[PDF][PDF] BIG DATA CLUSTERING USING HEURISTIC DATA INTENSIVE COMPUTING AND SELF-ORGANIZING MAP

M Divyasri, K Prasanna, ME Jayasingh - 2017 - researchgate.net
Conventional information grouping calculations are having traps while finding effective
bunches. As the information base size builds powerfully and the sensational changes in the …

A Comparative Study of ICN Routing Protocols

A Mateen, MH Raza - International Journal of Management, IT …, 2017 - indianjournals.com
Information delivery such as P2P or video streaming over the internet has invited the
redesigning of routing protocols to be of the information centric in nature. A new kind of …

Mobility Management And its Challenges in Wireless Mesh Networks

A Mateen, UA Aziz - International Journal of Management, IT and …, 2017 - indianjournals.com
In this research the main focus is on wireless mesh networks (WMNs) that become known as
a mean knowledge for next-generation wireless network. So their advantages across the …

Components Based Software Testing Strategies to Develop Good Software Product

A Mateen, H Zahid - International Journal of Management, IT and …, 2017 - indianjournals.com
Component based software development is used for building a new software artifact rapidly
by using less resource. Different components are collected and integrated collectively to …

[PDF][PDF] Analysis of E-Learning System using cloud-based Technology

M Ibrar - system, 2017 - researchgate.net
E-Learning is the topic related to the virtualized distance learning by means of electronic
communication mechanisms, specifically the Internet. They are based in the use of …

[PDF][PDF] Analytical and Technical Survey on Social Networking Sites

KC Gull, C Rajasekaran, SG Kanakaraddi… - … Journal of Research …, 2016 - researchgate.net
Online social media may be a paradigm that deals with production, transfer and
consumption of data. User generated content within the kind of posts, comments, likes, and …

[PDF][PDF] Proposed Automated Food Ordering System Using Data Mining Techniques

R Kavade, V Pansare, P Kunjir, G Gavande - JETIR, 2016 - researchgate.net
The advancement in information and communication technology has greatly influenced the
business transactions. In earlier days, food industry traditionally has lagged behind other …

[PDF][PDF] CBNST: An enhanced Sybil Attack resilient mechanism for Restricting Sybil Attacks in Peer to peer E-commerce.

U Tripathi, SR Yadav - 2016 - researchgate.net
Peer to peer e-commerce applications provide an enhanced and flexible mechanism to
access content of the ecommerce vendor. But these applications are vulnerable to various …

Fuzzy based Load Distribution Scheme in MultiPath Routing

G Devi, S Upadhyaya - International Journal in IT & Engineering, 2016 - indianjournals.com
A scheme of disjoint path selection among overlapping paths has been explored here
considering multiple QoS (Quality of Service) constraints, as the disjoint paths provide more …

[PDF][PDF] Big Data Analysis on Weather Prediction Based on Using IOT And Collected Sensor Data

DC Shubangi, SS Nigudgi - 2016 - researchgate.net
The assets of the sensor generated data day by day, by providing high volume of massive
real time data. Analysing, aggregating, storing, and collecting the sensor data is a great …