Category Archives: Confcall – 2018 (Volume 06 – Issue 14)

Global Scientific Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Role of Data Mining in Cyber Security

View Abstract & full text pdf of Role of Data Mining in Cyber Security

Trusted Scholarly Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Forward Error Correction (FEC) Code in the Distributed Storage System

View Abstract & full text pdf of Forward Error Correction (FEC) Code in the Distributed Storage System

🌏
Global Research Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Li-Fi: Smart Wireless Transmission Technology

View Abstract & full text pdf of Li-Fi: Smart Wireless Transmission Technology

🔒
Peer-Reviewed Excellence Hub
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

AWS IOT (Security Issues in Information Security under AWS-IOT Platform)

View Abstract & full text pdf of AWS IOT (Security Issues in Information Security under AWS-IOT Platform)

Premier Academic Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid

View Abstract & full text pdf of A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid

🔒
Global Research Authority
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Automation of Railway Gate using Internet of Things (IoT)

View Abstract & full text pdf of Automation of Railway Gate using Internet of Things (IoT)

🏆
Global Research Authority
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

A Survey on Sentiment Analysis using Twitter Dataset

View Abstract & full text pdf of A Survey on Sentiment Analysis using Twitter Dataset

Global Research Authority
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Automated Toll Collection and Location Sensing

View Abstract & full text pdf of Automated Toll Collection and Location Sensing

🌏
Premier Academic Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

End-to-End Encryption in Messaging Services and National Security?Case of WhatsApp Messenger

View Abstract & full text pdf of End-to-End Encryption in Messaging Services and National Security?Case of WhatsApp Messenger