No. | Article Title and Authors Name | Page No | Download | |||
1 |
Sampling Techniques for Twitter Data Stream Using Sentiment Analysis D.Yazhini priyanka, K.S.Suganya |
1 - 10 | Download | |||
2 |
Pregnant Women Health Care Monitoring System Based on IoT Gayathri S,Bharathi T, Devleena Jerusha AR, Ajay Kumar A |
11 - 14 | Download | |||
3 |
Survey Analysis for Lung Cancer Detection Using Classifier G Shobana,N Anis Fathima,A Bhavana,K Janani,R Dharani |
15 - 28 | Download | |||
4 |
Novel Perspective on Security And Privacy Mechanisms in Fog Computing Manas Kumar Yogi , Mahesh Reddy, Himatej |
29 - 32 | Download | |||
5 |
Analysis of Stock Overview Report for Finished,Semi-Finished And New Goods Ashwini G, Jeevitha C N, Kavitha K R ,Dr.Sujatha T |
33 - 38 | Download | |||
6 |
Mixing of Centralized and Decentralized Methods Using Demand Driven Load Collection in Dynamic Load Balancing Algorithm in Cluster System Dr. Sharada Santosh Patil |
39 - 58 | Download | |||
7 |
Automatic Medicine Delivering System in Rural Areas utilizing IoT and actualizing ERP incorporated with BPM Kodieswari A, Akash Krishna T |
59 - 63 | Download | |||
8 |
Credit card fraud detection: A hybrid approach Mbuu Mutua,L. K. Suresh Kumar |
64 - 67 | Download | |||
9 |
Dynamic and Secure Multi Keyword Ranked Search Scheme on
encrypted data Dr.J. Keziya Rani DOI: 10.46647/ijetms.2018.v02i01.009 |
68 - 72 | Download |