Volume-07 , Special Issue-04 , Feb - 2019 Go Back

Open Access   Article

Implementation of Data Mining Techniques to Detect Ranking Fraud

M. Mary Priyadharshini, C. Premila Rosy
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.59-61, Feb-2019
Open Access   Article

Composite Power System Reliability Evaluation Based on Efficient State Search Using Binary Grasshopper Optimisation Algorithm

K.Jayanthi, R. Ashok Bakkiyaraj
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.62-66, Feb-2019
Open Access   Article

A heuristic Approach of Wimax System with Different Modulation Process

M. Vaishnavi
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.67-69, Feb-2019
Open Access   Article

A Review on Secured Network with Cryptographic Modelling

A. Suresh, M. Hemamalini
Review Paper | Journal Paper
Vol.07 , Issue.04 , pp.70-76, Feb-2019
Open Access   Article

A Survey on Information Retrieval Models in Document Mining

R. Meera
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.77-80, Feb-2019
Open Access   Article

Advanced Cluster Based Spectrum Sensing in Broadband Cognitive Radio Network

T.Jothi, P. Panimalar
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.81-86, Feb-2019
Open Access   Article

Document Clustering with Omni-Directional Data Similarity Process

K. Lakshmi
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.87-90, Feb-2019
Open Access   Article

A Survey on Ethical Hacking Techniques

J. Sathya, T. Manivannan
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.91-96, Feb-2019
Open Access   Article

A Study on Research Problems in Data Security in Cloud Computing

M. Vishnupriya
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.97-101, Feb-2019
Open Access   Article

QoS Ranking Prediction Approach for Cloud Services Using Spearman Rank Correlation Based Nature Inspired Firefly Optimization

S. Beghin Bose, S.S. Sujatha
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.102-106, Feb-2019
First    Previous    Next    Last