GREEN DATA MINING PROCESS |
15 |
TRENDS OF INTERNET OF THINGS IN INDIA |
16 |
EFFICIENT IRRIGATION SYSTEM USING IOT AND RASPBERRY PI |
17 |
COOPERATIVE PROVABLE DATA POSSESSION FOR INTEGRITY VERIFICATION IN MULTI-CLOUD STORAGE |
18 |
WEB USAGE MINING THROUGH LESS COST |
19 |
Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud |
20 |
HYPOTHETICAL ANALYSIS ON THE TRANSITORY CHARACTERISTICS OF EDFA IN OPTICAL FIBERCOMMUNICATION |
21 |
IMPROVING SECURITY AND QUALITY OF SERVICE (QOS)DESKTOP GRIDS |
22 |
AN EFFICIENT DISTRIBUTION VERIFICATION PROTOCOL (EDVP) FOR DATA STORAGE SECURITY IN CLOUD COMPUTING |
23 |
DATA SECURITY IN MOBILE AD HOC NETWORKS |
24 |
CRYPTOGRAPHY BASED PRIVACY PRESERVING DATACOMMUNICATION IN HYBRID WIRELESS NETWORKS |
25 |
TESTING THE PERFORMANCE OF EAACK IN AUTHENTIC NETWORK ENVIRONMENT |
26 |
CHALLENGES AND OPPORTUNITIES WITH BIG DATA |
27 |
CLASSIFIER BASED INFORMATION MINING APPROACHES |
28 |
EFFECTIVE AND SECURE KAC SCHEME FOR DISTRIBUTED CLOUD STORAGE |
29 |
PARTICLE SWARM OPTIMIZATION BASED K-MEAN CLUSTERING - A SURVEY |
30 |
SECURE BYOD ENVIRONMENTS ON REMOTE MOBILE SCREEN (RMS) |
31 |
CRYPTOGRAPHY BASED PRIVACY PRESERVING DATACOMMUNICATION IN HYBRID WIRELESS NETWORKS |
32 |
REVIEW ON PARAMETERIZED ALGORITHMS AND KERNELIZATION |
33 |
NEAREST KEYWORD SET SEARCH QUERIES ON MULTI-DIMENSIONAL DATASETS |
34 |
AN EFFICIENT METHOD FOR HIGH QUALITY AND COHESIVE TOPICAL PHRASE MINING |
35 |
MEDICAL INTERNET OF THINGS AND BIGDATA IN HEALTHCARE |
36 |
DISTRIBUTED TRACKING SYESTEM |
37 |
A DISTRIBUTED THREE-HOP ROUTING PROTOCOL TO INCREASE THE CAPACITY OF HYBRID WIRELESS NETWORKS |
38 |
NEED FOR VARIOUS ENERGY EFFICIENT MECHANISMS IN THE WIRELESS SENSOR NETWORKS |
39 |
ANDROID SECURITY |
40 |
A TECHNIQUE IN COMMUNICATION WITH CLOUD USING RPC |
41 |
A SURVEY PAPER ON DATA SECURITY IN CLOUD COMPUTING |
42 |
ORUTA: PRIVACY-PRESERVING PUBLIC AUDITING FOR SHARED DATA IN THE CLOUD |
43 |
GOOGLE PROJECT LOON |
44 |
MACHINE LEARNING FOR AUTOMATIC MALWARE SIGNATURE GENERATION AND CLASSIFICATION |
45 |
BOOSTER IN HIGH DIMENSIONAL DATA CLASSIFICATION |
46 |
SECURING CLOUD DATA UNDER KEY EXPOSURE |