NCACI - 2015 (Volume 3 - Issue 18)

An Overview of Semantic Networks and Its Components
| Total Downloads : 5
Authors : Jayeeta Majumder, Saikat Khanra
Vampire Attacks in Wireless Ad-Hoc Sensor Network for Sheltering Data Packets
| Total Downloads : 5
Authors : Rajesh Khanna.M., .A.Rengarajan, A.Aravindan
Innovation in IT for Management
| Total Downloads : 5
Authors : K. Venkata Ramana,, S. Ismail Basha,
IT Application in Business
| Total Downloads : 5
Authors : B Muniraja Sekhar, K.V.S.N. Jawahar Babu, S. Ismail Basha
Acquiring Data Packets Commencing Predator Spells inWSN
| Total Downloads : 7
Authors : Rajesh Khanna.M, Dr.A.Rengarajan
Surveillance and Tracking Eleplant Network Path in Wireless Sensor Network
| Total Downloads : 7
Authors : Vanitha P.S, Nithya P.S
Stakeholders Management using Technology (Detail Study on Education & IT Industries)
| Total Downloads : 5
Authors : Muralidhar Deshpande
Enhanced Baseline Algorithm for Best Keyword Enhanced Search
| Total Downloads : 8
Authors : Haribabu Valleti, S. Sivarama Krishna
Privacy-Enhanced Web Service Composition for IJETTCS
| Total Downloads : 6
Authors : C. GangaBhanu, N. JayKrishna, M. Harish
Implementation of Secure Authorized Redundancy Elimination by using Hybrid Cloud Approach
| Total Downloads : 5
Authors : M. Yamuna
Zig Bee-Based Smart Power Management in Intelligent Buildings
| Total Downloads : 4
Authors : Tirupati Naga Vaishnavi, Akshatha G,
A Heuristic Approach on Carp using Complete Ai Problems
| Total Downloads : 4
Authors : K. Keerthi
Android Application for Online Railway Stipulation System
| Total Downloads : 8
Authors : Mr. N. Sendhil kumar, Mr.S. Palani, D. Prudhviraj
Oruta: Privacy- Preserving Public Auditing for Shared Data in the Cloud
| Total Downloads : 5
Authors : Supraja .M, T. Sudha, N. Padmaja
Secure Data Recovery Encryption Scheme for Decentralized Disruption Tolerant Military Networks
| Total Downloads : 5
Authors : M. Nanda Kishore, T.Roopa Devi, T.Siva Kumar Reddy
Applications of data mining in knowledge management
| Total Downloads : 11
Authors : S. Venkata lakshmi, K. Hema
Constructing Trusted and Capable Demand Services the Cloud with RASP Data Perturbation
| Total Downloads : 6
Authors : M. Nandakishore, V. Haribabu
A Secure MapReduce Scheme for Big Data
| Total Downloads : 6
Authors : G.B. Aswani Kumar, Dr.K. Venkataramana
A Study on the Effect of Issue Handling Indicators on Test Code Quality
| Total Downloads : 4
Authors : Hemanth Kumar.K, S. Sivarama Krishna
Rollback Recovery Through Check Points in Heterogeneous Grid Computing
| Total Downloads : 6
Authors : P.Venkata Maheswara, Ch. Chengamma
 
 

Crossref - DOI Prefix: 10.17577

IJERT Indexing Databases

IJERT Indexing Databases

Submit Manuscript online


Journal of Engineering Call for Papers 2018


ISSN for IJERT Digital Library

ISSN: 2278-0181

ISO 3297:2007


Join as Reviewer


Creative Commons License
 


Newsletter Subscribe

© 2018 International Journal of Engineering Research & Technology - IJERT.ORG. All Rights Reserved.