Special Issue - Volume 10, Issue 5 (March-April) 2019
Specifying CPU Requirements for HPC Applications via ML Techniques Priyanka Bharti1 and Rajeev Ranjan |
1 - 3 |
Smart Frame Work of Using Iot in ATM’s to Identify the Currency Deepa B G, Manjusree M, Nagendra Babu G |
4-7 |
Data Mining on Classifiers Prophecy of Breast Cancer Tissues Deepa B G, Dr. Senthil S, Piyush Singh |
8-12 |
Block chain Technology for IoT Security and Privacy: “The discourse Analysis of a sensible Home” M. Ranaganathappa, Dr.S.Senthil, Mohan K N |
13-17 |
Classification Algorithm in Data Mining B.V.Sudhakavya, Swathi.V, Dr.S.Senthil |
18-21 |
A Survey on Behavioural Analysis of ASD using Clustering Techniques Mohammed Ismail, K. Vijayalakshmi, Dr.Vinayakamurthy, Dr.Anuradha |
22-24 |
Analysis of Edge Detection Methods in Image Processing Basil Benny1, Jerrin Reni1, Dr.V.Thirunavukkarasu2 |
25-30 |
Prevalence of Mammography Images for Primal Prediction of Breast Cancer Deepa B G, Dr. Senthil S, Sreeshanth |
31-33 |
Breast Cancer Recurrence Prediction Due to Bosom
Malignant Growth of Tumor Deepa B G, Dr. Senthil S, Sahana P S |
34-37 |
A Survey on Mining Algorithms for Predictive Analytics of Asd K. Vijayalakshmi, Dr. M . Vinayakamurthy, Dr. V. Anuradha, Pavan Chunduri |
38-40 |
A Survey on Latest Iot Sensors Used in Agricultures on Non Food Crops Vinutha Priya H R, Sneha N |
41-46 |
A View on Sensors Used In Internet Of Things Suresh M, Vinay G, Sinduja K M |
47-52 |
Performance Analysis of Image Coders, ANN, DTCWT ManjunathaVT, Dr. M Vinayaka Murthy |
53-59 |
An Overview on Data Mining Techniques for Rice Yield Prediction on Clustered Region Of Kerala Joslin Joy, Pinaka Pani. R |
60-63 |
Harnessing Multi-Source Data about Public Sentiments M Ranganathappa, Syed Ameen |
64-68 |
A Survey on Fuzzy Based Sensor Network and Its
Applications Rajeev Ranjan, Sinduja KM, Vinay G |
69-73 |
Secure and Supportable Burden Adjusting of Edge
Server Centers in Fog Computing Vinothagan P, Rajeev Ranjan |
74-77 |
The Discovery for Privacy & Security in Various Big Data Application: A study Prince Vivek, Rajeev Ranjan |
78-82 |
The Secrets Behind the Product-Making Process Mohammed Furqan, Shreetha Bhat |
83-87 |
Need for Effective Risk Management Strategy during Software Development Process – A Holistic View Dr.Raghavi K Bhujang, Dr. Suma V |
88-92 |
An Approach of Image Processing for the Detection of Cercospora fruit spot and Bacterial Blight disease on Pomegranate Dr. S Senthil, Lokesh C K, D Sai Yashwanth |
93-98 |
A Critique Survey on Diverse Approaches of Web
Content Mining Varish P V, Lokesh C K, Dr. Kavitha |
99-104 |
A Novel Approach for the Assessment of Decision Stump & Upgraded Rf Classification Algorithms M.Jayakameswaraiah, Ravi Dandu, Pinakapani R, S.Ramakrishna |
105-108 |
Home Automation with Smart Electric Power Supply
using IOT Deepa B G, Dr. Senthil S, KabeerAhamed P. |
109-115 |
Enterprise Application Integration Based Based On
Service Oriented Architecture & Enterprise Service Bus: A Review Satyabrat Biswal, Chandrashekhar J, Chandrashekhar J, Dalvin vinoth kumar |
116-119 |
Analysis on Protection of E-commerce Users privacy in Network Ramesh Kumar D.S, Salauddeen Sk, A. Dalvin Vinoth kumar |
120-122 |
Copyright © All rights reserved | by IJANA - The International Journal of Advanced Networking and Applications, Published by Eswar Publications.