Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of Current Engineering Research

ISSN: 2250--2637
Publisher: GPublication


ADD TO MY LIST
 
A Survey of Association Rule Based Technique for Protecting Sensitive Information

Author(s): Abhishek Diwan
Volume: 2
Issue: 6
Year: 2012
A Modified Algorithm for Privacy Preserving Association Rule Hiding

Author(s): Manish Vyas
Volume: 2
Issue: 6
Year: 2012
Customization of Sensitive Association Rules in Data Mining

Author(s): Manish Vyas
Volume: 2
Issue: 6
Year: 2012
An Efficient Technique for Mining Top Ranked Data from a Standard Data Set

Author(s): Hiresh Udiya
Volume: 2
Issue: 6
Year: 2012
SMART CREDENTIALS CUM UNIQUE IDENTIFICATION AND RECOGNITION SYSTEM

Author(s): Lokesh Khedekar
Volume: 2
Issue: 6
Year: 2012
An Overview of Association Rule Mining Techniques

Author(s): Hiresh Udiya
Volume: 2
Issue: 5
Year: 2012
An Efficient Technique for Protecting Sensitive Information

Author(s): Devilal Birla
Volume: 2
Issue: 5
Year: 2012
An Efficient Technique for Sequential Rule Mining

Author(s): Bhupendra Mandloi
Volume: 2
Issue: 5
Year: 2012
A Survey of Privacy Preserving in Association Rule Mining Techniques

Author(s): Devilal Birla
Volume: 2
Issue: 5
Year: 2012
A Survey of Sequential Rule Mining Techniques

Author(s): Bhupendra Mandloi
Volume: 2
Issue: 5
Year: 2012
Problems in Relational Object Oriented Requirement Engineering

Author(s): Anand Mahajan
Volume: 2
Issue: 5
Year: 2012
SPEECH RECOGNITION - A COMPUTER MEDIATED APPROACH

Author(s): Kaliyaperumal Karthikeyan
Volume: 2
Issue: 5
Year: 2012
Experimental Investigation of Cotton Seed Oil and Methyl Esters as Biodiesel on C.I. Engine

Author(s): Kaliyaperumal Karthikeyan
Volume: 2
Issue: 5
Year: 2012
Simulative Analysis of different Modulation Formats for Long-haul transmission

Author(s): Kamaljit Bhatia
Volume: 2
Issue: 5
Year: 2012
Simultaneous Color Image Compression and Encryption using Number Theory

Author(s): Navaneethakrishnan Navaneethakrishnan
Volume: 2
Issue: 5
Year: 2012
A Supervisory Hierarchical Fuzzy Logic controller for Power System Stabilizer

Author(s): Surendra V
Volume: 2
Issue: 5
Year: 2012
Real-Time Health Monitoring System on Wireless Sensor Network

Author(s): Deepak Choudhary
Volume: 2
Issue: 4
Year: 2012
Iris- A Reliable Secured Biometric Authentication

Author(s): Kezia R Badhiti
Volume: 2
Issue: 4
Year: 2012
Ionic conductivity and relaxation process in CMC-G.A solid biopolymer electrolytes.

Author(s): Mohd Ikmar Nizam Mohamad Isa
Volume: 2
Issue: 4
Year: 2012
A Survey on Geographic Routing Protocol in MANET

Author(s): Anand Gautam
Volume: 2
Issue: 4
Year: 2012
A Fast Algorithm For High Speed Downlink Packet Access

Author(s): Abhishek Raghuvanshi
Volume: 2
Issue: 4
Year: 2012
An Overview of UMTS Scheduling Algorithms

Author(s): Abhishek Raghuvanshi
Volume: 2
Issue: 4
Year: 2012
Text clustering by concept similarity frequency scope

Author(s): S. Prapurna
Volume: 2
Issue: 4
Year: 2012
WORKFLOW MANAGEMENT SYSTEM FOR STUDENTS REGISTRATION

Author(s): Njoku Anita
Volume: 2
Issue: 4
Year: 2012
Artificial Leg Control Using Upper Limb EMG Signal

Author(s): Kalpesh Pathak
Volume: 2
Issue: 4
Year: 2012
PARTIAL REPLACEMENT OF SAND WITH GRAVEL IN SANDCRETE BLOCK PRODUCTION

Author(s): G. K. Oyekan
Volume: 2
Issue: 4
Year: 2012
A Survey of Confidentiality Preserving Methods

Author(s): Abhishek Raghuvanshi
Volume: 2
Issue: 4
Year: 2012
VIRUS The death trap for Computers

Author(s): Sudesh Maan
Volume: 2
Issue: 4
Year: 2012
A METHOD Of DETECTING DATA LEAKAGE INCIDENT USING MISUSEABILITY WEIGHT MEASURES

Author(s): Kalavathi Mekala
Volume: 3
Issue: 4
Year: 2013
LDPE and CRMB Utilization in Bituminous Concrete Pavement Surfaces

Author(s): Payal Bakshi
Volume: 3
Issue: 4
Year: 2013
Assessing Adequacy of Probability Distribution for Modelling Annual Maximum Rainfall

Author(s): N. Vivekanandan
Volume: 3
Issue: 4
Year: 2013
STUDY OF FINANCIAL RISK INVOLVED IN BOT PROJECTS

Author(s): Renu Upadhyay
Volume: 3
Issue: 4
Year: 2013
DATAMINING AND CLUSTERING USING ACO ALGORITHM

Author(s): San A
Volume: 2
Issue: 3
Year: 2012
An Overview of Visual Cryptography with Some Important Parameters

Author(s): Aarti .
Volume: 2
Issue: 3
Year: 2012
A Fast Monsoon Onset prediction using Parallelized Data mining

Author(s): Dinu T.
Volume: 2
Issue: 3
Year: 2012
A Comparison of different algorithms for detection in a MIMO system

Author(s): Dhruv Malik
Volume: 2
Issue: 3
Year: 2012
Performance and Security Issues of RSA Cryptosystem

Author(s): G Jai Arul Jose
Volume: 2
Issue: 3
Year: 2012
EXPERIMENTAL INVESTIGATION ON HIGH PERFORMANCE CONCRETE USING SILICAFUME AND FLYASH

Author(s): Kannan Kannan
Volume: 2
Issue: 3
Year: 2012
An Enhanced Play-fair Cipher Cryptographic Substitution Algorithm with 6X6 Matrix

Author(s): BhgayaShree Bodkhe
Volume: 2
Issue: 3
Year: 2012
cell phone security: Emerging Threats, Essential Strategies

Author(s): Ritika Saroha
Volume: 3
Issue: 3
Year: 2013
Development of Local health Care Planning and Demanding in Saudi Arabia By Using GIS Applications

Author(s): Magdy Shayboub Ali Mahmoud
Volume: 3
Issue: 3
Year: 2013
Optimal Route Generation Algorithm

Author(s): Nishant SP
Volume: 3
Issue: 3
Year: 2013
A PROCESS OF BIOGAS GENERATION FROM FOOD WASTAGE IN EIT CAFTERIA

Author(s): Kaliyaperumal Karthikeyan
Volume: 2
Issue: 2
Year: 2012
An Overview of WiMAX Security Vulnerability and Countermeasures

Author(s): Md Haque
Volume: 2
Issue: 2
Year: 2012
Social engineering towards the banking system

Author(s): Amrit Ramchandani
Volume: 2
Issue: 2
Year: 2012
Synthesis of 2, 4 - Dihydroxybenzophenone (UV-214) with the Phase Transfer Method

Author(s): Hongjun You
Volume: 2
Issue: 2
Year: 2012
A PROCESS CAPABILITY OF ANALYSIS IN CNC MANUFACTURING PROCESS SYSTEM

Author(s): Kaliyaperumal Karthikeyan
Volume: 1
Issue: 2
Year: 2011
GRASP and GOF Patterns in Solving Design Problems

Author(s): Noorullah Mohammed
Volume: 1
Issue: 2
Year: 2011
Carboxyl methylcellulose solid polymer electrolytes: Ionic conductivity and dielectric study

Author(s): Mohd Ikmar Nizam Mohamad Isa
Volume: 1
Issue: 2
Year: 2011
COMPARATIVE STUDY IN UTILIZATION OF CREATIONAL DESIGN PATTERNS IN SOLVING DESIGN PROBLEMS

Author(s): Noorullah Mohammed
Volume: 1
Issue: 2
Year: 2011
New types of biopolymer electrolytes: Ionic conductivity study on CMC doped with NH4Br

Author(s): Mohd Ikmar Nizam Mohamad Isa
Volume: 1
Issue: 2
Year: 2011
Overview of C5 Source Utilization in Fushun

Author(s): Hongjun You
Volume: 1
Issue: 2
Year: 2011
Decision Tree Induction Approach for Data Classification Using Peano Count Trees

Author(s): Ravindra Changala
Volume: 2
Issue: 2
Year: 2012
A Novel approach for Image Enhancement technique based on thumbnails

Author(s): M. Hari Krishna
Volume: 2
Issue: 2
Year: 2012
Bad Code Smells-Software Maintainability Indicators

Author(s): PreetKamal Dhillon
Volume: 2
Issue: 2
Year: 2012
A Genetic Algorithm Approach to Study CPU Scheduling Problem

Author(s): Ravinder Saini
Volume: 2
Issue: 2
Year: 2012
Efficient Use of Caching Stratagies & Quick Information Density in MANETs

Author(s): Tatanehru Chintala
Volume: 2
Issue: 2
Year: 2012
performance analysis of routing protocol in MANET

Author(s): Boopalan J
Volume: 2
Issue: 2
Year: 2012
New Approach: 2d-Code to Store Data & Information Secure

Author(s): Gajanan Kurundkar
Volume: 2
Issue: 2
Year: 2012
INTELLIGENT TRANSPORTATION SYSTEM OF TECHNICAL ISSUES IN VEHICULAR AD HOC NETWORKS

Author(s): A. Manikandan
Volume: 2
Issue: 2
Year: 2012
Monitoring of Industrial Machine By Using WSN

Author(s): Somveer Yadav
Volume: 2
Issue: 2
Year: 2012
Security of Mobile Agent in Ad hoc Network using Threshold Cryptography

Author(s): Saurabh Gupta
Volume: 2
Issue: 2
Year: 2012
OMS Java: Object Oriented Framework & Web Site Engineering

Author(s): Vivek Bansal
Volume: 2
Issue: 2
Year: 2012
Privacy-Preserving Demographic Filtering Alambic Management System

Author(s): M. SAI
Volume: 2
Issue: 2
Year: 2012
Fuzzy Logic Based Controller for Brushless DC Motor

Author(s): Trinayani Chittajallu
Volume: 2
Issue: 2
Year: 2012
Light Weight And Secured Mobile Commerce In Android Environment

Author(s): Gowtham Lingabathina
Volume: 2
Issue: 2
Year: 2012
ENHANCED SECURITY IN MANETS WITH QAR AND ADMISSION CONTROL

Author(s): Dr.S. MANGAI
Volume: 2
Issue: 2
Year: 2012
Relevance Feedback Techniques For Web Images Retrieval Using Lexical Chains

Author(s): Satya Pepakayala
Volume: 2
Issue: 2
Year: 2012
Balancing the Wireless Sensors on Hierarchical Routing Algorithm

Author(s): G. Sireesha
Volume: 2
Issue: 2
Year: 2012
EFFICIENT AND SECURE RFID AUTHENTICATION PROTOCOL WITHOUT PROXY

Author(s): Gaurav Gupta
Volume: 2
Issue: 2
Year: 2012
Towards the Framework of Information Security

Author(s): Brijender Kahanwal
Volume: 2
Issue: 2
Year: 2012
Application of genetic algorithm to computer-aided process

Author(s): Amrinder Chahal
Volume: 2
Issue: 2
Year: 2012
A Survey Report on Disaster Management By Using Wireless Sensor

Author(s): Jagbir Dhillon
Volume: 3
Issue: 2
Year: 2013
STATE OF ART OF A WIRELESS SENSOR NETWORK SYSTEM FOR WEATHER PREDICTION

Author(s): Jagbir Dhillon
Volume: 3
Issue: 2
Year: 2013
ONTOLOGY FOR SPENT FUEL REPROCESSING

Author(s): HARIKA KOTHA
Volume: 3
Issue: 2
Year: 2013
Inspection of wall thickness of pipes in petrochemical plants through WSN

Author(s): VIMAL UPADHYAY
Volume: 2
Issue: 1
Year: 2012
A Sight on Text Document Watermarking

Author(s): Makarand Mali
Volume: 2
Issue: 1
Year: 2012
Survey of Preprocessing on Web Logs for Web Intrusion Detection

Author(s): Priyanka Patil
Volume: 2
Issue: 1
Year: 2012
Domatic Dot Stable Graphs

Author(s): Yamuna Manimuthu
Volume: 2
Issue: 1
Year: 2012
PEHLIVAN FORMULA

Author(s): Mustafa Pehlivan
Volume: 2
Issue: 1
Year: 2012
APA DESIGNED FOR ECHO CANCELLATION IN WIRELESS NETWORKS

Author(s): B. AnilKumar
Volume: 2
Issue: 1
Year: 2012
Security Issues & Challenges in Wireless Sensor Networks

Author(s): Anand Nayyar
Volume: 2
Issue: 1
Year: 2012
IP Traceback Techniques and Analysis of Packet Marking

Author(s): Natarajan Meghanathan
Volume: 1
Issue: 1
Year: 2011
Performance Evaluation of a Secure Ad-hoc Network Management Method

Author(s): Sapna Bagde
Volume: 2
Issue: 1
Year: 2012
COMPARATIVE ANALYSIS OF CONGESTION CONTROL MECHANISMS IN HIGH SPEED NETWORK

Author(s): Chander Kant
Volume: 2
Issue: 1
Year: 2012
Software Structure and Metrics

Author(s): Mrs. Rekha Purohit
Volume: 3
Issue: 1
Year: 2013
Worm Gear Drive Optimization using Modified Artificial Immune Algorithm

Author(s): S. Padmanabhan
Volume: 3
Issue: 1
Year: 2013
Implementation of Closed Loop Bi-Directional Speed Control of PMBLDC Motor by FPGA

Author(s): Aluru Ashokkumar
Volume: 3
Issue: 1
Year: 2013
Dynamic Demes Parallel Genetic Algorithm for Scheduling the Resources in Cloud

Author(s): Gayathri Prakash
Volume: 3
Issue: 1
Year: 2013
Diagnosis of HIV Using Pervasive Computing - A Conceptual Approach

Author(s): M. Suryakala
Volume: 3
Issue: 1
Year: 2013
Content Based Image Retrieval Using Wavelet Transform

Author(s): Sachin Inzalkar
Volume: 3
Issue: 1
Year: 2013
Development of Database Security Using Row Level Masking

Author(s): Bireswar Dutta
Volume: 3
Issue: 1
Year: 2013
Security Analysis for Multi-Homed Body Sensor Networks

Author(s): Praveen Kumar
Volume: 3
Issue: 1
Year: 2013
Save time & money - Smart Internet Solutions     Free Forms + CRM