AES JOURNALS
COMMON INFORMATION
HOME
OBJECTIVE
CONTRIBUTIONS TYPES
SUBJECT COVERAGE
MANUSCRIPT PREPARATION
SUBMISSION GUIDELINES
SUBMISSION DEADLINE
SAMPLE PAPER
COPYRIGHT
NOTE
ARTICLE PROCESSING FEE
PAPER EVALUATION PROCESS
FORMAT OF ACCEPTANCE LETTER
REPRINTS INFORMATION
CONTACT INFORMATION
AES EDITORIAL AND REVIEW BOARD
EDITORIAL WORKFLOW
ARTICLE REVIEW FORM
PUBLISHER

 
OBJECTIVE

JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER ENGINEERING

ISSN:ISSN 0975 – 676

PERIOD: NOV 09 TO OCT 10 , VOLUME – 01, ISSUE - 01

PERIOD: NOV 10 TO OCT 11 , VOLUME – 01, ISSUE – 02

PERIOD: NOV 11 TO OCT 12 , VOLUME – 02, ISSUE – 01

PERIOD: NOV 12 TO OCT 13 , VOLUME – 02, ISSUE – 02

PERIOD: NOV 13 TO OCT 14 , VOLUME – 03, ISSUE – 01

PERIOD: NOV 14 TO OCT 15 , VOLUME – 03, ISSUE – 02

PERIOD: NOV 15 TO OCT 16 , VOLUME – 04, ISSUE – 01

PERIOD: NOV 16 TO OCT 17 , VOLUME –04, ISSUE – 02

PERIOD: NOV 17 TO OCT 18 , VOLUME –05, ISSUE – 01

PERIOD: NOV 18 TO OCT 19 , VOLUME –05, ISSUE – 02

PERIOD: NOV 19 TO OCT 20 , VOLUME –06, ISSUE – 01

PERIOD: NOV 20 TO OCT 21 , VOLUME –06, ISSUE – 02

PERIOD: NOV 21 TO OCT 22 , VOLUME –07, ISSUE – 01

Index

Download or Open

Serial No.

Title

CE2

A MENTORING PROGRAM FOR INFORMATION CONVEY IN A SMALL SOFTWARE CONSULTANCY COMPANY

Download

CE1

HAND GESTURE RECOGNITION SYSTEM USING FUZZY INTEVAL

Download

CE3

SECURITY CONSIDERATIONS FOR THE ADMINISTRATION OF LINUX FAMILY SYSTEMS

Download

CE4

BLUETOOTH STACK: APPLICATION TO REAL TIME EMBEDDED TARGET

Download

CE5

A TAXONOMY MUTUAL OCCLUSION OF COLLABORATIVE AUGMENTED REALITY ENVIRONMENT WITH ACCURATE IMAGE OVERLAY RENDERING ENHANCED REALITY

Download

CE6

SCHEDULING OF SPORADIC TASK SYSTEM USING EARLIEST DEADLINE FIRST ALGORITHM

Download

CE7

ELIMINATING TCP/IP STEGANOGRAPHY USING ACTIVE WARDEN

Download

CE8

SCHEDULING FOR REAL-TIME MULTIPROCESSOR SYSTEM

Download

CE9

ROLE OF VIRTUAL CARRIER SENSING ON FAIRNESS ISSUES IN IEEE 802.11 BASED AD HOC NETWORKS

Download

CE10

CROSSWALK DETECTION SYSTEM USING MOBILE PHONE

Download

CE11

HARDWARE IMPLEMENTATION OF IMAGE ENCODER USING WAVELET TRANSFORM

Download

CE12

BREAST TUMOR ANALYSIS USING TEXTURE FEATURES AND WAVELET TRANSFORM WITH DYNAMIC NEURAL NETWORK BASED TRAINING

Download

CE13

PROBABILISTIC CONTEXT FREE GRAMMAR: AN APPROACH TO GENERIC INTERACTIVE NATURAL LANGUAGE INTERFACE TO DATABASES

Download

CE14

ADAPTIVE OVERLAPPED BACKUP DIVISION: AN AVAILABILITY STRATEGY FOR MUTIPROCESSOR DATABASE MACHINES

Download

CE15

ANALYSIS OF GAME THEORETIC LOAD BALANCING ALGORITHMS

Download

CE16

UNOBTRUSIVE¬¬ TECHNIQUE FOR DETECTING DATA LEAKAGE

Download

CE17

AN OVERVIEW OF QUERY PROCESSING IN XML ENVIRONMENT

Download

CE18

USE OF INFORMATION TECHNOLOGY FOR ENHANCING CROP PRODUCTIVITY

Download

CE19

ISSUES AND TECHNIQUES IN XML QUERY OPTIMIZATION

Download

CE20

A PERFORMANCE COMPARISON OF UDP AND MUDP FOR STREAMING MEDIA APPLICATIONS

Download

CE21

STUDY OF TRADE-OFFS INVOLVED IN POWER OPTIMIZATION IN MANET

Download

CE23

AUTOMATIC TEXT DETECTION, REMOVAL AND RESTORATION USING IMAGE INPAINTING

Download

CE24

SIMULATION OF SECURITY ATTACK ON DSR PROTOCOL

Download

CE25

SEARCH WINDOW BASED EXEMPLAR APPROACH FOR IMAGE INPAINTING

Download

CE26

A SURVEY OF MOVING OBJECT DETECTION AND TRACKING IN VIDEO SURVEILLANCE SYSTEM

Download

CE27

IMAGE MOSAICING USING EUCLIDEAN WARPING

Download

CE28

METAMORPHIC MALWARE DETECTION USING STATISTICAL ANALYSIS

Download

CE29

REMOVAL OF OCCLUSION FOR ABSTRACTION OF CLASS-ROOM VIDEOS

Download

CE30

inception of Artificial Intelligence in search Engine

Download

CE31

TECHNOLOGY BASED EMPIRICAL DYNAMISM IN ORGANIZATIONAL COMMUNICATION CLIMATE (A case analysis of developing v/s developed country’s organizations)

Download

CE32

A REVIEW ON SECURITY BASED MULTICAST ROUTING PROTOCOL ON MANETS

Download

CE33

GUAJARATI CHARACTER RECOGNITION: THE STATE OF THE ART COMPREHENSIVE SURVEY

Download

CE34

AN ELLIPTIC CURVE CRYPTOSYSTEM

Download

CE35

VITALITY OF SECURING THE EMBEDDED SYSTEMS THROUGH CRYPTOGRAPHY AND HARDWARE IMMUNE SYSTEM

Download

CE36

A SURVEY ON CLASSIFICATION OF VIDEOS USING DATA MINING TECHNIQUES

Download

CE37

ATTACK METHODOLOGY ANALYSIS: SQL INJECTION ATTACKS

Download

CE38

A COMPARATIVE ANALYSIS ON REACTIVE ROUTING PROTOCOL FOR MANET

Download

CE39

DENIAL OF SERVICE ATTACK ON REACTIVE ROUTING PROTOCOL IN MANET

Download

CE40

A SURVEY ON MALICIOUS AND SELFISH BEHAVIOR IN MANET

Download

CE41

SURVEY ON TRANSMISSION CONTROL PROTOCOL WITHIN WIRELESS MESH NETWORK

Download

CE42

AOMDV REVIEW: WORKING AND COMPARISION WITH AODV

Download

CE43

Hybrid Design Approach for Efficient Network Intrusion Detection using Data Mining and Network Performance Exploration

Download

CE44

EXTRACTING OPINION FROM WEB SITES USING NATURAL LANGUAGE PROCESSING

Download

CE45

MVC ARCHITECTURE : A COMPARATIVE STUDY WITH OF IMPLEMENTATION BETWEEN J2EE AND ASP DOT NET

Download

CE46

TOWARDS IMPROVEMENT IN GUJARATI TEXT INFORMATION RETRIEVAL BY USING EFFECTIVE GUJARATI STEMMER

Download

CE47

WIRELESS SENSOR NETWORK: ANALYSIS AND STUDY OF VARIOUS ROUTING PROTOCOL

Download

CE48

A HYBRID APPROACH TO RECOMMENDER SYSTEM IN E-COMMERCE USING CONTENT BOOSTED COLLABORATIVE FILTERING

Download

CE49

UML MODELING FOR ELECTION MANAGEMENT SYSTEM

Download

CE50

BIOMETRICS COMPUTING

Download

CE51

OPTICAL BURST SWITCHING

Download

CE52

"Focus on Your Application Not Plumbing"

Download

CE53

Throughput Optimal Power Allocation in Multi -Relay MIMO-CN in MANET

Download

CE54

NEURAL NETWORK IN CHARACTER RECOGNITION OF GUJARATI SCRIPT

Download

CE55

INFO HASH TORRENT SEARCHING TECHNIQUE

Download

CE56

A System for Identification and Assessment of Secure Design using Dynamic Security Metrics

Download

CE57

A Review Paper on Web Usage Mining and Pattern Discovery 1RACHIT ADHVARYU

Download

CE58

OVERVIEW OF MONORAIL RAPID TRANSIT SYSTEM

Download

CE59

DOM Tree based Approach for Extraction of Content from Web News Page

Download

CE60

LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING

Download

CE61

COMPARATIVE STUDY BETWEEN DUAL SYSTEMS FOR LATERAL LOAD RESISTANCE IN BUILDINGS OF VARIABLE HEIGHTS

Download

CE62

TECHNICAL VIABILITY OF USING RECLAIMED ASPHALT PAVEMENT IN AHMEDABAD BRTS CORRIDOR FOR BASE COURSE

Download

CE63

A COMPARATIVE STUDY OF SENTIMENT ANALYSIS TECHNIQUES

Download

CE64

INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM

Download

CE65

Improvement of Dynamic Partitioning Technique in Mobile Cloud Computing

Download

CE66

A MODIFIED HYBRID PROTOCOL(ZRP) USED FOR DETECTION AND REMOVAL OF BLACK HOLE NODE IN MANET

Download

CE67

A SURVEY ON WEB USAGE MINING WITH NEURAL NETWORK AND PROPOSED SOLUTIONS ON SEVERAL ISSUES

Download

CE68

IMPORTANCE OF COOPERATIVE CACHING IN MOBILE DATA MANAGEMENT

Download

CE69

REDUCING POWER CONSUMPTION & DELAY AWARE RESOURCE ALLOCATION IN CLOUD DATACENTERS

Download

CE70

SIMULATION BASED STUDY OF ATTACKS ON DIFFERENT LAYERIN MOBILE AD HOC NETWORK (MANET)

Download

CE71

SIMULATION STUDY OF JELLYFISH ATTACK IN MANET (mobile ad hoc network) USIND AODV ROUTING PROTOCOL

Download

CE72

A REVIEWON CURRENT ROUTING PROTOCOLS FOR AD HOC MOBILE WIRELLESS NETWORK

Download

CE73

MODIFICATION IN ADVANCED ENCRYPTION STANDARD

Download

CE74

A Survey on Detection and Prevention of Black Hole Attack in AODV- based MANETs

Download

CE75

COMPARATIVE ANALYSIS ON THE PERFORMANCE OF BLOCK MATCHING MOTION ESTIMATION ALGORITHM

Download

CE76

RELEVANCE PREDICTION IN FOCUSED CRAWLING: A SURVEY

Download

CE77

RELIABLE APPROACH FOR BLACKHOLE DETECTION IN MANET USING AODV PROTOCOL

Download

CE78

CACMAN COMPARISION WITH MOCA USING PKI ON MANET.

Download

CE79

PRE-EMPTABLE SHORTEST JOB NEXT SCHEDULING IN PRIVATE CLOUD COMPUTING

Download

CE80

AMELIORATE SECURITY POLICY USING MEDIATED RSA AND IDENTITY BASED CRYPTOGRAPHY IN CLOUD COMPUTING

Download

CE81

ECN BASED TCP ENHACEMENT WITHIN WIRELESS MESH NETWORK

Download

CE82

SECURE AND RELIABLE KEY DISTRIBUTION TECHNIQUE FOR MOBILE AD-HOC NETWORK

Download

CE83

ANALYSIS OF QOS ENABLED MPLS VPN VOIP NETWORK WITH RIPV2 ROUTING PROTOCOL.

Download

CE84

A HYBRID NAMED ENTITY RECOGNITION SYSTEM USING NATURAL LANGUAGE PROCESSING AND DECISION TREE LEARNING

Download

CE85

DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS

Download

CE86

TECHNIQUES OF QUERY REFORMULATION IN INFORMATION RETRIEVAL

Download

CE87

CATEGORIZATION OF ROUTING PROTOCOLS IN VEHICULAR ADHOC NETWORK FOR VEHICLE TO VEHICLE COMMUNICATION

Download

CE88

A COMPARATIVE STUDY OF MACRO MODELS OF SINGLE ELECTRON TRANSISTOR

Download

CE89

IMPROVED WEB SEARCH RESULT RANK OPTIMIZATION USING SEARCH ENGINE QUERY LOG

Download

CE90

ACHIEVING DATA PRIVACY AND SECURITY BY USING FHE IN CLOUD COMPUTING

Download

CE91

OVERVIEW AND APPLICATIONS OF MOBILE ADHOC NETWORK

Download

CE92

POWER CONSUMPTION USING ARTIFICAL NEURAL NETWORKS IN THE FIELD OF CRYPTOGRAPHY

Download

CE93

CRYPTOGRAPHIC ALGORITHMS FOR WIRELESS SENSOR NETWORK

Download

CE94

E-COMMERCE SYSTEM: A REVIEW ON SECURITY CHALLENGES AND INDIAN PERSPECTIVE

Download

CE95

PREDICTING ELECTRICITY LOAD PATTERN OF CUSTOMERS USING CLUSTERING TECHNIQUE

Download

CE96

A REVIEW PAPER ON ENERGY EFFICIENT ALGORITHM IN MANET

Download

CE97

Digital Watermarking: Combining DCT and DWT Techniques

Download

CE98

Deadline Constrained Virtual Machine Provisioning and scheduling to improve QoS in Cloud Computing

Download

CE99

DISCOVERING USER IDENTIFICATION MINING TECHNIQUE FOR PREPROCESSED WEB LOG DATA

Download

CE100

ANALYSIS OF IMAGE COMPRESSION TECHNIQUE USING DISCRETE COSINE TRANSFORM HAVING DIFFERENT BLOCK SIZE

Download

CE101

Trend Analysis and Prediction of Air and Water Pollutants using Regression algorithm SMOreg

Download

CE102

DATA MINING:FREQUENT TREE MINING ANALYSIS

Download

CE103

SCIENTIFIC AUTOMATED WEATHER ANALYSIS

Download

CE104

"Focus on Your Application Not Plumbing"

Download

CE105

ANALYSING MALICIOUS PE FILES WITH INSTRUCTION N-GRAMS USING MACHINE LEARNING TECHNIQUES

Download

CE106

CONCEPTUAL FRAMEWORK OF BIO-CLOUD COMPUTING

Download

CE107

CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6

Download

CE108

A NOVEL APPROACH TO ENHANCE ENERGY EFFICIENCY IN DSR PROTOCOL IN MANET

Download

CE109

EFFECT OF DENSITY ON SECURITY ATTACK IN MOBILE AD HOC NETWORK

Download

CE110

FEATURE BASED SENTIMENT ANALYSIS ON CUSTOMER FEEDBACK

Download

CE111

DATA LEAKAGE DETECTION

Download

CE112

AN INTELLIGENT MOBILE ADVERTISEMENT SYSTEM

Download

CE113

A ROUTE MAP FOR DETECTING SYBIL ATTACKS IN URBAN VEHICULAR NETWORKS

Download

CE114

IMPLEMENTATION OF SECURITY SERVICES BY USING SLA IN MULTICLOUD COMPUTING

Download

CE115

PACKET LOSS CONTROL USING TOKENS AT THE NETWORK EDGE

Download

CE116

Hybrid Recommender systems: survey and experiments

Download

CE117

AN EXPERIMENTAL STUDY ON VALIDATION OF COMBINATORIAL ALLOCATION IN CLOUD COMPUTING ENVIRONMENT

Download

CE118

A STUDY OF IMAGE COMPRESSION TECHNIQUES AND ITS APPLICATION IN TELEMEDICINE AND TELECONSULTATION

Download

CE119

LOAD BALANCING IN CLOUD COMPUTING

Download

CE178

SURVEY ON AUTOMATED BILLING SYSTEM IN PLAZZA USING ZIGBEE

Download

CE120

UDT: AN APPLICATION LAYER DATA TRANSPORT PROTOCOL

Download

CE121

FUZZY LOGIC IN MOBILE HANDOFF DECISION

Download

CE122

A HYBRID RECOMMENDER SYSTEM IN ECOMMERCE USING CUSTERED CONTENT BOOSTED COLLABORATIVE FILTERING

Download

CE123

LOAD BALANCING ALGORITHMS FOR THE CLOUD COMPUTING ENVIRONMENT: A REVIEW

Download

CE124

SIMPLIFYING COMPLEXITIES OF K-NN USING NEURAL NETWORK

Download

CE125

STUDY OF PROTOCOL FOR CARRYING AUTHENTICATION FOR NETWORK ACCESS (PANA) AND ITS FUNCTIONALITY

Download

CE126

TYRE MARK IDENTIFICATION FOR CRIME SCENE INVESTIGATION USING IMAGE PROCESSING TECHNIQUES

Download

CE127

SECURITY THREATS IN CLOUD COMPUTING ENVIRONMENT

Download

CE128

A COMPARATIVE STUDY OF DIGITAL WATERMARKING TECHNIQUE THAT ATTACK LARGE SCALE IMAGE CROPPING

Download

CE129

A SURVEY ON SMS BASED ROUTE FINDER SYSTEM WITH SMARTPHONE

Download

CE130

FUZZY APPROACH FOR DOCUMENT SUMMARIZATION

Download

CE131

SECURITY PROSPECTS THROUGH MULTICLOUD COMPUTING BY ADAPTING DATA SPLITTING

Download

CE132

A REVIEW ON INTERSECTION OF CLOUD WITH BIG DATA AND SAP HANA

Download

CE133

ANALYSIS OF FUZZY BASED APPROACH FOR DETECTION OF ABNORMAL BEHAVIOR WITH EMAIL TRAFFIC

Download

CE134

CONTENT BASED FORENSICS TATTOO IMAGE RETRIEVAL AND IDENTIFICATION METHOD FOR DATABASE APPLICATIONS

Download

CE135

REQUIREMENT ELICITATION : A REVIEW

Download

CE136

AN OPINION SPAM ANALYZER FOR PRODUCT REVIEWS USING SUPERVISED MACHINE LEARNING METHOD

Download

CE137

Statistical Analysis for the Removal of Noise in Medical Imaging

Download

CE138

A HYBRID UNIFIED FRAMEWORK TO RECOMMENDER SYSTEM IN E-COMMERCE USING MULTI LAYER ARCHITECTURE THROUGH CLUSTERING

Download

CE139

DOMAIN ADAPTABLE WEIGHTED SEMISUPERVISED LEARNING FOR OPINION CLASSIFICATION

Download

CE140

UPCOMING TECHNIQUES IN MOBILE COMMUNICATION

Download

CE141

A SURVEY ON IMPROVEMENT OF A PIN ENTRYMETHOD RESILIENT TO SHOULDER-SURFING ANDRECORDING ATTACKS

Download

CE142

MALWARE DETECTION AND REMOVAL IN DELAY TOERANT NETWORKS BASED ON ITS BEHAVIOR

Download

CE143

WEB MINING USING CLOUD COMPUTING

Download

CE144

DYNAMIC SCHEDULING ALGORITHM FOR MULTIPROCESSORS SYSTEM

Download

CE145

TWITTER STREAM ANALYSIS FOR TRAFFIC DETECTION AND EARTHQUAKE

Download

CE146

FILE SYSTEM AUTHENTICATION USING SEQUENCE OF IMAGES AND EIGEN EDGINESS TECHNIQUE

Download

CE147

A PRIVACY PRESERVING APPROACH TO PROTECT LOCATION IN LOCATION BASED SERVICES

Download

CE148

DIRECTING PHYSIOLOGY AND MOOD THROUGH MUSIC: VALIDATION OF AN AFFECTIVE MUSIC PLAYER

Download

CE149

IMPROVING THE RECOMMENDATION SYSTEM FOR RESTAURANT REVIEWS

Download

CE150

SURVEY ON COVERAGE AND ENERGY BASED CLUSTERING TECHNIQUES TO INCREASE THE LIFETIME OF NETWORK

Download

CE151

SURVEY ON DELAY MITIGATION USING LINK STATE DYNAMIC ROUTING PROTOCOL TECHNIQUES

Download

CE152

Drowsiness Recognition and Alerting System for Vehicle Driver

Download

CE153

Sentiment Analysis in Web Comments Using C++

Download

CE154

Electric Load Assessment

Download

CE155

Key Challenges on Integer Factorization in RSA Public Key Cryptosystem

Download

CE156

Secure Instant Messaging Architecture for Mobile Devices

Download

CE157

THE PROBLEM OF GLOBAL EAVESDROPPER IN WIRELESS COMMUNICATION IS SOLVED BY GI

Download

CE158

Survey on Data Mining Using Recommendation System Methods

Download

CE159

Moving Object Detection with Static and Dynamic Camera for Automated Video Analysis

Download

CE160

IMPROVEMENT IN THE CONGESTED SENSOR NETWORK USING MCAR

Download

CE161

Technique of Video encryption/scrambling using chaotic functions and analysis

Download

CE162

SMARTPHONE BASED MEDICINE INTAKE REMINDER USING GCM

Download

CE163

SURVEY ON VARIOUS APPROACHES TOWARDS MACHINE TRANSLATION BETWEEN MALAYALAM AND ENGLISH

Download

CE164

PATIENT HEALTH MONITORING SYSTEM BASED ON E-HEALTH MONITORING ARCHITECTURE

Download

CE165

A Literature Survey on standards for software product quality

Download

CE166

SERVERLOAD BALANCING USING HAPROXY

Download

CE167

A FRAMEWORK FOR LEARNING DISABILITY PREDICTION IN SCHOOL CHILDREN USING NAIVE BAYES - NEURAL NETWORK FUSION TECHNIQUE

Download

CE168

A SURVEY ON AUTOMATED DEPLOYMENT OF CLOUDERA DISTRIBUTION ON DOCKER CONTAINERS

Download

CE169

A SURVEY ON HUMAN IDENTIFICATION USING WEARABLE DEVICE

Download

CE170

NEW SECURE APPROACH TO TRANSMIT DATA OVER CP-ABE

Download

CE171

IMPLEMENTATION OF UNMANNED AERIAL VEHICLE

Download

CE172

IMAGE RE-RANKING AS AN EFFECTIVE WAY TO IMPROVE THE RESULTS OF WEB-BASED IMAGE SEARCH.

Download

CE173

A HEALTH MONITORING SYSTEM WITH PROVISIONS FOR SETTING UP SMART ALARMS AND REMINDERS

Download

CE174

USING PRESENT USER PASSWORDS TO OBTAIN HONEYWORDS AND ACHIEVE FLATNESS

Download

CE175

SURVEY ON MOISTURE MONITORING SYSTEM USING WSN

Download

CE176

ANALYTICAL STUDY OF REVERSIBLE DATA HIDING TECHNIQUES USING DIGITAL WATER MARKING

Download

CE177

ISSUES AND CHALLENGES IN CLOUD COMPUTING AND BIG DATA

Download

CE179

SURVEY ON AIR QUALITY MEASUREMENT SYSTEM USING WSN

Download

CE180

DIGITAL DATA PIRACY

Download

CE181

CURRENT AND FUTURE TRENDS IN WIRELESS MOBILE COMMUNICATIONSYSTEMS

Download

CE182

DND TOLERANT ROUTING PROTOCOLS FOR VANET

Download

CE183

FACE RECOGNITION BASED ON IMAGE REGISTRATION FOR WEBINAR AUTHENTICATION

Download

CE184

Review Paper on Fingerprint Biometric and Security

Download

CE185

AIRBORNE INTERNET

Download

CE186

ENHANCING SYSTEM SECURITY FROM UNAUTHORIZED USB DEVICES AND EVIDENCE COLLECTION TO PROVE DATA THEFT

Download

CE187

Enhancing the security of administrator in banking by using OTP and Fingerprint Biometric.

Download

CE188

Implementation of Agile Methodologies in Software Engineering and Project Management

Download

CE189

Human Facial Gesture and Voice Command Based Desktop Control

Download

CE190

IOT Cloud Based Air Quality Monitoring Using Mobile Application

Download

CE191

COMMUNICATION THROUGH LI-FI WIRELESS TECHNOLOGY

Download

CE192

NEW TECHNIQUES FOR LOAD BALANCING AND DEDUPLICATIONS

Download

CE193

Moisture Monitoring System for Dam Construction using WSN

Download

CE194

New method for generating helpful state of deterministic finite automata

Download

CE195

Natural Language Database Interface For Select Sql query with Probabilistic Context Free Grammar

Download

CE196

SOFTWARE PIRACY THROUGH DIGITAL RIGHTS MANAGEMENT SYSTEM

Download

CE197

SECUREING ATM TRANSACTION

Download

CE198

SURVEY ON AUTOMATED BILLING SYSTEM IN PLAZZA USING ZIGBEE

Download

CE199

Using Trinary Trees in Trinity Gives Best Solution for Unsupervised Web Data Extraction

Download

CE200

ANALYSIS OF VIDEO WATERMARKING TECHNIQUES

Download

CE201

BANK INDEPENDENT CASHLESS ECONOMY THROUGH MODERN RBI INSTRUMENTS

Download

CE202

REVIEW ON FINGERPRINT BASED AUTHENTICATION TECHNIQUES

Download

CE203

UNIQUE IDENTIFICATION BASED ON IRIS RECOGNITION

Download

CE205

ANALYSIS OF SMART VIDEO SURVEILLANCE SYSTEM FOR HOSPITALS

Download

CE206

MAC OSX: iMessage, Face Time, Apple Mail Application Forensics

Download

CE207

ADVANCE CONCEPT OF COMPUTER VISION CONTROL FOR VIDEO SURVEILLANCE SYSTEM

Download

CE208

JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER ENGINEERING ISSN: 0975 – 6760| NOV 16 TO OCT 17| VOLUME – 04, ISSUE – 02 Page 1010 Automated Digital Authentication based on Facial Recognition

Download

CE209

Review of Recent Technologies in Big Data Analysis

Download

CE210

CRYPTOGRAPHY IN CLOUD COMPUTING

Download

CE211

LOAD BALANCING IN GRID ENVIRONMENT USING MACHINE LEARNING

Download

CE212

A REVIEW ON SECURITY AND PRIVACY OF DATA IN MULTI CLOUD WITH DATA BACKUP AND DATA RECOVERY

Download

CE213

PROPOSED APPROACH FOR DE-SCATTERING AND CLASSIFICATION IN UNDERWATER IMAGE

Download

CE214

AN APPROCH TO FREQUENT ITEMSET MINING USING DIC & MINHASH TECHNIQUE

Download

CE215

LOAD BALANCING IN CLOUD COMPUTING BY HYBRID APPROACH USING STATIC AND DYNAMIC LOAD MANAGEMENT ALGORITHM

Download

CE216

A FRAMEWORK TO ENSURE DATA STORAGE SECURITY IN CLOUD COMPUTING TO PROVIDE ERROR LOCALIZATION AND REDUCE THE COMMUNICATION DELAY

Download

CE217

MOBILE WALLET AS INTELLIGENT PAYMENT WAY

Download

CE218

JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER ENGINEERING ISSN: 0975 – 6760| NOV 17 TO OCT 18| VOLUME – 05, I SSUE – 01 Page 1044 SMART FACE RECOGNITION SYSTEM BASED ON FEATURE ANALYSIS USING PCA

Download

CE219

THE TOOLS OF INFORMATION TECHNOLOGY FOR SUPPORTING BUSINESS DECISION MAKING

Download

CE220

HAND GESTURE RECOGNITION APPROACH

Download

CE221

POWER QUALITY IMPROVEMENT BY USING UPQC WITH THE COMPARISON OF CONVENTION AND SOFT COMPUTING METHOD

Download

CE222

A REVIEW OF CLOUD COMPUTING SECURITY ISSUES

Download

CE223

A NOVEL APPROACH FOR IRIS BIOMETRIC IDENTIFICATION SYSTEM WITH IMPROVED RECOGNITION RATE

Download

CE224

SMART VIDEO SURVEILLANCE SYSTEM FOR HUMAN ACTIVITY RECOGNITION

Download

CE225

MOBILE CLOUD COMPUTING: CHALLENGES AND SOLUTIONS

Download

CE226

OVERVIEW OF LTE, LTE-A AND 5G MIMO ANTENNA FOR WIRELESS COMMUNICATION

Download

CE227

MUSIC BY MOOD: CUSTOMIZED MUSICRECOMMENDATION SYSTEM USING DCNN

Download

CE228

DATABASE MANAGEMENT SYSTEM ANDINFORMATION RETRIEVAL

Download

AES JOURNALS

Copyright ©2009 Amoghsiddhi Education Society (AES)

Office Address: F/12, Ketki Apartment, Nagraj Colony, Vishrambag, Sangli – 416415. (Maharashtra) India